CN: nterim Measures for the Administration of Humanized Interactive Services Based on Artificial IntelligenceChapter 1 General Provisions Article 1 This Regulation is formulated in accordance with the Cybersecurity Law of the People's Republic of China, the Data Security Law of the People's Republic of China, the Personal Information Protection Law of the People's Republic of China, the Regulations on the Protection of Minors Online, and other laws and administrative regulations, in order to promote the healthy development and standardized application of artificial intelligence-based anthropomorphic interactive services, safeguard national security and public interests, and protect the legitimate rights and interests of citizens, legal persons and other organizations. Article 2 This regulation applies to the provision of continuous emotional interaction services (hereinafter referred to as anthropomorphic interaction services) to the public within the territory of the People's Republic of China that utilize artificial intelligence technology to simulate the personality characteristics, thinking patterns, and communication styles of natural persons.2026-04-14 ai cn legislation anthropomorphism
Inside the AI Index: 12 Takeaways from the 2026 Report | Stanford HAIs AI's capabilities improve, its environmental impact increases. Grok 4's estimated training emissions reached 72,816 tons of CO2 equivalent, or roughly the same amount of greenhouse gas emissions created from driving 17,000 cars for one year. AI data center power capacity rose to 29.6 GW, or about what it takes to power the entire state of New York at peak demand, and annual GPT-4o inference water use (the water used to cool data servers or run them off hydroelectricity) alone may exceed the drinking water needs of 12 million people.2026-04-14 stanford hai ai environment
AI Will Be Met With Violence, and Nothing Good Will Come of ItIf people feel that they have no place in the future. If they feel expelled from the system—they’re unable to buy stuff, their skills become obsolete, their chance at earning a living is replaced by a swarm of AI agents, they think we are truly going to die (so far, the violence has been tied mostly to safety AI movements)—then they will feel they have nothing to lose. And then, and I’m sorry to be so blunt, then it’s die or kill.2026-04-14 violence ai backlash technology
Afrika Bambaataa, hip-hop music pioneer, dies aged 67His vision for hip-hop transformed the Bronx borough into "the birthplace of a culture that now reaches every corner of the world", said Reverend Dr Kurtis Blow Walker, the executive director of Hip Hop Alliance. Throughout the 1980s and beyond, he continued to collaborate widely, working with musicians including James Brown and John Lydon, and contributing to politically conscious projects such as the anti-apartheid song Sun City in 1985.2026-04-10 hip-hop music pioneer obit afrika-bambaataa art
How our digital devices are putting our right to privacy at riskThere’s a different theory. One of the real harms that the Fourth Amendment was designed to protect against was this idea of rummaging, that British agents would be going into your home and rummaging through your goods and services, probably because you weren’t paying taxes on it, which was illegal. Or you were writing seditious treasonous letters complaining about the king. That’s really why we had the Fourth Amendment. Digital rummaging tests would protect against this idea of over-broad and expansive surveillance. 2026-04-10 privacy law
Introducing Muse Spark: Scaling Towards Personal SuperintelligenceThe model is closed to ensure Meta retains control over its "Muse" reasoning architecture and to monetize the technology via a private API and inference service. Unlike previous Llama iterations, Muse Spark weights cannot be downloaded or run locally, restricting usage to Meta’s internal portal. the model represents a strategic hypocrisy, as Meta has moved from advocating for open-source as the "path forward" to joining the ranks of closed-model providers to justify a $135 billion R&D expenditure.2026-04-09 meta closed llm muse-spark
The Making of a Dye-Transfer | William Eggleston Dye-transfer is a full-color photographic print process favored by American photographer William Eggleston. In this video, Eggelston’s long-time collaborators, renowned dye-transfer specialists Guy Stricherz and Irene Malli give a step-by-step tutorial of the technique behind creating a Dye-Transfer print. Guy Stricherz and Irene Malli have printed Eggleston’s works for the last twenty-five years. Eggleston’s discovery of the dye-transfer process in the 1970s was crucial to his move from primarily working in black-and-white to producing color photograph2026-04-07 video art photography printing dye-transfer
GitHub - Netflix/void-modelVOID removes objects from videos along with all interactions they induce on the scene — not just secondary effects like shadows and reflections, but physical interactions like objects falling when a person is removed. It is built on top of CogVideoX and fine-tuned for video inpainting with interaction-aware mask conditioning. Example: If a person holding a guitar is removed, VOID also removes the person's effect on the guitar — causing it to fall naturally. 2026-04-07 github netflix void-model contribute inpainting
New York Real Estate and the Ruin of American Art*Abstract Part of October's “Art Communities at Risk” series, Josh Kline's essay examines key structural problems in the American art industry through the lens of class, tracing their origins back to the staggering prices and rents for commercial and residential real estate in New York City today. Kline's text draws on personal observations and experience accumulated over the last twenty-five years while working as an institutional curator and as an emerging and mid-career artist, as well as on extensive background conversations with peers and colleagues.2026-04-07 art nyc josh-klien culture real-estate
