Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: _request Clear Filter

A postmortem of three recent issues

Between August and early September, three infrastructure bugs intermittently degraded Claude's response quality. We've now resolved these issues and want to explain what happened. In early August, a number of users began reporting degraded responses from Claude. These initial reports were difficult to distinguish from normal variation in user feedback. By late August, the increasing frequency and persistence of these reports prompted us to open an investigation that led us to uncover three sepa

Claude Code Degradation: A postmortem of three recent issues

Between August and early September, three infrastructure bugs intermittently degraded Claude's response quality. We've now resolved these issues and want to explain what happened. In early August, a number of users began reporting degraded responses from Claude. These initial reports were difficult to distinguish from normal variation in user feedback. By late August, the increasing frequency and persistence of these reports prompted us to open an investigation that led us to uncover three sepa

How FOSS Projects Handle Legal Takedown Requests

When a legal takedown request arrives, whether it’s about copyright, censorship, privacy, or something more vague, how a Free and Open Source Software (FOSS) project responds can make all the difference. Handled well, a takedown request can be a manageable administrative step. Handled poorly, it can cause panic, disrupt infrastructure, or even put contributors at legal risk. As part of our legal resilience research, we spoke with a range of legal experts, software freedom advocates, and mainta

Ask HN: What Arc/Dia features should we prioritize?

Feature request: What would you love to see in BrowserOS? This is a place to share feature ideas and requests for BrowserOS. Drop your suggestions below! 👇 Tell us what features you'd love to see - we'll follow up if we have questions and consider them for our roadmap! React with ❤️ to requests you'd also want! P.S.: Join our Discord to chat with the community 👋

These psychological tricks can get LLMs to respond to “forbidden” prompts

If you were trying to learn how to get other people to do what you want, you might use some of the techniques found in a book like Influence: The Power of Persuasion. Now, a pre-print study out of the University of Pennsylvania suggests that those same psychological persuasion techniques can frequently "convince" some LLMs to do things that go against their system prompts. The size of the persuasion effects shown in "Call Me A Jerk: Persuading AI to Comply with Objectionable Requests" suggests

The repercussions of a typo in C++ & Rust

The repercussions of missing an Ampersand in C++ & Rust Copying vs Passing by reference TL;DR There’s a funny typo that causes someone to copy data instead of “referencing” in C++. Rust is nice because it provides defaults that protect you from some of these “dumb” mistakes. In this example, I’ll go over how the “move by default” can prevent us from introducing this subtle behavior. Motivation I originally hesitated to write this because I thought the topic was too “obvious”, but I did it a

Next.js is infuriating

Hey, it's finally happened. I've decided to write a blog post. And if you're reading this, I've also finished one. I have wanted to do this for a long time, but could never find the motivation to start. But you know what they say: anger is the best motivator. They do say that, right? Some context that's in the background We're going on a journey, you and I. But first, we need to set the scene. Imagine we're working for $COMPANY and one of our Next.js services did an oopsie. This being Next.js,

Next.js Is Infuriating

Hey, it's finally happened. I've decided to write a blog post. And if you're reading this, I've also finished one. I have wanted to do this for a long time, but could never find the motivation to start. But you know what they say: anger is the best motivator. They do say that, right? Some context that's in the background We're going on a journey, you and I. But first, we need to set the scene. Imagine we're working for $COMPANY and one of our Next.js services did an oopsie. This being Next.js,

Nintendo Switch 2 Dock USB-C Compatibility

Negotiation Explanation SOURCE_CAPABILITIES - Source Capabilities This is a message from the source to 'advertise' the power modes that it is capable of supplying. The capabilities are communicated as a list of options with different fixed voltages, current limits, and supported features. The most interesting of these is the - optional - Programmable Power Supply(PPS) mode allowing the sink device to micromanage the delivered voltage and current to optimize power conversion and delivery. Thi

Apple Reportedly Still Under Pressure to Give UK Government Backdoor iCloud Access

The UK government continues to seek access to Apple's iCloud services, according to a new report, with its request to access people's data seemingly even broader than originally thought. According to a legal filing seen by the Financial Times, the UK Home Office wanted backdoor access to standard iCloud services in addition to those secured with the highest level of encryption. Just last week, President Donald Trump's Director of National Intelligence Tulsi Gabbard said that the UK and US had

