Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: code Clear Filter

I want everything local – Building my offline AI workspace

I want everything local — no cloud, no remote code execution. That’s what a friend said. That one-line requirement, albeit simple, would need multiple things to work in tandem to make it happen. What does a mainstream LLM (Large Language Model) chat app like ChatGPT or Claude provide at a high level? Ability to use chat with a cloud hosted LLM, Ability to run code generated by them mostly on their cloud infra, sometimes locally via shell, Ability to access the internet for new content or se

Programming with AI: You're Probably Doing It Wrong

Programming with AI: You're Probably Doing It Wrong 2025 is the year of Artificial Intelligence. With GPT-5 just released, many developers will re-evaluate their use of large language models for assisting in their daily work. I’m here to tell you: you’re probably doing it wrong. And you’re missing out on the real power that AI assisted development can give you. What “doing it wrong” looks like Let’s kick off with a (non-exhaustive) list of symptoms you’re using your AI coding assistant wrong

Topics: agent ai code context llm

Getting good results from Claude code

I've been experimenting with LLM programming agents over the past few months. Claude Code has become my favorite. It is not without issues, but it's allowed me to write ~12 programs/projects in relatively little time, and I feel I would not have been able to do all this in the same amount of time without it. Most of them, I wouldn't even have bothered to write without Claude Code, simply because they'd take too much of my time. (A list is included at the end of this post.) I'm still far from a

Flipper Zero dark web firmware bypasses rolling code security

Over on YouTube Talking Sasquach has recently tested custom firmware for the Flipper Zero that can entirely break the rolling code security system used on most modern vehicles. Rolling code security works by using a synchronized algorithm between a transmitter and receiver to generate a new, unique code for each transmission, preventing replay attacks and unauthorized access. In the past we've discussed an attack against rolling code security systems called RollJam, which works by jamming the o

GPT-5 vs. Sonnet: Complex Agentic Coding

OpenAI released GPT-5 yesterday, promoting it as their best model yet for agentic coding. When it arrived in my GitHub Copilot this morning, I immediately decided to test it with a complex, long-running agentic coding task — and later gave the exact same task to Claude 4 Sonnet 4 for comparison. While this isn't a tightly controlled scientific comparison — more of a "vibe check" — both models impressed me with their results. It's worth noting that while Claude Sonnet has been established for co

Getting Good Results from Claude Code

I've been experimenting with LLM programming agents over the past few months. Claude Code has become my favorite. It is not without issues, but it's allowed me to write ~12 programs/projects in relatively little time, and I feel I would not have been able to do all this in the same amount of time without it. Most of them, I wouldn't even have bothered to write without Claude Code, simply because they'd take too much of my time. (A list is included at the end of this post.) I'm still far from a

Complex Iterators Are Slow

Complex Iterators are Slow Thursday, 31 July 2025 Timi, my pure JavaScript B-Tree, achieves best in class iteration speed in part because I replaced Iterators with callbacks. They might be convenient, but the design of JavaScript Iterators is inherently slow for complex iteration as it prevents your compiler from inlining code. Inlining is when the call site of a function is replaced with its body to avoid the overhead of a function call. So, this: function add(a, b) { return a + b; } for (

How we enforce .NET coding standards to improve productivity

In today’s competitive software development landscape, organizations are actively looking to optimize their Software Development Life Cycle (SDLC) to deliver faster, with better quality, and reduce friction. The rise of Generative AI amplifies this trend even more. Teams that know how to leverage these tools and practices achieve unprecedented velocity. At Workleap, we decided to take a step back to analyze where we could improve our SDLC as well, in order to reduce friction and help our develo

Benchmarking GPT-5 on 400 real-world code reviews

GPT-5 is now available in Qodo’s platform for all free and paid users. Get started today. At Qodo, we believe benchmarks should reflect how developers actually work. That’s why we built the PR Benchmark—a benchmark designed to assess how well language models handle tasks like code review, suggesting improvements, and understanding developer intent. Unlike many public benchmarks, the PR Benchmark is private, and its data is not publicly released. This ensures models haven’t seen it during train

Flipper Zero DarkWeb Firmware Bypasses Rolling Code Security

Over on YouTube Talking Sasquach has recently tested custom firmware for the Flipper Zero that can entirely break the rolling code security system used on most modern vehicles. Rolling code security works by using a synchronized algorithm between a transmitter and receiver to generate a new, unique code for each transmission, preventing replay attacks and unauthorized access. In the past we've discussed an attack against rolling code security systems called RollJam, which works by jamming the o

The Q Programming Language

The Q Programming Language Q is a minimal, dependency-free programming language and compiler targeting x86-64 and arm64 with ultra-fast builds and tiny binaries. Features High performance ( ssa and asm optimizations) and optimizations) Fast compilation (<100 μs for simple programs) Tiny executables ("Hello World" is ~600 bytes) Multiple platforms (Linux, Mac and Windows) Zero dependencies (no llvm, no libc) Installation Warning q is under heavy development and not ready for production ye

Zero-day flaws in authentication, identity, authorization in HashiCorp Vault

Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your infrastructure is already lost. Driven by the understanding that vaults are high-value targets for attackers, our research team at Cyata set out to conduct

Ditching GitHub

This is going to be some sort of a public service announcement, with side notes. This has been brewing for a long, long time (years), it’s just that I never seemed to have the focus time required to solve this once and for all. But now I decided to get moving, and it is already ongoing. If you are among those few with an interest in code I publish, do read on. What? I am moving all of my public source code repositories off of GitHub. My ambition is to completely end my own usage of GitHub, in

