Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: tp Clear Filter

Web Bot Auth

Web Bot Auth is an authentication method that leverages cryptographic signatures in HTTP messages to verify that a request comes from an automated bot. Web Bot Auth is used as a verification method for verified bots and signed agents. It relies on two active IETF drafts: a directory draft ↗ allowing the crawler to share their public keys, and a protocol draft ↗ defining how these keys should be used to attach crawler's identity to HTTP requests. This documentation goes over specific integratio

Are OpenAI and Anthropic losing money on inference?

I keep hearing what a cash incinerator AI is, especially around inference. While it seems reasonable on the surface, I've often been wary of these kind of claims, so I decided to do some digging. I haven't seen anyone really try to deconstruct the costs in running inference at scale and the economics really interest me. This is really napkin math. I don't have any experience at running frontier models at scale, but I do know a lot about the costs and economics of running very high throughput s

Launch HN: Dedalus Labs (YC S25) – Vercel for Agents

Hey HN! We are Windsor and Cathy of Dedalus Labs ( https://www.dedaluslabs.ai/ ), a cloud platform for developers to build agentic AI applications. Our SDK allows you to connect any LLM to any MCP tools – local or hosted by us. No Dockerfiles or YAML configs required. Here’s a demo: https://youtu.be/s2khf1Monho?si=yiWnZh5OP4HQcAwL&t=11 Last October, I (Windsor) was trying to build a stateful code execution sandbox in the cloud that LLMs could tool-call into. This was before MCP was released, a

Are OpenAI and Anthropic Losing Money on Inference?

I keep hearing what a cash incinerator AI is, especially around inference. While it seems reasonable on the surface, I've often been wary of these kind of claims, so I decided to do some digging. I haven't seen anyone really try to deconstruct the costs in running inference at scale and the economics really interest me. This is really napkin math. I don't have any experience at running frontier models at scale, but I do know a lot about the costs and economics of running very high throughput s

Here’s exactly what went wrong with the Sony Xperia 1 VII

Robert Triggs / Android Authority TL;DR Sony has shared more details about what was causing the Xperia 1 VII to shut down, restart, or fail to power on. Some Xperia 1 VII units experienced motherboard defects due to exposure to temperature and humidity. Sony has now resumed sales of its latest smartphone in the European and Japanese markets. Sony launched its latest flagship smartphone, the Xperia 1 VII, back in May. Unfortunately, the initial feedback on the smartphone was not what Sony had

Windows 11 Update KB5063878 Causing SSD Failures

Hi r/msp, Just want to share a word of caution. I've observed several threads across r/Windows11 and r/sysadmin that are reporting that the latest Windows 11 security update (KB5063878) is linked to SSD failures/data corruption, particularly during large file operations (50GB+ transfers, large PST/OST files, etc.). Here are some of the relevant conversations: https://www.reddit.com/r/Windows11/comments/1mst8au/windows_11s_latest_security_update_kb5063878_is/ https://www.reddit.com/r/Windows1

Connecting M.2 drives to various things (and not doing so)

You're using a tool with a too-generic User-Agent You're probably reading this page because you've attempted to access some part of my blog (Wandering Thoughts) or CSpace, the wiki thing it's part of. Unfortunately whatever you're using to do so has a HTTP User-Agent header value that is too generic or otherwise excessively suspicious. Unfortunately, as of early 2025 there's a plague of high volume crawlers (apparently in part to gather data for LLM training) that behave like this. To reduce th

The one-click Linux app I use for instant online anonymity

Macrovector/iStock / Getty Images Plus via Getty Follow ZDNET: Add us as a preferred source on Google. ZDNET's key takeaways Using the Tor network couldn't be easier. The free Carburetor app is a one-click affair. You'll enjoy anonymity and encryption without the fuss. The Tor network is one of the safest, most reliable ways of adding a strong layer of privacy and protection for your Linux desktop, and everyone should consider using it. Not only does Tor give you anonymity, but it also pro

Launch HN: April (YC S25) – Voice AI to manage your email and calendar

Hi HN, we’re Neha and Akash from April ( https://tryapril.com ). We are building an AI executive assistant to help you get through emails and manage your schedule, hands-free while you drive to work, or whenever else you prefer voice interaction. Here's a demo: https://www.youtube.com/watch?v=ISKwEyuQQEo#t=50 ...and here's a second one showing more complex use cases: https://www.youtube.com/watch?v=P8APprJ3-eY. While driving 40 mins daily from SF to Berkeley, my inbox would flood to 30+ email

Ghrc.io appears to be malicious

A simple typo of ghcr.io to ghrc.io would normally be a small goof. You’d typically get a 404 or similar error, finally work out the issue, fix it, and move along. But in this case, that typo appears to be doing something very malicious, stealing GitHub credentials. First, a quick bit of background. ghcr.io is an OCI conformant registry for container images and OCI artifacts used by a lot of projects. It’s part of GitHub and is a very popular image and artifact repository used by open source pr