AWS pricing for Kiro dev tool dubbed 'a wallet-wrecking tragedy'

AWS has introduced new pricing for Kiro, its AI-driven coding tool, but unlike the pricing originally announced, the latest plans are "a wallet-wrecking tragedy," according to many of its users. "Kiro's spec-driven AI IDE is a gem," said open source PHP and Laravel engineer Antonio Ribeiro on GitHub, "until I saw your new pricing." AWS introduced Kiro last month as a fork of Code OSS (also used by Visual Studio Code) with a distinctive approach to AI coding assistance, based on specifications

Fun with Finite State Transducers

ENOSUCHBLOG Programming, philosophy, pedaling. Aug 14, 2025 Tags: devblog, programming, rust, zizmor I recently solved an interesting problem inside zizmor with a type of state machine/automaton I hadn’t used before: a finite state transducer (FST). This is just a quick write-up of the problem and how I solved it. It doesn’t go particularly deep into the data structures themselves. For more information on FSTs themselves, I strongly recommend burntsushi’s article on transducers (which is wha

Show HN: unsafehttp – tiny web server from scratch in C, running on an orange pi

Unsafe HTTP unsafehttp is an extremely minimal HTTP server written in C from scratch, to practice C, *nix socket programming, and C compilation. It just served this webpage to you! Yes, that's a marquee tag. Backward-compatibility is a beautiful thing. You can find the source here. Hosting It's running on a tiny Orange Pi SBC in my office: There's no HTTP proxy between you, just a port-forward through my VPS. You're connect ing right to the socket that the code is accept ing on. Fun Stuff

HTTP/1.1 must die: the desync endgame

HTTP/1.1 must die: the desync endgame James Kettle Director of Research @albinowax Published: 06 August 2025 at 22:20 UTC Updated: 12 August 2025 at 09:50 UTC Abstract Upstream HTTP/1.1 is inherently insecure and regularly exposes millions of websites to hostile takeover. Six years of attempted mitigations have hidden the issue, but failed to fix it. This paper introduces several novel classes of HTTP desync attack capable of mass compromise of user credentials. These techniques are demo

Cross-Site Request Forgery

Cross-Site Request Forgery (CSRF) is a confused deputy attack where the attacker causes the browser to send a request to a target using the ambient authority of the user’s cookies or network position. For example, attacker.example can serve the following HTML to a victim <form action="https://example.com/send-money" method="post"> <input type="hidden" name="to" value="filippo" /> <input type="hidden" name="amount" value="1000000" /> </form> and the browser will send a POST request to https://e

OpenFreeMap survived 100k requests per second

I was about to post about how nice the last 10 months of OpenFreeMap have been. The architecture has really proven itself to be great, Cloudflare has agreed to sponsor the bandwidth, Hetzner servers are super stable as always, serving tiles from Btrfs proved to be a great choice, nginx is amazing, and life is good. Then, out of the blue, I'm getting reports that some tiles are not loading, which normally means tile generation bugs, but not this time. I look into the nginx logs and see this: 20

Show HN: Schematra – Sinatra-inspired minimal web framework for Chicken Scheme

Schematra A minimal web framework for CHICKEN Scheme, inspired by Sinatra. Schematra is currently an early exploration project created for learning purposes, but hopefully it will grow into something more useful over time. Why Schematra? I created Schematra because I wanted to: Improve my knowledge of scheme : Building a web framework is a great way to explore a language's capabilities and idioms : Building a web framework is a great way to explore a language's capabilities and idioms Creat

Schematra: A Sinatra love letter in Scheme

Schematra A minimal web framework for CHICKEN Scheme, inspired by Sinatra. Schematra is currently an early exploration project created for learning purposes, but hopefully it will grow into something more useful over time. Why Schematra? I created Schematra because I wanted to: Improve my knowledge of scheme : Building a web framework is a great way to explore a language's capabilities and idioms : Building a web framework is a great way to explore a language's capabilities and idioms Creat

