Optimze It for My GPU
Can LLMs write better GPU kernals if you keep asking them to “Optimze it for my GPU”?
Vision Pro M5 review: It's time for Apple to make some tough choices
The article discusses the current state of Apple's Vision Pro headset, including its technical specifications and capabilities after the M5 chip refresh. It highlights the device's advancements in key areas such as performance, battery life, and user experience.
The Journey to the Edge of the Infinite Chess Board [video]
Barack Obama and Anthony Bourdain Have Dinner [video]
Belgian Police exposed using botnets to manipulate EU data law impact assessment
The article discusses how the Belgian Federal Police accidentally left their VPN connection active, revealing their internal IP addresses and server names publicly on Reddit. This incident highlights the importance of proper security measures and the risks associated with unintended data exposure.
Iberia tells customers it was hit by a major security breach
Iberia, the Spanish airline, has reported a major security breach that may have compromised the personal and financial information of its customers. The company is investigating the incident and has notified affected customers to take necessary security measures.
High Air Pollution Could Diminish Exercise Benefits by 50%, Study Finds
A study found that the benefits of exercise may be reduced when air pollution levels are high, suggesting that individuals should consider air quality when planning their exercise routines to maximize the health benefits.
The GitHub Infrastructure Powering North Korea's Contagious Interview NPM Attack
The article explores the recent npm package attacks associated with North Korea, highlighting the country's efforts to target software developers and technology companies through malicious code injections and other cybersecurity threats.
Show HN: FISE – A rule-based, keyless semantic envelope for web/API data
Hi HN,
I've been building a small open-source project called FISE, a rule-based "semantic envelope" for web/API data. It's not cryptography and it doesn't try to replace TLS/AES. The goal is to raise the cost of scraping and reverse-engineering client-visible data while keeping the hot path simple and fast (linear-time, parallelizable, works for JSON and media segments).
Key ideas:
- Keyless by design: no long-lived client-side decrypt keys. - Rules-as-code: offsets, length encoding, salt/meta layout, and optional transform are defined as per-app/per-session rules. - No protocol-level universal decoder: each deployment (and even each session/time bucket) can have its own rule family. - Temporal & distribution polymorphism: rotate rules per session/route/time so any decoded pipeline tends to be short-lived and non-reusable. - Simple local ops → emergent complexity: the core ops are just linear byte transforms, but the rule space and rotation make envelopes hard to generalize at scale. - Works for JSON and media (video segments) with framed/chunked mode, block-local decode, and parallel workers.
Threat model:
- In scope: automated scraping, bulk API harvesting, cheap cloning of curated datasets. - Out of scope: strong secrecy for secrets/PII (use TLS/AES/etc.), full client compromise, nation-state adversaries.
Engineering whitepaper (v1.0): - https://github.com/anbkit/fise/blob/main/docs/WHITEPAPER.md
Code: - https://github.com/anbkit/fise
Demo: - https://demo.fise.dev/demo
I'm a full-stack developer, not a cryptographer. FISE came out of working on real projects where API JSON data was exposed on the client side and could be easily scraped. I built it as a simple, rule-based layer to raise scraping cost, and I'm sharing it so others can review, critique, and improve it.
I'd love feedback on:
- The security model & threat boundaries (what did I miss?), - The "rules-as-code" design and the idea of temporal/distribution polymorphism, - Practical deployment concerns (CDN/normalization, mobile/TV/edge), - Any obvious pitfalls or prior art I should explicitly reference.
Thanks for taking a look.
Power of Empty Spaces: Seeing What Your Metrics Miss
The article discusses the importance of considering the 'empty spaces' in data visualization and metrics, as they can reveal insights that may be missed by focusing solely on the numbers. It emphasizes the need to step back and examine the context and relationships within the data to gain a more comprehensive understanding of the underlying trends and patterns.
Ask HN: Practicality of harnessing geomagnetic fields for electrical generation?