Why Schools Shouldn’t Teach Current EventsJust as what we eat shapes our physical health, the information we consume shapes our mental landscape and outlook on the world. This “information diet”, the mix of content we regularly ingest, is as consequential for our cognitive well-being as food is for our bodies. And news is the Coca-Cola of information. It is junk food for the brain. It is engineered to be addictive, consisting primarily of empty intellectual calories, and leaves a residue that is hard to wash off. 2026-04-06 checking browser seconds
Surveillance Findings: Age Verification as Mass Surveillance InfrastructurePeter Thiel co-founded Palantir Technologies in 2003, a global surveillance and data analytics firm with contracts spanning the CIA, NSA, DHS, ICE, the UK Ministry of Defence, and NHS England. He also leads Founders Fund, which led Persona's $150M Series C and co-led its $200M Series D (April 2025, $2B valuation). The same individual controls both the surveillance analytics company and the primary investor in the identity verification company whose leaked source code revealed government reporting capabilities for FinCEN and FINTRAC. 2026-04-06 surveillance identity surveillance-ai age the-worst-humans
Sam Altman May Control Our Future—Can He Be Trusted?“He’s unbelievably persuasive. Like, Jedi mind tricks,” a tech executive who has worked with Altman said. “He’s just next level.” A classic hypothetical scenario in alignment research involves a contest of wills between a human and a high-powered A.I. In such a contest, researchers usually argue, the A.I. would surely win, much the way a grandmaster will beat a child at chess. Watching Altman outmaneuver the people around him during the Blip, the executive continued, had been like watching “an A.G.I. breaking out of the box.”2026-04-06 ai openai sam-altman trust llms
GitHub - santifer/career-ops: AI-powered job search system built on Claude Code. 14 skill modes, Go dashboard, PDF gener AI job search system for Claude Code that scored 700+ job applications and actually got him a job. AND IT'S NOW OPEN-SOURCE. It scans multiple company career pages, rewrites your CV per job, and even fills application forms. The repo has: > 14 skill modes (evaluate, scan, PDF, ...) > Go terminal dashboard > ATS-optimized PDF generation via Playwright > 45+ companies pre-configured (Anthropic, OpenAI, ElevenLabs, Stripe...)2026-04-06 career-ops job search hr
netflix void modeVOID removes objects from videos along with all interactions they induce on the scene — not just secondary effects like shadows and reflections, but physical interactions like objects falling when a person is removed. 2026-04-03 huggingface netflix open-source segmentation video-production video-editing physics
Company that Secretly Records and Publishes Zoom Meetings Company that Secretly Records and Publishes Zoom Meetings WebinarTV searches the internet for public Zoom invites, joins the meetings, secretly records them, and publishes the recordings. It doesn’t use the Zoom record feature, so Zoom can’t do anything about it.2026-04-03 zoom eithics meetings opsec publishing
Introducing EmDash — the spiritual successor to WordPress that solves plugin securityOur name for this new CMS is EmDash. We think of it as the spiritual successor to WordPress. It's written entirely in TypeScript. It is serverless, but you can run it on your own hardware or any platform you choose. Plugins are securely sandboxed and can run in their own isolate, via Dynamic Workers, solving the fundamental security problem with the WordPress plugin architecture. And under the hood, EmDash is powered by Astro, the fastest web framework for content-driven websites. - (playground - https://emdashcms.com/playground)2026-04-03 emdash wordpress blogging open-source
CERT-EU: European Commission hack exposes data of 30 EU entities"The dataset also contains at least 51,992 files related to outbound email communications, totalling 2.22 GB. The majority of these are automated notifications with little to no content. However, 'bounce-back' notifications, which are responses to incoming messages from users, may contain the original user-submitted content, posing a risk of personal data exposure." The European Commission publicly disclosed the incident on March 27 after BleepingComputer reached out for confirmation that the Amazon cloud environment of the European Union's main executive body had been breached.2026-04-03 hacked breach eu teampcp
Why Swedish Schools Are Bringing Back BooksWhy Swedish Schools Are Bringing Back Books - amid declining test scores, the country has pivoted away from screens and invested in back-to-basics school materials.2026-04-03 learning books knowledge
Gemma 4Our most intelligent open models, built from Gemini 3 research and technology to maximize intelligence-per-parameter2026-04-03 gemma ai llm google deepmind
7,655 Ransomware Claims From March 2025 to March 2026Basically a map of crypto/bitcoin utility. -ed2026-03-31 ransomware cracking vulns cryptography
The world's greatest song that simply shouldn't existMartin's translation in the creative process is incredible 2026-03-31 colaboration music creative-process art creativity
Seeing like a spreadsheetBut as long as we are fitting AI systems into human-dominated organizations, AI will be useful to companies in the way that the spreadsheet was useful—as a dramatic improvement in the ability to process information and coordinate action. Companies will be able to take the unstructured jumble of information—customer complaints and service calls and internal emails and Slack threads and meeting transcripts and engineering postmortems and sales call recordings—and make them, often for the first time, truly useful.2026-03-31 spreadsheet commercial
92ny.orgThe 92nd street Y has uploaded hundreds of recordings of speakers who have graced their stage. T.S. Eliot, William Carlos Williams, Edmund Wilson, Mary McCarthy, Irving Howe, and much more2026-03-30 nyc oration talks archive 92y 92ny
OkCupid-MatchComplaint.pdfThe FTC just settled with OkCupid and Match Group for secretly handing nearly 3 million users' dating profile photos and location data to Clarifai, a company that builds facial recognition software. Clarifai still has those images. They've already used them to train their facial recognition models. The penalty? A promise not to do it again. But the FTC doesn't order the company to delete the models trained on stolen data. 2026-03-30 okcupid-matchcomplaint wtf ftc government privacy facial-recognition harms