Show HN: The Aria Programming Language

The Aria Programming Language Aria is a modern, dynamic scripting language. It is meant to be a "sweet spot" language, easy to pick-up and enjoyable to use. It provides a familiar C-style syntax, with a feature set inspired by well-beloved languages such as Python and Rust. It comes with little ceremony and a focus on getting stuff done. The standard library, while simple, has enough basic features to get you started on interesting problems. Aria is currently only supported on Linux. Contrib

Reverse Proxy Deep Dive: Why HTTP Parsing at the Edge Is Harder Than It Looks

In Part 1 of this series, we explored a high-level overview of reverse proxies and dived deep into connection management. This post shifts our focus to the intricate world of HTTP handling within a reverse proxy. Deep Dive into HTTP Handling At a high level, the HTTP workflow from a proxy’s perspective might seem straightforward: Receive the request from the client Parse and sanitize the request Uses different requst metadata (path, headers, cookies) to select an upstream host Manipulates the

Pull Interactions from POSSEd Content

I just introduced a new feature on the website! 🎉 As usual, whenever content is POSSEd (Publish (on your) Own Site, Syndicate Elsewhere), you will find links to the syndicated content at the bottom of the page. Now, you will also see a small link to “toggle the interaction crawler”. This will open (or hide) a small form, where you can select available (and supported) social media platforms to crawl for interaction counts. This is in line with what I was discussing a few weeks ago about webmen

Malware found in official gravityforms plugin indicating supply chain breach

Update 7-12-2025 06:00 UTC: We have observed some activity in regard to one of the backdoors that involves a gf_api_token parameter. The IP address 193.160.101.6 tries to request, for every site, the following URLs with a spoofed user agent: /wp-content/plugins/gravityforms_2.9.12/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNtBYu6Asb9JX06KYAWmrfPtG1eP3&action=ping /wp-content/plugins/gravityforms_2.9.11.1/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNt

Malware Found in Official GravityForms Plugin Indicating Supply Chain Breach

Update 8-11-2025 06:00 UTC: We have observed some activity in regard to one of the backdoors that involves a gf_api_token parameter. The IP address 193.160.101.6 tries to request, for every site, the following URLs with a spoofed user agent: /wp-content/plugins/gravityforms_2.9.12/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNtBYu6Asb9JX06KYAWmrfPtG1eP3&action=ping /wp-content/plugins/gravityforms_2.9.11.1/notification.php?gf_api_token=Cx3VGSwAHkB9yzIL9Qi48IFHwKm4sQ6Te5odNt

You can (finally) buy the Nintendo Switch 2 on Amazon (but don't expect a Prime Day deal)

Engadget has been testing and reviewing consumer tech since 2004. Our stories may include affiliate links; if you buy something through a link, we may earn a commission. Read more about how we evaluate products . The scramble to buy the first wave of Nintendo Switch 2 gaming consoles left a lot of fans in the lurch. Getting your hands on a Switch 2 of your own still takes some luck if you weren't fortunate enough to snag a pre-order. One of the points of drama has been that Amazon wasn't stocki

Zig breaking change – initial Writergate

There was an error while loading. Please reload this page . Successfully merging this pull request may close these issues. None yet No one assigned and others This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters Already on GitHub? Sign in to your account By clicking “Sign up for GitHub”,

Life of an inference request (vLLM V1): How LLMs are served efficiently at scale

Life of an inference request (vLLM V1): How LLMs are served efficiently at scale Junhao Li Senior Software Engineer Ubicloud is an open source alternative to AWS. We offer managed cloud services that build on top of PostgreSQL, Kubernetes, vLLM, and others.‍ ‍vLLM is an open-source inference engine that serves large language models. We deploy multiple vLLM instances across GPUs and load open weight models like Llama 4 into them. We then load balance traffic across vLLM instances, run health

Bitmovin (YC S15) Is Hiring a Junior Solutions Engineer in Denver

The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network. The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying ou

I was surprised by how simple an allocator is

Table of Contents Introduction Recently I was looking at an issue on mimalloc, a "state-of-the-art" memory allocator developed by Microsoft. The issue was quite simple, developers wanted a way to preallocate a piece of memory and use it as mimalloc's heap. Seeing that mimalloc does not offer this feature, I thought: "how hard can it be to write a memory allocator to manage a preallocated region?". The answer to this question is: "given enough time, even a monkey with a typewriter can write