GitHub CEO Thomas Dohmke on Copilot, vibe coding, and AI’s next chapter

is a deputy editor and author of thenewsletter. Posts from this author will be added to your daily email digest and your homepage feed. Welcome to Decoder! This is Alex Heath, your Thursday episode guest host and deputy editor at The Verge. It’s AI coding week at Decoder. You just heard Casey Newton’s interview with the CEO behind Cursor, Michael Truell. Now, I have a conversation with GitHub CEO Thomas Dohmke. In many ways, GitHub Copilot set off the current AI coding boom. But since Thomas

About AI

For the last 1.5 years, I have forced myself to work with and learn AI, mostly because the future of software engineering will inevitably have more AI within it. I’ve focused on optimizing my workflow to understand when AI is a genuinely useful tool versus when it’s a hindrance. Now, 1.5 years later, I feel confident enough to say I’ve learned enough about AI to have some opinions, which is why I’m writing this post. AI has become a race between countries and companies, mostly due to status. Th

Cracking the Vault: How we found zero-day flaws in HashiCorp Vault

Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your infrastructure is already lost. Driven by the understanding that vaults are high-value targets for attackers, our research team at Cyata set out to conduct

Out-Fibbing CPython with the Plush Interpreter

Out-Fibbing CPython with the Plush Interpreter In the last post I talked about Plush, the toy programming language with actor-based parallelism I've been tinkering with. The implementation is still immature, but it's reached a point where I can write fun programs that produce 2D/3D graphics and parallelize things over multiple CPU cores. Something I'd like to try soon, for the fun of it, is to animate a spinning cube with software rendering (rasterization). Before I get to that though, I'd like

Anthropic ships automated security reviews for Claude Code as AI-generated vulnerabilities surge

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now Anthropic launched automated security review capabilities for its Claude Code platform on Wednesday, introducing tools that can scan code for vulnerabilities and suggest fixes as artificial intelligence dramatically accelerates software development across the industry. The new features arrive as companies increasingly rely on AI to write c

Claude Code makes it easy to trigger a code check now with this simple command

Anthropic / Elyse Betters Picaro / ZDNET ZDNET's key takeaways Automated security reviews in Claude Code help ensure code safety. Spot and fix vulnerabilities before your code reaches production. Run the /security-review command in the terminal or via GitHub Action. Claude Code became generally available in May, and since then, it has become popular among developers for its coding assistance, available right in the terminal or integrated development environments (IDEs). Now, new features ar

Claude Code IDE integration for Emacs

Claude Code IDE for Emacs Overview Claude Code IDE for Emacs provides native integration with Claude Code CLI through the Model Context Protocol (MCP). Unlike simple terminal wrappers, this package creates a bidirectional bridge between Claude and Emacs, enabling Claude to understand and leverage Emacs’ powerful features—from LSP and project management to custom Elisp functions. This transforms Claude into a true Emacs-aware AI assistant that works within your existing workflow and can interac

Claude Code IDE Integration for Emacs

Claude Code IDE for Emacs Overview Claude Code IDE for Emacs provides native integration with Claude Code CLI through the Model Context Protocol (MCP). Unlike simple terminal wrappers, this package creates a bidirectional bridge between Claude and Emacs, enabling Claude to understand and leverage Emacs’ powerful features—from LSP and project management to custom Elisp functions. This transforms Claude into a true Emacs-aware AI assistant that works within your existing workflow and can interac

Poll: What do you think Android 17’s dessert codename will be?

Google has a fun tradition of codenaming Android versions after desserts in alphabetical order. In the early days of Android, these dessert codenames were part of the Android name/branding. However, with Android 10’s release in 2019, Google dropped the codename from the public name, even though it has continued to use the dessert codename internally. Android 15 is internally called Vanilla Ice Cream, whereas Android 16 is called Baklava. With Android 16 out for a while now, and Android 16 QPR1 a

Python performance myths and fairy tales

Python performance myths and fairy tales [LWN subscriber-only content] Antonio Cuni, who is a longtime Python performance engineer and PyPy developer, gave a presentation at EuroPython 2025 about "Myths and fairy tales around Python performance" on the first day of the conference in Prague. As might be guessed from the title, he thinks that much of the conventional wisdom about Python performance is misleading at best. With lots of examples, he showed where the real problems that he sees lie. H

The Amaranth hardware description language

The Amaranth project provides an open-source toolchain for developing hardware based on synchronous digital logic using the Python programming language. It aims to be easy to learn and use, reduce or eliminate common coding mistakes, and simplify the design of complex hardware with reusable components. The Amaranth toolchain consists of the Amaranth language, the standard library, the simulator, and the build system, covering all steps of a typical FPGA development workflow. At the same time, i

Adobe issues emergency fixes for AEM Forms zero-days after PoCs released

Adobe released emergency updates for two zero-day flaws in Adobe Experience Manager (AEM) Forms on JEE after a PoC exploit chain was disclosed that can be used for unauthenticated, remote code execution on vulnerable instances. The flaws are tracked as CVE-2025-54253 and CVE-2025-54254: CVE-2025-54253: Misconfiguration allowing arbitrary code execution. Rated "Critical" with a CVSS score of 8.6. Misconfiguration allowing arbitrary code execution. Rated "Critical" with a CVSS score of 8.6. CVE

TIL that You can spot base64 encoded JSON, certificates, and private keys

You can spot base64 encoded JSON, certificates, and private keys Last modified August 5, 2025 Last modified August 5, 2025 I was working on my homelab and examined a file that was supposed to contain encrypted content that I could safely commit on a Github repository. The file looked like this { "serial" : 13 , "lineage" : "24d431ee-3da9-4407-b649-b0d2c0ca2d67" , "meta" : { "key_provider.pbkdf2.password_key" : "eyJzYWx0IjoianpHUlpMVkFOZUZKcEpSeGo4UlhnNDhGZk9vQisrR0YvSG9ubTZzSUY5WT0iLCJpdGVyYX