Published on: 2025-06-03 17:17:09
WhatsApp is gearing up to launch a long-awaited feature: usernames. With usernames, users will be able to connect with others without sharing their actual phone number. Spotted by WABetaInfo (via Tecnoblog) in a recent TestFlight beta version of the app, this under-development feature will finally allow users to pick a unique handle. Yes, just like on Telegram, Signal, and most other modern messaging platforms. While the feature isn’t live yet, even for beta testers, WABetaInfo found strings t
Keywords: number username usernames users whatsapp
Find related items on AmazonPublished on: 2025-06-05 05:46:50
When launching privacy-critical apps and services, developers want to make sure that every packet really only goes through Tor. One mistyped proxy setting–or a single system-call outside the SOCKS wrapper–and your data is suddenly on the line. That's why today, we are excited to introduce oniux: a small command-line utility providing Tor network isolation for third-party applications using Linux namespaces. Built on Arti, and onionmasq, oniux drop-ships any Linux program into its own network na
Keywords: application namespaces network oniux tor
Find related items on AmazonPublished on: 2025-06-05 08:02:56
College graduates were left speechless after officials at New York City's Pace University deployed an AI model to read out their names during a commencement event this month. A video that has since gone viral on social media shows students having a QR on their smartphone scanned, only to have an AI read their name out loud — an irritating use of the tech that turned what should've otherwise been a proud moment in their academic career into what commenters likened to using the self-checkout coun
Keywords: ai names student students university
Find related items on AmazonPublished on: 2025-06-06 15:14:44
We are excited to introduce Namespaces to the OpenBao Secret Manager – a powerful feature designed to bring robust multi-tenancy and fine-grained isolation to your secrets management workflows. Namespaces in OpenBao are logical partitions within a single OpenBao instance, functioning as isolated environments where teams, organizations, or applications can operate independently. Each namespace acts like a mini-OpenBao, with its own policies, authentication methods, secret engines, tokens, and i
Keywords: namespace namespaces openbao tenant tenants
Find related items on AmazonPublished on: 2025-06-07 11:14:44
We are excited to introduce Namespaces to the OpenBao Secret Manager – a powerful feature designed to bring robust multi-tenancy and fine-grained isolation to your secrets management workflows. Namespaces in OpenBao are logical partitions within a single OpenBao instance, functioning as isolated environments where teams, organizations, or applications can operate independently. Each namespace acts like a mini-OpenBao, with its own policies, authentication methods, secret engines, tokens, and i
Keywords: namespace namespaces openbao tenant tenants
Find related items on AmazonPublished on: 2025-06-12 21:09:58
When Nguyen Phuoc Loc first started dabbling in Chicano culture eight years ago, it was simply because he liked the way that the loose clothing offset his large head. Today, he considers himself Chicano through and through. The 30-year-old Vietnamese barber has never been to the United States. Yet he has filled his life and work with tributes to Mexican American identity and culture. The back of the barbershop he manages features a mural of the Virgen de Guadalupe, a cactus plant and a Mexican
Keywords: chicano culture people said vietnamese
Find related items on AmazonPublished on: 2025-06-15 22:39:09
A generic C-powered & Lua-driven container runtime. Many container runtimes out there focus on specific containerization technologies such as Linux namespaces, but Emilua acts as a generic container runtime that supports different kernel technologies : Linux namespaces. FreeBSD jails. Many container runtimes (e.g. bubblewrap, nsjail) are CLI-driven and give little room for flexibility. The standard tool to automate CLI usage is BASH. However BASH cannot be used to restore flexibility here (it
Keywords: bash container emilua namespaces setup
Find related items on AmazonPublished on: 2025-06-16 19:27:41
I recently decided to compile a very large list of domain names for the German country code top-level domain .de. I did this with the help of the Common Crawl project which provides a free, open repository of web crawl data and web graphs for the last years. A few command line commands and a small bash shell script was all it took to compile a nice list of roughly 9 million .de domain names. 💡 If you want to know more about how exactly I compiled the domain name list, just let me know and I mi
Keywords: domain lieferando list names restaurant
Find related items on AmazonPublished on: 2025-07-01 17:20:06
Tor has announced Oniux, a new command-line tool for routing any Linux application securely through the Tor network for anonymized network connections. Unlike classic methods like torsocks, which rely on user-space tricks, Oniux uses Linux namespaces to create a fully isolated network environment for each application, preventing data leaks even if the app is malicious or misconfigured. Linux namespaces are a kernel feature that allows processes to run in isolated environments, each with its ow
Keywords: linux namespaces network oniux tor
Find related items on AmazonPublished on: 2025-07-08 20:39:34
Description This replaces #19744 This proposes a new feature to define virtual top-level namespaces in Ruby. Those namespaces can require/load libraries (either .rb or native extension) separately from other namespaces. Dependencies of required/loaded libraries are also required/loaded in the namespace. This feature will be disabled by default at first, and will be enabled by an env variable RUBY_NAMESPACE=1 as an experimental feature. (It could be enabled by default in the future possibly.)