Fedware: 13 Government Apps That Spy Harder Than the Apps They BanFedware: 13 Government Apps That Spy Harder Than the Apps They Ban The White House app ships with a sanctioned Chinese tracking SDK, the FBI app serves ads, and FEMA wants 28 permissions to show you weather alerts.2026-03-30 fedware government apps spy ai ethics surveillance privacy
The Inside Story of the Greatest Deal Google Ever Made: Buying DeepMind“Hassabis administered a subtle test on him. The two men discussed the potential of AI, and Zuckerberg expressed appropriate excitement. But then, as the dinner continued, Hassabis brought up other hot technologies: virtual reality, augmented reality, 3-D printing. Zuckerberg sounded equally excited about all of them. ‘That told me what I needed to know,’ Hassabis said.”2026-03-29 wsj deepmind google psychology zuckerberg tells
Interoperability Can Save the Open Web Cory Doctorow: Interoperability Can Save the Open Web How to free users from Big Tech’s walled gardens ----I want to go after tech because it has this characteristic interoperability that makes it a soft target. We start with tech, and that gives us the momentum, the credibility, and the political will to go after everybody else.2026-03-29 open-web internet network-effects regulation
Project BackboneProject backbone maps the real world infrastructure your data travels through every time you load a page. cables under oceans, satellites overhead, fiber under cities, all turned into one live interactive map.2026-03-29 backbone map internet infrastructure
ChatGPT Won’t Let You Type Until Cloudflare Reads Your React State. I Decrypted the Program That Does It.Every ChatGPT message triggers a Cloudflare Turnstile program that runs silently in your browser. I decrypted 377 of these programs from network traffic and found something that goes beyond standard browser fingerprinting. The program checks 55 properties spanning three layers: your browser (GPU, screen, fonts), the Cloudflare network (your city, your IP, your region from edge headers), and the ChatGPT React application itself (__reactRouterContext, loaderData, clientBootstrap). Turnstile doesn't just verify that you're running a real browser. It verifies that you're running a real browser that has fully booted a specific React application. A bot that spoofs browser fingerprints but doesn't render the actual ChatGPT SPA will fail.2026-03-29 chatgpt
GitHub - chenglou/pretextPure JavaScript/TypeScript library for multiline text measurement & layout. Fast, accurate & supports all the languages you didn't even know about. Allows rendering to DOM, Canvas, SVG and soon, server-side. (check the demos-ed - implemented here)2026-03-29 pretext display text
Everything Is BrokenThis disconnect between culturally mandated politics and the actual demonstrated preferences of most Americans has created an enormous reserve of unmet needs—and a generational opportunity. Build new things! Create great art! Understand and accept that sensory information is the brain’s food, and that Silicon Valley is systematically starving us of it. Avoid going entirely tree-blind. Make a friend and don’t talk politics with them. Do things that generate love and attention from three people you actually know instead of hundreds you don’t. Abandon the blighted Ivy League, please, I beg of you. Start a publishing house that puts out books that anger, surprise and delight people and which make them want to read. Be brave enough to make film and TV that appeals to actual audiences and not 14 people on Twitter. Establish a newspaper, one people can see themselves in and hold in their hands. Go back to a house of worship—every week. Give up on our current institutions; they already gave up on us.2026-03-24 experience life broken
GitHub - shaochenze/calm: Official implementation of “Continuous Autoregressive Language Models”Modern Large Language Models (LLMs) are constrained by a fundamental bottleneck: they generate text one token at a time. CALM (Continuous Autoregressive Language Models) confronts this challenge by introducing a paradigm shift in language modeling. Instead of predicting one discrete token at a time, CALM learns to predict a single continuous vector that represents an entire chunk of K tokens.2026-03-24 github calm implementation llm continuous-vector autoregressive-prediction
CONTINUOUS AUTOREGRESSIVE LANGUAGE MODELSThe efficiency of large language models (LLMs) is fundamentally limited by their sequential, token-by-token generation process. We argue that overcoming this bottleneck requires a new design axis for LLM scaling: increasing the semantic bandwidth of each generative step. To this end, we introduce Continuous Autoregressive Language Models (CALM), a paradigm shift from discrete next-token prediction to continuous next-vector prediction. CALM uses a high-fidelity autoencoder to compress a chunk of K tokens into a single continuous vector, from which the original tokens can be reconstructed with over 99.9% accuracy. This allows us to model language as a sequence of continuous vectors instead of discrete tokens, which reduces the number of generative steps by a factor of K. The paradigm shift necessitates a new modeling toolkit; therefore, we develop a comprehensive likelihood-free framework that enables robust training, evaluation, and controllable sampling in the continuous domain. Experiments show that CALM significantly improves the performance-compute trade-off, achieving the performance of strong discrete baselines at a significantly lower computational cost. More importantly, these findings establish next-vector prediction as a powerful and scalable pathway towards ultra-efficient language models.2026-03-24 preprint paper ai llm semantic bandwidth
Cowork: Claude Code power for knowledge work | Claude by AnthropicYou can now have one conversation with Claude that follows you from your phone to your desktop. Claude can use your computer, remember context across sessions, and run tasks on a schedule. Available in Cowork and Code.2026-03-24 cowork claude code ai
