Been hacking on this project using 100ms.live video rooms with two people. And in order to test I've been using two browsers and just real live video of myself on both sides. There's an echo. And boy am I sick of looking at myself doing this lol.So I wrote a …
Been hacking on this project using 100ms.live video rooms with two people. And in order to test I've been using two browsers and just real live video of myself on both sides. There's an echo. And boy… [+801 chars]
Night lighting may be due for a plant-based glow-up.
The post Chinese Scientists Bioengineering Plants With Firefly Genes to Glow, in Effort to Light Cities at Night appeared first on Futurism.
Can’t-miss innovations from the bleeding edge of science and tech
A shortcut to sprucing up any dreary urban locale is by throwing in some beautiful greenery. Now, Chinese scientists have unveiled n… [+2688 chars]
The biggest twist in many horror movies is when a sympathetic monster ends up with a more tragic ending than they might have otherwise deserved.
There are several so-called monsters in horror movies that never deserved the ending that they received. There have been several horror films over the years showing monsters who deserved everything t… [+13298 chars]
Britney Spears is said to be facing backlash and embarrassment following a DUI arrest.
Britney Spears is facing what insiders describe as the "ultimate music industry embarrassment" after her recent DUI arrest, with claims she may be forced to release new music on social media as recor… [+3994 chars]
Something I’ve been hacking around with for the past couple weekends. Registration and posts and listings are signed by eth private key. Market commerce is via ethereum smart contract. Agents can sell capacity to do work, or buy capacity from some other agent…
___ _ _ ___ ___ ___ ___ _____ __ __ _
| _ ) | | | | / __| o O O | _ \ / \ | _ \ |_ _| \ \ / / | |
| _ \ | |_| | | (_ | o | _/ | - | | / | | \ V / |_|
|___/ \___/ \___| TS__[O] _|_|_ |_|_| |_|_\… [+2967 chars]
Qilin ransomware claims it stole data from Germany’s Die Linke and threatens to leak it; the party confirmed the incident, but not a breach. The Qilin ransomware group claims it stole data from Die Linke, a German political party, and is threatening to releas…
Qilin ransomware group claims the hack of German political party Die Linke
The Qilin ransomware group claims it stole data from Die Linke, a German political party, and is threatening to release it.… [+3106 chars]
An auditing agent that enables automated monitoring and interaction with language models to detect potential alignment issues, reward hacking, and other concerning behaviors.
A required part of this site couldnt load. This may be due to a browser
extension, network issues, or browser settings. Please check your
connection, disable any ad blockers, or try using a diffe… [+12 chars]
An auditing agent that enables automated monitoring and interaction with language models to detect potential alignment issues, reward hacking, and other concerning behaviors.
Welcome to Inspect Petri, an auditing agent that enables automated monitoring and interaction with language models to detect potential alignment issues, reward hacking, and other concerning behaviors… [+5582 chars]
IoT Home Network Security Scanner
A required part of this site couldnt load. This may be due to a browser
extension, network issues, or browser settings. Please check your
connection, disable any ad blockers, or try using a diffe… [+12 chars]
Cybercriminals who target crypto are not operating on a fixed schedule. They move when the money moves. Related Reading: X Eyes Auto-Lock For Crypto Mentions After Tortoise Death Hoax That was the key message from Kraken’s chief security officer, Nick Percoco…
Cybercriminals who target crypto are not operating on a fixed schedule. They move when the money moves.
That was the key message from Kraken’s chief security officer, Nick Percoco, who told reporter… [+2547 chars]
I love getting cool swag from hackathons and I also love designing PCB's, so when my friend asked me if I would design hackathon badges for a large game jam in singapore, I was absolutely down!The theme of overglade was a "The game jam within a game", pretty …
These are zero-power hackathon badges I designed for the overglade hackathon in singapore! They're powered by the RP2040 and have passive NFC and an onboard e-ink driver!
<ul><li>Passive NFC tap for… [+1738 chars]
While many eyes are focused on Iran, the Trump administration’s policies suggest that reasserting the Monroe Doctrine in the Western Hemisphere could rank among its highest geopolitical priorities. As laid out in the 2025 National Security Strategy, the Trump…
While many eyes are focused on Iran, the Trump administrations policies suggest that reasserting the Monroe Doctrine in the Western Hemisphere could rank among its highest geopolitical priorities. As… [+8447 chars]
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as part of an ongoing supply chain hacking spree, and more.