Years ago I would have asked this on the 'Overflows. Alas, those innocent days are long gone. I could always ask AI, but how can you know?
The Earth produces a moving magnetic field (small teslas, but large extent yes?). Moving magnetic fields produce electrical current, right? Could you add "geomagnetic power" to other clean/renewable sources with the right technical solution, or is it fundamentally impossible?
Free Nano Banana Pro
Cerebras CS-3 wafer-scale 1e6 cores 125 PFLOPS 25kW (30kA)
Security Layer 4.0 – First semantic firewall blocks malicious intent"
*Title:* Show HN: BETTI v2.0 – First semantic GPU firewall (93% cost savings, 100% cryptojacking detection)
*Body:*
I built BETTI, a distributed computing system that applies 14 natural physics laws to resource allocation. New in v2.0: Security Layer 4.0 for GPUs - the world's first semantic GPU firewall.
## The Problem
GPU training costs $3/hour (AWS), takes "3-8 weeks" (unpredictable), and cryptojacking steals $5B/year. Current security is reactive - firewalls block AFTER seeing patterns. Resource limits are arbitrary: "You get 4 cores", "10GB RAM max".
## The Solution
BETTI applies 14 physics laws:
• Kepler's 3rd Law (T² ∝ a³): Task scheduling based on orbital periods • Einstein's E=mc²: Energy cost calculation • Newton's Laws: Resource conservation • Fourier, Maxwell, Schrödinger, TCP, Thermodynamics, etc.
This is the first system to apply Kepler's orbital mechanics to computing.
## Security Layer 4.0 for GPUs (NEW!)
Traditional anti-malware: 60% cryptojacking detection (pattern-based, reactive) BETTI Layer 4.0: 100% detection (semantic, proactive)
Blocks BEFORE GPU kernel launch: ```python # Traditional: Pattern matching (bypassable) if "sha256" in kernel_name: block() # After launch attempt!
# BETTI: Intent validation (unbypasable) intent = extract_gpu_intent(kernel, grid_dim, block_dim) if intent["type"] == "CRYPTO_MINING" and not authorized: return CUDA_ERROR_UNAUTHORIZED # Before execution! ```
Triple-layer validation: 1. SNAFT: Intent blocklist (CRYPTO_MINING, GPU_HIJACK) 2. BALANS: Risk score 0.0-1.0 (no context = suspicious) 3. HICSS: Real-time budget enforcement
## Intent-First Protocol Translation
Problem: N protocols need N² bridges (HTTP↔Matrix, HTTP↔SIP, Matrix↔SIP...)
BETTI solution: Universal "intent language" needs only N adapters.
``` Email → Intent → Humotica → Security 4.0 → BETTI → SIP call ```
22 protocols working: Email, SIP, Matrix, CoAP, MQTT, HTTP, WebSocket, XMPP, gRPC, Modbus, OPC UA, LoRaWAN, Zigbee, BLE, AMQP, Kafka, Redis, RTSP, SSH, DoH, IPFS, WebRTC
## Results (8× NVIDIA A100 evaluation)
93% cost reduction (€0.20/hour vs $3/hour AWS) 100% cryptojacking detection (0% with traditional anti-malware) 0% OOM crashes (Newton's conservation predicts VRAM needs) ±6min runtime accuracy (Kepler's T² ∝ threads³ vs "3-8 weeks") Proactive security (blocks before GPU execution)
## Applications
GPU Training: LLaMA-2-7B fine-tuning (18.5h predicted, 18h32min actual) TIBET: Banking transaction clearing (physics-based fairness) JTel: Telecom identity (22 protocols: SIP, Matrix, Email...)
## Why This Matters
This is a paradigm shift from arbitrary computing to physics-based, provably fair resource allocation.