MCP Gateway and Registry

MCP Gateway Model Context Protocol gateway & proxy - unify REST, MCP, and A2A with federation, virtual servers, retries, security, and an optional admin UI. ContextForge MCP Gateway is a feature-rich gateway, proxy and MCP Registry that federates MCP and REST services - unifying discovery, auth, rate-limiting, observability, virtual servers, multi-transport protocols, and an optional Admin UI into one clean endpoint for your AI clients. It runs as a fully compliant MCP server, deployable via P

Go-away – Customizable, conditional challenges to incoming requests

Challenges Operators can choose to serve a challenge to incoming requests or client, depending on conditions or other rules. Challenges can be transparent (not shown to user, depends on backend or other logic), non-JavaScript (challenges common browser properties), or custom JavaScript (from Proof of Work to fingerprinting or Captcha is supported) The following examples are defined in policy snippets and are ready to use. Challenges can be redefined or new ones entirely can be added with diff

Websites and web developers mostly don't care about client-side problems

You're using a tool with a too-generic User-Agent You're probably reading this page because you've attempted to access some part of my blog (Wandering Thoughts) or CSpace, the wiki thing it's part of. Unfortunately whatever you're using to do so has a HTTP User-Agent header value that is too generic or otherwise excessively suspicious. Unfortunately, as of early 2025 there's a plague of high volume crawlers (apparently in part to gather data for LLM training) that behave like this. To reduce th

Japan city drafts ordinance to cap smartphone use at 2 hours per day

NAGOYA - A central Japan city said Thursday it will seek to pass an ordinance recommending all residents limit smartphone use to two hours a day outside of work and school amid concerns over the impact of excessive technology exposure, though there will be no penalties proposed. The ordinance drafted by the city of Toyoake in Aichi Prefecture is likely to be the first such municipal regulation in Japan that targets a limit on the use of smartphones and other electronic devices, according to the

Launch HN: BlankBio (YC S25) - Making RNA Programmable

Hey HN, we're Phil, Ian and Jonny, and we're building BlankBio ( https://blank.bio ). We're training RNA foundation models to power a computational toolkit for therapeutics. The first application is in mRNA design where our vision is for any biologist to design an effective therapeutic sequence ( https://www.youtube.com/watch?v=ZgI7WJ1SygI ). BlankBio started from our PhD work in this area, which is open-sourced. There’s a model [2] and a benchmark with APIs access [0]. mRNA has the potential

XSLT removal will break multiple government and regulatory sites

What is the issue with the HTML Standard? One of the issues we've seen in #11523 and #11563 is that the proposal to remove XSLT from the spec doesn't acknowledge existing use cases beyond Chrome Status counter stats. According to Chrome's own Blink principles of web compatibility: The primary signal we use is the fraction of page views impacted in Chrome, usually computed via Blink’s UseCounter UMA metrics. As a general rule of thumb, 0.1% of PageVisits (1 in 1000) is large, while 0.001% is c

Launch HN: Inconvo (YC S23) – AI agents for customer-facing analytics

Hi HN, we are Liam and Eoghan of Inconvo ( https://inconvo.com ), a platform that makes it easy to build and deploy AI analytics agents into your SaaS products, so your customers can quickly interact with their data. There’s a demo video at https://www.youtube.com/watch?v=4wlZL3XGWTQ and a live demo at https://demo.inconvo.ai/ (no signup required). Docs are at https://inconvo.com/docs. SaaS products typically offer dashboards and reports, which work for high-level metrics but are clunky for dr

DeepSeek-v3.1

DeepSeek-V3.1 Release Introducing DeepSeek-V3.1: our first step toward the agent era! 🚀 🧠 Hybrid inference: Think & Non-Think — one model, two modes ⚡️ Faster thinking: DeepSeek-V3.1-Think reaches answers in less time vs. DeepSeek-R1-0528 🛠️ Stronger agent skills: Post-training boosts tool use and multi-step agent tasks Try it now — toggle Think/Non-Think via the "DeepThink" button: https://chat.deepseek.com/ 🔹 deepseek-chat → non-thinking mode 🔹 deepseek-reasoner → thinking mode 🧵 128K

What about using rel="share-url" to expose sharing intents?

Let's say that you've visited a website and want to share it with your friends. At the bottom of the article is a list of popular sharing destinations - Facebook, BlueSky, LinkedIn, Telegram, Reddit, HackerNews etc. You click the relevant icon and get taken to the site with the sharing details pre-filled. The problem is, every different site has a different intent for sharing links and text. For example: https://www.facebook.com/sharer.php?u=…&t=… https://www.linkedin.com/sharing/share-offsi

DeepSeek-v3.1 Release

DeepSeek-V3.1 Release Introducing DeepSeek-V3.1: our first step toward the agent era! 🚀 🧠 Hybrid inference: Think & Non-Think — one model, two modes ⚡️ Faster thinking: DeepSeek-V3.1-Think reaches answers in less time vs. DeepSeek-R1-0528 🛠️ Stronger agent skills: Post-training boosts tool use and multi-step agent tasks Try it now — toggle Think/Non-Think via the "DeepThink" button: https://chat.deepseek.com/ 🔹 deepseek-chat → non-thinking mode 🔹 deepseek-reasoner → thinking mode 🧵 128K