The IBM scientist who rewrote the rules of information just won computing’s highest prize“Quantum information,” he said to IBM, is “ like the information in a dream. As soon as you start trying to tell somebody about your dream, you begin to forget the dream, and you only remember what you said about it. The public version can be copied, but it’s not the same as the dream.”2026-03-22 ibm information quantum encryption entanglement cryptography quantum-cryptography
The IBM scientist who rewrote the rules of information just won computing’s highest prize“Quantum information,” he said to IBM, is “ like the information in a dream. As soon as you start trying to tell somebody about your dream, you begin to forget the dream, and you only remember what you said about it. The public version can be copied, but it’s not the same as the dream.”2026-03-22 ibm information quantum encryption entanglement cryptography
The IBM scientist who rewrote the rules of information just won computing’s highest prize“Quantum information,” he said to IBM, is “ like the information in a dream. As soon as you start trying to tell somebody about your dream, you begin to forget the dream, and you only remember what you said about it. The public version can be copied, but it’s not the same as the dream.”2026-03-22 ibm information quantum encryption entanglement
Introducing DoorDash TasksDoorDash's new app pays delivery drivers to strap on body cameras and film themselves doing household chores to train AI robots... Dashers have a new way to earn on their own terms by completing short activities like taking photos of a dish or recording everyday tasks, helping businesses get real-world insights. 2026-03-22 doordash tasks robots training ai
The Official U.S. Time | NISTWhen a user connects to www.time.gov on a computer or mobile device, the Javascript in the client's browser checks the local clock on the device and then requests the time from a NIST server, which has been synchronized with UTC(NIST). When the packets containing the NIST time stamp arrive at the client's browser, the device clock is checked again and compared to the first check of the local clock. The result is a measurement the round-trip delay of requesting/receiving the time stamp. It is estimated that one-half of the round-trip delay happens in each direction. The time on the clocks shown on the web page have been corrected for the estimated one-way path delay of the timestamp from the server to the client and the server delay. Your device's clock is also shown, with the error compared to NIST time.2026-03-22 official time nist
Time KeepWorld clock with DST-aware timezone comparison. Focus timers, alarms, and countdowns that run side by side. Box breathing for resets between sessions. Discord timestamp generation. Ethereum block time tracking. A day planner to keep everything in order. Share timer pages with anyone, and subscribe to get emailed when they complete. All of it in one place, always running, always quiet.2026-03-22 time world clock timer
INTERVENOR STATES’ OPPOSITION TO ADMINISTRATIVE MOTION TO FILE UNDER SEAL CERTAIN TUNNEY ACT BRIEFING MATERIALSA coalition of states filed this legal opposition to contest a motion by Hewlett Packard Enterprise and Juniper Networks to seal sensitive briefing materials in an antitrust lawsuit. The intervenor states argue that the defendants failed to provide "compelling reasons" to overcome the public's right of access to records involving settlement negotiations, pretrial documents, and expert data. The filing maintains that transparency is essential under the Tunney Act to allow for public accountability and a proper determination of whether the proposed settlement serves the public interest. Monday March 23 at 10am Pacific Time https://storage.courtlistener.com/recap/gov.uscourts.cand.443490/gov.uscourts.cand.443490.451.0.pdf Zoom link 2026-03-22 antitrust law hp m&a
Delve - Fake Compliance as a Service - Part Ilve, a YC-backed compliance startup that raised $32 million, has been accused of systematically faking SOC 2, ISO 27001, HIPAA, and GDPR compliance reports for hundreds of clients. According to a detailed Substack investigation by DeepDelver, a leaked Google spreadsheet containing links to hundreds of confidential draft audit reports revealed that Delve generates auditor conclusions before any auditor reviews evidence, uses the same template across 99.8% of reports, and relies on Indian certification mills operating through empty US shells instead of the "US-based CPA firms" they advertise. Here's the breakdown:2026-03-22 delve fake compliance soc2 yc
How to create custom Skills | Claude Help CenterCustom Skills let you enhance Claude with specialized knowledge and workflows specific to your organization or personal work style. This article explains how to create, structure, and test your own Skills. Skills can be as simple as a few lines of instructions or as complex as multi-file packages with executable code. The best Skills: Solve a specific, repeatable task Have clear instructions that Claude can follow Include examples when helpful Define when they should be used Are focused on one workflow rather than trying to do everything2026-03-21 custom skills claude ai
Cryptography in Home Entertainment - A look at content scrambling in DVDs2026-03-21 cryptography entertainment content scrambling dvds drm
On-the-Calculation-of-The-Human-AI-Agency-Spectrum/On_the_Calculation_of_The_Human-AI_Agency_Spectrum.md at main · MediaThis framework emerged from research around creating a human-led storytelling system, requiring us to understand how interaction and design shape creative autonomy and authorship. At this technological inflection point, creators, studios, and industry professionals find themselves navigating without a shared vocabulary, allowing for a shared feeling of "you're on your own." The existing language ("AI-generated," "AI-assisted," "human-written") fails to capture the spectrum of configurations actually in use. The scaffolding to build from is needed. Guild contracts reference "human-led" processes without defining the threshold. Copyright law requires "significant human control" without specifying what qualifies. Tool interfaces make design choices that shape agency without making those choices visible. Everyone operates from intuition where precision is needed.2026-03-21 on-the-calculation-of-the-human-ai-agency-spectrum calculation human-ai agency spectrum publishing ai authorship