Keywords: app namespace namespaces port ruby
Find related items on AmazonPublished on: 2025-08-13 01:31:25
Some ChatGPT users have noticed a strange phenomenon recently: occasionally, the chatbot refers to them by name as it reasons through problems. That wasn’t the default behavior previously, and several users claim ChatGPT is mentioning their names despite never having been told what to call them. Reviews are mixed. One user, software developer and AI enthusiast Simon Willison, called the feature “creepy and unnecessary.” Another developer, Nick Dobos, said he “hated it.” A cursory search of X tu
Keywords: calling chatbot chatgpt names users
Find related items on AmazonPublished on: 2025-08-22 00:53:51
On Monday, OpenAI announced the GPT-4.1 model family, its newest series of AI language models that brings a 1 million token context window to OpenAI for the first time and continues a long tradition of very confusing AI model names. Three confusing new names, in fact: GPT‑4.1, GPT‑4.1 mini, and GPT‑4.1 nano. According to OpenAI, these models outperform GPT-4o in several key areas. But in an unusual move, GPT-4.1 will only be available through the developer API, not in the consumer ChatGPT inter
Keywords: gpt model models names openai
Find related items on AmazonPublished on: 2025-08-22 09:14:17
Scroll through the comments section of any popular YouTube video about Vietnamese history, and you will see admiration and respect from around the world for Vietnam’s anticolonial prowess. ‘I’m Nicaraguan and we went up against US imperialism several times and won. Vietnam was a huge inspiration to the Sandinistas! Long live a free Palestine!’ ‘The Vietnamese struggle for independence is one of the greatest David vs Goliath stories in the history of the world.’ ‘How Vietnam managed to endure Chi
Keywords: french people political vietnam vietnamese
Find related items on AmazonPublished on: 2025-08-21 00:12:47
It happens to all of us occasionally. As you walk down the hallway you see a familiar face—someone you have recently met—you reach into your brain expecting a complicated series of synaptic firing to bring forth the name person in front of you only to be disappointed. Although you know it is there in the recesses of your mind, you cannot summon the name of your new acquaintance. You settle instead for the ubiquitous nod and the word “hello”. Where failure to occasionally recall the name of new
Keywords: brain information memory names term
Find related items on AmazonPublished on: 2025-08-23 12:19:29
A new class of supply chain attacks named 'slopsquatting' has emerged from the increased use of generative AI tools for coding and the model's tendency to "hallucinate" non-existent package names. The term slopsquatting was coined by security researcher Seth Larson as a spin on typosquatting, an attack method that tricks developers into installing malicious packages by using names that closely resemble popular libraries. Unlike typosquatting, slopsquatting doesn't rely on misspellings. Instead
Keywords: ai hallucinated names package packages
Find related items on AmazonPublished on: 2025-09-07 05:10:54
X’s plan to boost revenue by selling off dormant usernames on its service is starting to shape up. According to recent changes found in X’s web application, the company is setting up a “handle inquiry” process that will allow Verified Organizations — companies and other organizations that already have a $1,000 per month X subscription — to bid on abandoned X handles. Those bids will start at $10,000 and may range to over $500,000, according to an FAQ discovered in the web app. The updates were
Keywords: handle handles process usernames users
Find related items on AmazonPublished on: 2025-09-12 20:37:43
Mark Gurman’s recent Q&A revealed a little snippet of information about iOS 19 – its codename within the Apple teams working on it – and it sounds very much like it tells us what to expect … That codename is Solarium, and the internet was quick to jump on this as a clear description of the upcoming design language. Merriam-Webster defines the word as “a glass enclosed porch or room.” Couple that to Apple’s frosted glass WWDC 2025 graphic, and reports of a UI based on Vision Pro, and it seems l
Keywords: apple codename codenames ios little
Find related items on AmazonPublished on: 2025-09-15 04:07:44