No prior work applies: - Kepler's law to GPU scheduling (T² ∝ threads³) - E=mc² to GPU energy accounting (real-time cost) - Semantic GPU firewall (blocks cryptojacking proactively) - All 14 physics laws combined
## Questions for HN
1. First semantic GPU firewall? (100% cryptojacking detection - no pattern DB needed) 2. Has Kepler's law been applied to GPU scheduling before? 3. Can GPU driver vendors (NVIDIA, AMD) integrate this natively? 4. Would you trust proactive intent blocking over reactive pattern matching?
## Paper & Code
Full paper (28 pages): https://jis.jtel.com/papers/betti-physics-computing.pdf Code: https://github.com/jaspertvdm/JTel-identity-standard License: JOSL v1.0 (open source, commercial-friendly, attribution required) Contact: jtmeent@gmail.com
Open to feedback on: - Semantic GPU firewalls (first in academia?) - Deployment: LD_PRELOAD, kernel driver, or Kubernetes plugin? - GPU vendor adoption (NVIDIA/AMD/Intel)
Thanks for reading!
---
*Author:* Jasper van de Meent *License:* JOSL v1.0 *GitHub:* https://github.com/jaspertvdm/JTel-identity-standard
The Thinking Game – Full Documentary (Google DeepMind)
Own a Graph
The article discusses the importance of owning a graph, which is a powerful data structure that can help businesses and individuals better understand connections and relationships within their data. It highlights the advantages of using a graph database over traditional relational databases and provides guidance on how to implement and utilize a graph-based approach.
Spoofing her majesty in the 'Great Royal Phone Embarrassment' of 1995
This article explores the 1995 incident where a prankster successfully impersonated Queen Elizabeth II during a phone call, embarrassing the British monarchy. The article delves into the details of how the hoax was executed and the aftermath that followed.
Why Container Images Keep Getting Bigger (and What to Do About It)
The article discusses the different layers of writing, including the content, structure, style, and mechanics. It emphasizes the importance of understanding and mastering these layers to become a skilled and effective writer.
Show HN: Benchmark-ips-Python – benchmarking tool for Python
This article presents a Python library for benchmarking Internet Protocol Security (IPsec) performance, allowing users to evaluate the throughput and latency of IPsec implementations across different platforms and configurations.
Reddit Migrates Comment Back End from Python to Go Microservice to Halve Latency
Reddit is migrating its comment system from its legacy infrastructure to a new system built on Go, which is expected to improve performance and scalability. The migration is a significant undertaking that will impact millions of users and require careful planning and execution.
Apache Hudi Dynamic Filter: 5-Minute Code Walkthrough
Apache Hudi introduces a dynamic bloom filter feature that optimizes storage and query performance for large datasets. The dynamic bloom filter adapts its size based on the dataset, reducing the storage overhead and improving query efficiency.
Ghost Explore
China's plan to take over Taiwan "peacefully" [video]
Psylo 1.1.0 Privacy focused Browser released for iPhone
I Know We're in an AI Bubble Because Nobody Wants Me
The article discusses the current state of the AI industry, noting that despite the hype and investment, many in the field feel underappreciated and unsure about the future. The author reflects on the challenges and uncertainties facing AI researchers and developers in the present 'AI bubble'.
Show HN: I built a browser-based Cursor alternative as a solo dev
PlayCode is an online code editor that allows users to create and run code directly in their web browser, supporting a variety of programming languages and providing tools for testing and debugging.
Anthropic's Claude 'Soul Document' extracted from Opus 4.5 weights
The article discusses the nature of consciousness and the possibility of an 'opus soul' - a fundamental unit of consciousness that may exist at the core of reality. It explores philosophical and scientific perspectives on this topic, considering the implications for understanding the nature of existence and the human experience.
If You Must Use Signal, Use Molly
Why the Dutch embrace floating homes
The article explores the benefits of living in floating homes, including increased resilience to natural disasters, reduced environmental impact, and the potential for creating sustainable communities on water. It examines various floating home projects around the world and the technological advancements that are making this type of living more feasible.
Black Friday Software Deals (Mega List)
The article provides an overview of the best Black Friday software deals for 2025, covering discounts on popular productivity, security, and creative software applications from leading brands.