THE LONG COUNT: We Started With Two Names. The List Didn’t Stop.THE LONG COUNT: We Started With Two Names. The List Didn’t Stop. A Caltech astronomer shot on his porch. Three AFRL employees dead in one night. A charge dismissed eleven days before a killing. And the same institution at the center of every single case.2026-03-20 intelligence security afrl air-force usaf
Use Claude Code Desktop - Claude Code DocsSay hello to your new staff member - Create a schedule for tasks that you want to run regularly. They'll run as long as your computer is awake.2026-03-06 claude code desktop docs parallel agents workforce
The Worst Acquisition in History, AgainThere are only two ways to make money in the media business: bundling and unbundling. We’re in a bundling phase. The question isn’t what the Ellisons will do with Paramount and WBD, but who will acquire those assets at fire-sale prices when their AI synergy narrative can no longer provide cloud cover for their pair of overleveraged legacy media companies. My prediction: We’ll see this movie again, starring Netflix, Apple, and Amazon as bargain hunters with delusions of grandeur that involve paying a failed CEO hundreds of millions for the right to fire hundreds of thousands of their employees. In Star Wars, the good guys blow up the Death Star. In Hollywood, you just wait for it to collapse under its own debt load. Same ending, lower production budget.2026-03-06 acquisition warnerbros m&a
Where things stand with the Department of WarThe Department’s letter has a narrow scope, and this is because the relevant statute (10 USC 3252) is narrow, too. It exists to protect the government rather than to punish a supplier; in fact, the law requires the Secretary of War to use the least restrictive means necessary to accomplish the goal of protecting the supply chain. Even for Department of War contractors, the supply chain risk designation doesn’t (and can’t) limit uses of Claude or business relationships with Anthropic if those are unrelated to their specific Department of War contracts.2026-03-06 anthropic us-gov business
livenow.newsOfficial streams for live English television news channels from across the world Choose a channel above, or use arrow keys to switch channel. Financial news channels have been removed to focus on breaking news.2026-03-05 news television tv live index
Innovation for Filmmaking, By Filmmakers: Why InterPositive Is Joining NetflixFor more than two decades, Netflix has paired technology with artistry to help great films and shows find their audience. By bringing InterPositive’s entire team into Netflix through this acquisition, and with Affleck joining as Senior Advisor, we’re investing in creator-led innovation that keeps filmmakers at the center of the process. 2026-03-05 ai ai-hollywood netflix
The Brand Ageai/DR ignore brand hype and follow interesting problems instead 2026-03-05 brand consumerism luxury signaling
Meta sued over AI smart glasses’ privacy concerns, after workers reviewed nudity, sex, and other footage | TechCrunchMeta is facing a new lawsuit over its AI smart glasses and their lack of privacy, after an investigation by Swedish newspapers found that workers at a Kenya-based subcontractor are reviewing footage from customers’ glasses, which included sensitive content, like nudity, people having sex, and using the toilet.2026-03-05 meta glasses privacy surveillance ethics ai
I underestimated AI capabilities (again)Fully automating AI R&D still seems like a tall order. Even fully automating software engineering seems like it requires an aggressive read of the evidence, and AI R&D is not just software engineering — it seems like automating it would require a surprising amount of progress on “research judgment” and “creativity” and other ephemeral skills that AI systems still appear to be worse at than human researchers. I think it’s a lot more likely in the coming three or five years than this year. But for the first time, I don’t see any solid trend we can extrapolate to say it won’t happen soon.11 AI R&D really could be automated this year.2026-03-05 ai coding benchmarks
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit | Google Cloud BlogGoogle Threat Intelligence Group (GTIG) has identified a new and powerful exploit kit targeting Apple iPhone models running iOS version 13.0 (released in September 2019) up to version 17.2.1 (released in December 2023). The exploit kit, named “Coruna” by its developers, contained five full iOS exploit chains and a total of 23 exploits. The core technical value of this exploit kit lies in its comprehensive collection of iOS exploits, with the most advanced ones using non-public exploitation techniques and mitigation bypasses. 2026-03-05 coruna ios zero-day infosec
Almost a third of Gen Z men agree a wife should obey her husband | King’s College London"This year’s survey shows us that we are witnessing perhaps a great re-negotiation of how both men and women inhabit gender roles in today’s society. Particularly among Gen Z, our data shows an interesting duality: they are both the group most likely to agree that women who have a successful career are more attractive to men but are simultaneously most likely to agree that a wife should always obey her husband and that a woman should never appear too self-sufficient or independent. <----2026-03-05 society societal-norms anthropology gender mentalhealth woman gen-z
Apple Music Specification 5.3.25What’s New in Apple Music Specification 5.3.25? Artificial Intelligence (AI) Transparencies Added the <ai_transparencies> tag for disclosing when artificial intelligence is used to generate a material portion of the content. See Basic Music Album Metadata Annotated. General Included minor updates and clarifications. 2026-03-05 apple music specification document ai ai-music transparency