Universal Tool Calling Protocol (UTCP)

Universal Tool Calling Protocol (UTCP) 1.0.1 Introduction The Universal Tool Calling Protocol (UTCP) is a modern, flexible, and scalable standard for defining and interacting with tools across a wide variety of communication protocols. UTCP 1.0.0 introduces a modular core with a plugin-based architecture, making it more extensible, testable, and easier to package. In contrast to other protocols, UTCP places a strong emphasis on: Scalability : UTCP is designed to handle a large number of tool

Introduction to AT Protocol

Some time ago I wrote a long blog post I called “Complete guide to Bluesky”, which explains how all the user-facing features of Bluesky work and various tips and tricks. This one is meant to be a bit like a developer version of that – I want to explain in hopefully understandable language what all the pieces of the network architecture are and how they all fit together. I hope this will let you understand better how Bluesky and the underlying protocol works, and how it differs from e.g. the Fedi

Introduction to Bluesky's AT Protocol

Some time ago I wrote a long blog post I called “Complete guide to Bluesky”, which explains how all the user-facing features of Bluesky work and various tips and tricks. This one is meant to be a bit like a developer version of that – I want to explain in hopefully understandable language what all the pieces of the network architecture are and how they all fit together. I hope this will let you understand better how Bluesky and the underlying protocol works, and how it differs from e.g. the Fedi

Bootstrapping the Future: From Resource Estimation to Quantum Advantage

Quantum Algorithms That Work A central problem in quantum computing is the development of domain-specific algorithms that enable real scientific and economic contributions. Quantum algorithms in numerous domains such as finance, chemistry, physics, and biology are being developed with the intention of achieving quantum advantage, i.e. to derive deeper insights relative to established algorithms on classical machines. But these algorithms are typically evaluated through simulation and/or testing

Show HN: Hanaco Weather – A poetic weather SNS from the OS Yamato project

OS Yamato 🌸 🔗 Visit: https://hanaco875.com 📹 Launch Video: https://www.youtube.com/watch?v=JrqwU_N5WBA 📰 Featured in KrispiTech: https://krispitech.com/os-yamato-and-the-art-of-gentle-tech-where-minimalism-meets-mindfulness/ ⸻ ✨ Now Open After two and a half months of quiet, steady growth, OS Yamato has opened its gates to the world. This isn’t just software — it’s a philosophy of impermanence, care, and simplicity. ⸻ 🌿 Philosophy We believe digital memories, like real ones, shouldn’t l

Topics: com https let os yamato

Ask HN: Why does the US Visa application website do a port-scan of my network?

I have recently installed this extension on FF: https://addons.mozilla.org/en-US/firefox/addon/port-authorit... and yesterday I visited this website: https://ceac.state.gov/genniv/ and I got a notification that the website tried to do a port-scan of my private network. Is this a common thing? I have just recently installed the extension, so I am not sure if there are a lot of other websites who do it. Since looking into it, I noticed that uBlock Origin already has the default list "Block Outsi

This $200 Android phone with a paper-like display made my Pixel look overbearing

TCL 60 XE Nxtpaper 5G ZDNET's key takeaways TCL's 60 XE Nxtpaper 5G is on sale on Amazon for $222. It has a unique display, and a feature set that promotes minimalism and digital well-being. I just wish the camera system and general performance were better. $249.99 at Amazon Being glued to your smartphone's screen all day can do a number on your eyes, and I definitely can feel it. TCL's Nxtpaper technology offers a paper-like screen that's made for tired eyes like mine. The TCL 60 XE Nxtpaper

Critical Cache Poisoning Vulnerability in Dnsmasq

[Dnsmasq-discuss] [Security Report] Critical Cache Poisoning Vulnerability in Dnsmasq Dear Dnsmasq Security Team, We would like to responsibly disclose a critical cache poisoning vulnerability affecting the Dnsmasq DNS software. The issue allows attackers to inject arbitrary malicious DNS resource records and poison domain names without requiring advanced techniques, only by leveraging a single special character. Report Summary Vulnerability Type: Logic flaw in cache poisoning defense Affected

The tablet that made me ditch my Kindle and iPad now has a worthy follow-up

TCL Nxtpaper 11 Plus ZDNET's key takeaways The TCL Nxtpaper 11 Plus is available for $249. This tablet can switch from full color to an E Ink-like display with the press of a button, it has 256GB of storage, and an eye-catching matte display with 120Hz refresh rate. The Nxtpaper 11 Plus can get heavy when you use it one-handed and doesn't include a case or stylus, though you can buy them separately. $249 at Walmart Get more in-depth ZDNET tech coverage: Add us as a preferred Google source on

5 password managers you should use instead of LastPass

Joe Hindy / Android Authority There was a time when LastPass was THE password manager everyone should be using. That statement still stands, but with one small twist: LastPass is now the number one password manager everyone should stay far away from. The reason for this? Multiple rounds of leaks and a series of security vulnerabilities. Give LastPass a hard pass, because there are so many better options available — ones that are both more secure and convenient — you’ll wonder why you didn’t sw