The Bitter Lesson of LLM Extensions
Three years ago, “using an LLM” meant pasting a wall of text into a chat box and hoping for something useful back. Today, we point agents at our codebases, our browsers, and let them go off and act on our behalf. A key question that has been brewing under the surface during this time has […]
TSMC Arizona Outage Saw Fab Halt, Apple Wafers Scrapped

Good Evening from Taipei, A power outage at an industrial gas facility servicing TSMC interrupted manufacturing at the company’s Fab 21 in Arizona late last quarter, sources told me. The incident stopped the flow of crucial inputs needed for chipmaking, forcing the facility to shut down for at least a few hours, I was told. […]
Mind-reading devices can now predict preconscious thoughts

Before a car crash in 2008 left her paralysed from the neck down, Nancy Smith enjoyed playing the piano. Years later, Smith started making music again, thanks to an implant that recorded and analysed her brain activity. When she imagined playing an on-screen keyboard, her brain–computer interface (BCI) translated her thoughts into keystrokes — and […]
Corvus Robotics (YC S18): Hiring Head of Mfg/Ops, Next Door to YC Mountain View
Corvus Robotics is scaling the largest autonomous logistics data capture fleet ever built. If you’re allergic to leaded solder, actual revenue, spreadsheets, or ambiguity — this role is not for you. More “cardboard boxes,” less “Pelican cases.” Our fleet of flying warehouse drones is 5x-ing in 2026, and I’m looking for a generalist ex-founder or […]
X Just Accidentally Exposed a Covert Influence Network Targeting Americans

How a new X feature led to the most sweeping public exposure of covert foreign activity on a major platform since 2016. A new feature on X has revealed that a huge number of large, divisive political accounts claiming to be Trump supporters are actually operating out of foreign countries. The discovery — likely the […]
SHA1-Hulud the Second Comming – Postman, Zapier, PostHog All Compromised via NPM

It’s another Monday morning, sitting down at the computer. And I see a stack of alerts from the last hour of packages showing signs of malware in our triage queue. Having not yet finished my first cup of coffee, I see Shai Hulud indicators. Yikes, surely that’s a false positive? Nope, welcome to Monday, Shai […]
Show HN: Cynthia – Reliably play MIDI music files – MIT / Portable / Windows

Reliably play midi music files from a folder or “.m3u” play list. Adjust playback speed, volume and output device on-the-fly during playback. A large playback progress bar makes jumping forward and backward in time a breeze with just a single click or tap. Supports “.mid”, “.midi” and “.rmi” files in format 0 (single track) and […]
Fast Lua runtime written in Rust

— Create a new server local server = require(“http”).server.new() — Register a route server:get(“/”, function() return “hello from default Astra instance!” end) — You can also use the local variables within routes local counter = 0 server:get(“https://astra.arkforge.net/count”, function(request, response) — consume the request body print(request:body():text()) — set header code (Optional) response:set_status_code(300) — set headers (Optional) […]
NSA and IETF, part 3: Dodging the issues at hand
cr.yp.to: 2025.11.23: NSA and IETF, part 3 Table of contents (Access-I for index page) 2025.11.23: NSA and IETF, part 4: An example of censored dissent. #pqcrypto #hybrids #nsa #ietf #scope 2025.11.23: NSA and IETF, part 3: Dodging the issues at hand. #pqcrypto #hybrids #nsa #ietf #dodging 2025.11.23: NSA and IETF, part 2: Corruption continues. #pqcrypto […]
General principles for the use of AI at CERN
Artificial intelligence (AI) can be found at CERN in many contexts: embedded in devices, software products and cloud services procured by CERN, brought on-site by individuals or developed in-house. Following the approval of a CERN-wide AI strategy, these general principles are designed to promote the responsible and ethical use, development and deployment (collectively “use”) of […]