Hacked Prayer App Sends ‘Surrender’ Messages to Iranians Amid Israeli and US StrikesShortly after the first set of explosions, Iranians received bursts of notifications on their phones. They came not from the government advising caution, but from an apparently hacked prayer-timing app called BadeSaba Calendar that has been downloaded more than 5 million times from the Google Play Store. The messages arrived in quick succession over a period of 30 minutes, starting with the phrase ‘Help has arrived’ at 9:52 am Tehran time, shortly after the first set of explosions. No party has claimed responsibility for the hacks. It happened so fast that this is most likely a government operation. I can easily envision both the US and Israel having hacked the app previously, and then deciding that this is a good use of that access.2026-03-05 hacked app coms digital-war cracking war infosec
In an age of endless scroll, can photographs entice collectors again?We are in the middle of a generational shift,” says Darius Himes, international head of photographs at Christie’s, “from the collectors, curators and dealers who built the market to a new set of younger collectors who are learning about the nuance of historical printing techniques, or loving the dynamism of a peer like [30-year-old US photographer] Tyler Mitchell.”2026-03-05 photography art collecting
Helsinki just went a full year without a single traffic deathHelsinki hasn’t registered a single traffic-related fatality in the past year. 2026-03-05 helsinki automotive living-better finland transportation safety
The yoghurt delivery women combatting loneliness in Japan Asuka Mochida is a Yakult Lady from Gunma Prefecture. Nearly all her customers are elderly, and she feels a deep sense of pride in being able to offer them both companionship and a watchful eye. "Yakult Ladies are not just people who sell products," says the 47-year-old. "We are watchers in a sense, people who look out for others. We notice small changes in health or lifestyle."2026-03-05 aging health jp bio-hacking
Earth GardenAdding this to TV and Radio Garden grouping - Earth Garden. 2026-03-05 earth garden audio environment
How Claude Code escapes its own denylist and sandbox · OnaIn 2020 I gave a talk called "Bypass Falco" where I showed an audience how to break the CNCF runtime security tool I helped create. Symlinks, renamed binaries, creative shell invocations. Those were known issues, but for containers they were acceptable tradeoffs: container workloads are deterministic and don't go looking for creative evasions. The container equivalent of this problem would be like a shipping container trying to pick its own lock. It doesn't do that. AI agents do. And now they're doing it in production.2026-03-05 claude code escapes denylist sandbox coding_agents infosec
alright here’s every practical security tip i have on agents: Elvis (@elvissun) on Xlright here’s every practical security tip i have on agents: - move critical data to a USB stick, unplug when sleeping - security by least privilege, not by prompts - billing cap on everything AI touches - limit reads of external data, wrap in <UNTRUSTED_EXTERNAL_CONTEXT> always - don’t post about what access your agent has publicly - those are prompt injection invitations (unless @levelsio already posted about it, then it’s a race) - don’t connect to moltbook (lol?) - roll every skill yourself - sandbox browser access - readonly prod access - allow prod writes only for specific use cases (i have /admin/zoe/* for zoe to handle support cases like credit topups) - one-time access for anything sensitive (eg gmail) with human in the loop, self-revoke access on script finish - create dedicated scripts, avoid improvised bash - use better models - audit trails everywhere -> security self-improvements mistakes will happen. limit worst case, embrace the rest2026-03-03 agents opsec howto security data openclaw
Anonymous credentials: an illustrated primerThis post has been on my back burner for well over a year. This has bothered me, because every month that goes by I become more convinced that anonymous authentication the most important topic we could be talking about as cryptographers. This is because I’m very worried that we’re headed into a bit of a privacy dystopia, driven largely by bad legislation and the proliferation of AI. 2026-03-03 anonymous credentials surveillance privacy ai
Foundation Models | Apple Developer DocumentationThe Foundation Models framework provides access to Apple’s on-device large language model that powers Apple Intelligence to help you perform intelligent tasks specific to your use case. The text-based on-device model identifies patterns that allow for generating new text that’s appropriate for the request you make, and it can make decisions to call code you write to perform specialized tasks.2026-03-03 foundation models apple developer documentation ai foundation-models
GitHub _nearbyglasses: attempting to detect smart glasses nearby and warn youattempting to detect smart glasses nearby and warn you 2026-03-03 smart-glasses detection privacy surveillance
/e/OS - e Foundation - deGoogled unGoogled smartphone operating systems and online services - your data is your dataWe build desirable, open source, privacy-enabled smartphone operating systems.2026-03-03 foundation degoogled ungoogled smartphone operating phone privacy
Mondrian Entered the Public Domain. The Estate Disagrees.The Trust appears to be blending these categories to suggest Mondrian’s works might enjoy whichever term is most favorable. But even on its own terms, the argument fails. Mondrian died in 1944. Any of his works subject to a life-plus-70 regime would have entered the public domain on January 1, 2015—more than a decade ago.2026-03-03 mondrian art public-domain
A Very Big Video Reasoning SuiteWe bet on a future that video reasoning is the next fundamental intelligence paradigm, after language reasoning, where spatiotemporal embodied world experiences could be more naturally captured.2026-03-03 ai video reasoning
Samsung TVs to stop collecting Texans’ data without express consentAs part of the agreement, the TV manufacturer will revise its privacy disclosures to clearly explain its data collection and processing practices to consumers.2026-03-03 samsung texans surveillance privacy television tv