A WIRED investigation based on Department of Homeland Security records this week revealed the identities of paramilitary Border Patrol agents who frequently used force against civilians during Operat… [+4119 chars]
Last year's cyber attack on JLR may suggest hackers are only interested in large corporations, but we all need to be aware of the threats we face
The result is that the most expensive cyber attack in British history had far-reaching consequences that stretched out beyond the serious business issues it caused JLR and its suppliers.
Manufactur… [+2216 chars]
Apple doesn't regularly release a critical update for previous iOS versions but DarkSword appears to be a serious threat.
Apple made an unusual decision on Wednesday, April 1, and released a new version of iOS 18.7.7 to combat a new hacking toolkit called DarkSword. Now, more devices, like the iPhone 16e, can download t… [+2342 chars]
None
2026 Apr 02 See all posts My self-sovereign / local / private / secure LLM setup, April 2026
Warning: please do not simply copy the tools and techniques
described in this post, and assume that the… [+24682 chars]
With the use of Large Language Models (LLMs) becoming more significant in many applications, it has become a great need to ask the question how these LLMs can be made safe and robust, and hence make it behave in an ethical way. Among the most seen and evident…
<li>S. Omri, M. Abdelkader, and M. Hamdi MalPID: Malicious prompt injection detection dataset for large language model based applications In Proc. 2024 IEEE 11th Int. Conf. Commun. Netw. (ComNet) IEE… [+4431 chars]
IntroductionThere was a significant increase in software supply chain attacks in March 2026. There were five major software supply-chain attacks that occurred including the Axios NPM package compromise, which has been attributed to a North Korean threat actor…
Summary
On March 30, 2026, security researchers discovered that the widely-used NPM package Axios was compromised through an account takeover attack targeting a lead maintainer. Threat actors bypass… [+3653 chars]
Posted by Tom Kacprzynski via NANOG on Apr 03Just a quick reminder that the CHI-NOG 13 call for presentations closes on
Monday, April 6th. We are looking for presentation abstract submissions.
CHI-NOG 13 is May 27-28, 2026 in Chicago. If you've been sitting …
nanog
mailing list archives
From: Tom Kacprzynski via NANOG <nanog () lists nanog org>Date: Fri, 3 Apr 2026 16:58:34 -0500
Just a quick reminder that the CHI-NOG 13 call for presentations cl… [+4078 chars]
Enterprise-grade MCP server for SAP ABAP development. mcp-name: io.github.openkash/abap-accelerator
Enterprise-grade Model Context Protocol (MCP) server for SAP ABAP development. Works with any MCP-compatible client including Claude Code, Amazon Q Developer, Kiro, Cursor, Windsurf, and more.
Fork … [+42000 chars]
Most of the discussions about the impact of the latest generative AI systems on copyright have centered on text, images and video. That’s no surprise, since writers, artists and film-makers feel very strongly about their creations, and members of the public c…
from the reinventing-software dept
Most of the discussions about the impact of the latest generative AI systems on copyright have centered on text, images and video. Thats no surprise, since writers… [+6706 chars]
Amid Microsoft's hacking and slashing of its Xbox division, you wouldn't be crazy for thinking State of Decay 3 was dead. After all, the title was announced nearly six years ago, and, well, we haven't heard much since. But the survival game is still in the pi…
Amid Microsoft's hacking and slashing of its Xbox division, you wouldn't be crazy for thinking State of Decay 3 was dead. After all, the title was announced nearly six years ago, and, well, we haven'… [+1297 chars]
I'm using Ubuntu Studio, now with Ubuntu Pro enabled... I just rebought Native Instruments awhile ago, and Windows isn't affordable since I only get $62 a month or less from SSI in a nursing facility mental health place... I splurged to take money I didn't re…
I'm using Ubuntu Studio, now with Ubuntu Pro enabled... I just rebought Native Instruments awhile ago, and Windows isn't affordable since I only get $62 a month or less from SSI in a nursing facility… [+1061 chars]
Students and faculty at Columbia’s M.S. in Sustainability Management and Sustainability Science programs turned cutting-edge research on microplastics into Moby Filter, a sustainability startup tackling laundry-induced pollution at its source.
Federal agencies took a major step on microplastics this week. The U.S. Environmental Protection Agency designated them as an emerging priority for future drinking water oversight, and the Department… [+11636 chars]
Portsmouth put a desperate run of form behind them to boost their hopes of Championship survival with a gritty 1-1 draw at an in-form Norwich side.
Portsmouth put a desperate run of form behind them to boost their hopes of Championship survival with a gritty 1-1 draw at an in-form Norwich side.
An 84th-minute own goal from Pelle Mattsson earned… [+1985 chars]