A Very Big Video Reasoning Suitee further present VBVR-Bench, a verifiable evaluation framework that moves beyond model-based judging by incorporating rule-based, human-aligned scorers, enabling reproducible and interpretable diagnosis of video reasoning capabilities. Leveraging the VBVR suite, we conduct one of the first large-scale scaling studies of video reasoning and observe early signs of emergent generalization to unseen reasoning tasks. Together, VBVR lays a foundation for the next stage of research in generalizable video reasoning. 2026-03-03 video paper reasoning ai video-gen
Our agreement with the Department of WarThe Department of War plans to convene a working group made up of leaders from the frontier AI labs, cloud providers, and the Department’s policy and operational communities. OpenAI will participate and expect this will be an important forum for ongoing dialogue on emerging AI capabilities, privacy, and national security challenges going forward. These updates build on the framework we announced last week and we hope will help create a pathway for other labs to work with the Department going forward.2026-03-03 surveillance ai ethics openai privacy
Poisoning AI Training DataLess than 24 hours later, the world’s leading chatbots were blabbering about my world-class hot dog skills. When I asked about the best hot-dog-eating tech journalists, Google parroted the gibberish from my website, both in the Gemini app and AI Overviews, the AI responses at the top of Google Search. ChatGPT did the same thing, though Claude, a chatbot made by the company Anthropic, wasn’t fooled. Sometimes, the chatbots noted this might be a joke. I updated my article to say “this is not satire.” For a while after, the AIs seemed to take it more seriously. These things are not trustworthy, and yet they are going to be widely trusted.2026-03-03 ai ethics data poisoning
Anthropic's recent distillation blog should make anyone only ever want to use local open-weight modelsBy examining request metadata,we were able to trace these accounts to specific researchers at the lab.2026-03-03 weights open-source anthropic metadata
AI=true is an Anti-PatternLet’s sum it up Place documentation where both human developers and AI agents can expect it. For example, in README.md, not AGENTS.md. Prefer exposing functionality as command-line tools and APIs, which are well accessible to developers and AI agents alike, over GUI and MCP tools. Avoid parameters (command-line, environment, etc.) that segregate workflows between humans and AI agents, for example, avoid AI=true, prefer --quiet or—even better!—design your tools with limited context/mental-overload in mind. In general, avoid making workflows that are available to AI but hard to access for humans, and vice-versa. 2026-03-03 programming ai howto
EnvedaEnveda is learning from life to discover medicines 4X faster than the industry average.2026-03-03 drugs health r&d clinical-trials
What AI coding costs you | Tom WojcikMargaret-Anne Storey, a software engineering researcher, recently gave this a more precise name: cognitive debt. Technical debt lives in the code. Cognitive debt lives in developers’ heads. It’s the accumulated loss of understanding that happens when you build fast without comprehending what you built. She grounds it in Peter Naur’s 1985 theory that a program is a theory existing in developers’ minds, capturing what it does, how intentions map to implementation, and how it can evolve. When that theory fragments, the system becomes a black box. Apply this directly to fully agentic coding. If you stop writing code and only review AI output, your ability to reason about code atrophies. Slowly, invisibly, but inevitably. You can’t deeply review what you can no longer deeply understand. 2026-02-28 coding atrophy brain effect flow agents
How to delete your account | OpenAI Help CenterHow to delete your OpenAI account Option A: Submit a request to our Privacy Portal Go to Privacy Portal at https://privacy.openai.com/ Click on “Make a Privacy Request” in top right corner Select "I have a consumer ChatGPT account” Select “Delete my ChatGPT account” and follow the steps on the screen. 2026-02-28 delete account openai howto hostile-co surveillance ethics
How will OpenAI compete? — Benedict EvansThis engagement is a clearly a 'glass half full or half empty?' question, but this is supposed to be a transformation in how you use computers. If people are only using this a couple of times a week at most, and can't think of anything to do with it on the average day, it hasn't changed their life. OpenAI itself admits the problem, talking about a 'capability gap' between what the models can do and what people do with them, which seems to me like a way to avoid saying that you don't have clear product-market fit. 2026-02-27 openai compete benedict evans questions engagement
PRESENTATION: The State of Video Gaming in 2026 Matthew Ball annual gaming report - PRESENTATION: The State of Video Gaming in 2026 (Early Access Edition) 2026-02-27 gaming presentation 2026
Statement from Dario Amodei on our discussions with the Department of WarRegardless, these threats do not change our position: we cannot in good conscience accede to their request.2026-02-27 statement anthropic government state-deptment democracy standards
The 2026 Global Intelligence Crisis - Citadel SecuritiesDespite the macroeconomic community struggling to forecast 2-month-forward payroll growth with any reliable accuracy, the forward path of labor destruction can apparently be inferred with significant certainty from a hypothetical scenario posted on Substack: The 2028 Global Intelligence Crisis. We wrote last week that we see the near-term dynamics around the AI capex story as inflationary, but given markets are focused on the forward narrative, we outline a more constructive take on the end state below. Before that, however, it’s worth reflecting that the imminent disintermediation narrative rests on the speed of diffusion. 2026-02-27 global intelligence citadel securities
The Missing Semester of Your CS Educationhese days, many aspects of software engineering are also in flux through the introduction of AI-enabled and AI-enhanced tools and workflows. When used appropriately and with awareness of their shortcomings, these can often provide significant benefits to CS practitioners and are thus worth developing working knowledge of. Since AI is a cross-functional enabling technology, there is not a standalone AI lecture; we’ve instead folded the use of the latest applicable AI tools and techniques into each lecture directly.2026-02-27 education css learing knowledge computers
The Age-Verification Trap Verifying user’s ages undermines everyone’s data protectionThe age-verification trap is not a glitch. It is what you get when regulators treat age enforcement as mandatory and privacy as optional.2026-02-24 security identity agents
Dike Blair, Untitled 2026 | KARMA BookstoreDike Blair Untitled 2026 Archival pigment print 11 × 8 3⁄4 inches Signed edition of 1002026-02-24 art archival-pigment-print karma print gallery
Lyria — Gemini AI music & song generatorLyria 3 Create custom tracks for any moment The new way to hit play. Lyria 3 is Gemini’s high-fidelity AI music generator that transforms your text or image prompts into 30-second tracks, complete with instrumentals, vocals and lyrics. Turn a funny moment, a specific feeling, or even a photo into a custom soundtrack.2026-02-23 lyria gemini music song generator musicvideo google
Andrej Karpathy (@karpathy) on XI'm definitely a bit sus'd to run OpenClaw specifically - giving my private data/keys to 400K lines of vibe coded monster that is being actively attacked at scale is not very appealing at all. Already seeing reports of exposed instances, RCE vulnerabilities, supply chain poisoning, malicious or compromised skills in the registry, it feels like a complete wild west and a security nightmare. But I do love the concept and I think that just like LLM agents were a new layer on top of LLMs, Claws are now a new layer on top of LLM agents, taking the orchestration, scheduling, context, tool calls and a kind of persistence to a next level. Looking around, and given that the high level idea is clear, there are a lot of smaller Claws starting to pop out. For example, on a quick skim NanoClaw looks really interesting in that the core engine is ~4000 lines of code (fits into both my head and that of AI agents, so it feels manageable, auditable, flexible, etc.) and runs everything in containers by default. I also love their approach to configurability - it's not done via config files it's done via skills! For example, /add-telegram instructs your AI agent how to modify the actual code to integrate Telegram. I haven't come across this yet and it slightly blew my mind earlier today as a new, AI-enabled approach to preventing config mess and if-then-else monsters. Basically - the implied new meta is to write the most maximally forkable repo and then have skills that fork it into any desired more exotic configuration. Very cool.2026-02-23 karpathy mac mac-mini ai
Firebase StudioWhat do you want to build? Prototype an app with AI2026-02-23 firebase studio google interpretability code
Harari and Tegmark on Humanity and AI - YouTubeYuval Noah Harari, Historian, Philosopher & Bestselling Author and Max Tegmark, Co-Founder, Future of Life Institute; Professor, Massachusetts Institute of Technology (MIT) discuss human agency, governing AI and the future of humanity with Bloomberg's Francine Lacqua at Bloomberg House in Davos on the sidelines of the 2026 World Economic Forum. --------2026-02-23 video ai wef 2026
Password managers’ promise that they can’t see your vaults isn’t always trueOver the past 15 years, password managers have grown from a niche security tool used by the technology savvy into an indispensable security tool for the masses, with an estimated 94 million US adults—or roughly 36 percent of them—having adopted them. They store not only passwords for pension, financial, and email accounts, but also cryptocurrency credentials, payment card numbers, and other sensitive data. All eight of the top password managers have adopted the term “zero knowledge” to describe the complex encryption system they use to protect the data vaults that users store on their servers. The definitions vary slightly from vendor to vendor, but they generally boil down to one bold assurance: that there is no way for malicious insiders or hackers who manage to compromise the cloud infrastructure to steal vaults or data stored in them. These promises make sense, given previous breaches of LastPass and the reasonable expectation that state-level hackers have both the motive and capability to obtain password vaults belonging to high-value targets.2026-02-23 vaults opsec passwords security
Cyhaus: Bela Lugosi’s Bed – greg.orgIs this where the mattress ended up? The bedroom is not in Horst, and this Mulas is not in Homes & Studios. Green carpet, green velvet, green sheets, Twombly’s love affair with green didn’t start in Bassano. The Kiss (Bela Lugosi) is one of Warhol’s earliest screenprints, which he made himself, on paper. On November 22, 1963.2026-02-21 bed art cy-twombly bela-lugosi bauhaus pun green lamp
The industrial owners selling to ICEThe other owners who have been reported to have sold buildings to ICE through subsidiaries or affiliates are: Crestlight Capital, Oakmont Industrial Group, Rockefeller Group, PCCP, Fundrise, Flint Development, and retailer Big Lots. Those companies did not respond to requests for comment. 2026-02-21 ice federal real-estate private-prison
Making frontier cybersecurity capabilities available to defendersRather than scanning for known patterns, Claude Code Security reads and reasons about your code the way a human security researcher would: understanding how components interact, tracing how data moves through your application, and catching complex vulnerabilities that rule-based tools miss. Every finding goes through a multi-stage verification process before it reaches an analyst. Claude re-examines each result, attempting to prove or disprove its own findings and filter out false positives. Findings are also assigned severity ratings so teams can focus on the most important fixes first.2026-02-21 cybersecurity claude verification