oss-sec mailing list archives Three bypasses of Ubuntu's unprivileged user namespace restrictions Qualys Security Advisory Three bypasses of Ubuntu's unprivileged user namespace restrictions ======================================================================== Contents ======================================================================== Summary Bypass via aa-exec Bypass via busybox Bypass via LD_PRELOAD Acknowledgments Timeline (advisory sent to the Ubuntu Security Team on January 15, 2
Keywords: namespace namespaces ubuntu unprivileged user
Find related items on AmazonPublished on: 2025-09-16 17:14:34
Three security bypasses have been discovered in Ubuntu Linux’s unprivileged user namespace restrictions, which could be enable a local attacker to exploit vulnerabilities in kernel components. The issues allow local unprivileged users to create user namespaces with full administrative capabilities and impact Ubuntu versions 23.10, where unprivileged user namespaces restrictions are enabled, and 24.04 which has them active by default. Linux user namespaces allow users to act as root inside an i
Keywords: namespace qualys restrictions ubuntu user
Find related items on AmazonPublished on: 2025-09-20 08:35:46
Why build a new low-level container runtime? The idea of separating the low-level container runtime concerns into its own tool or microservice is not new. Outside of the Kubernetes CRI, which presents container lifecycle management as a pluggable microservice, there are simpler tools which provide a low-level container runtime as well, such as the unshare utility in util-linux, as well as another tool called Bubblewrap. But these tools are either too high-level (like the Kubernetes CRI), or th
Keywords: container linux namespace namespaces styrolite
Find related items on AmazonPublished on: 2025-09-20 08:44:21
A Venmo account under the name “Michael Waltz,” carrying a profile photo of the national security adviser and connected to accounts bearing the names of people closely associated with him, was left open to the public until Wednesday afternoon. A WIRED analysis shows that the account revealed the names of hundreds of Waltz’s personal and professional associates, including journalists, military officers, lobbyists, and others—information a foreign intelligence service or other actors could exploit
Keywords: account accounts names news waltz
Find related items on AmazonPublished on: 2025-09-20 08:42:00
We’ve had rumors, we’ve had trade reports, we’ve had enough speculation for years that Marvel would be trying to pull off the impossible to get people amped up for its next set of Avengers films. And now, it’s doing so by assembling quite the roster of familiar names. In a live stream today, Marvel teased a huge amount of upcoming talent to announce Avengers: Doomsday entering production, by tantalizingly laying out director’s chairs with star names on the back, in a long line. A very long line
Keywords: avengers downey long marvel names
Find related items on AmazonPublished on: 2025-09-21 09:42:00
We’ve had rumors, we’ve had trade reports, we’ve had enough speculation for years that Marvel would be trying to pull off the impossible to get people amped up for its next set of Avengers films. And now, it seems like they’re doing so by assembling quite the roster of familiar names. In an ongoing live stream this morning, Marvel is teasing a huge amount of upcoming talent to announce Avengers: Doomsday entering production, by tantalizingly laying out director’s chairs with star names on the b
Keywords: avengers long marvel names ve
Find related items on AmazonPublished on: 2025-10-15 20:04:19
With so much traffic on the global Internet day after day, it’s not always easy to spot the occasional irregularity. After all, there are numerous layers of complexity that go into the serving of webpages, with multiple companies, agencies, and organizations each playing a role. That’s why when something does catch our attention, it’s important that various entities work together to explore the cause and, more importantly, try to identify whether it’s a malicious actor at work, a glitch in the
Keywords: com names queries query root
Find related items on AmazonPublished on: 2025-10-16 14:03:51
C++/WinRT pull request 1225 fixed a problem with a call to invoke . What’s the problem, why did it show up all of a sudden, and what can you do if you are stuck on an older version of C++/WinRT? The problem is at the point in winrt:: impl:: promise_base ::set_completed makes an unqualified call to invoke() : namespace winrt::impl { ⟦ ... ⟧ template <typename Delegate, typename... Arg> bool invoke(Delegate const& delegate, Arg const&... args) noexcept; ⟦ ... ⟧ template <typename Derived, typena
Keywords: handler invoke namespace std winrt
Find related items on AmazonPublished on: 2025-10-28 22:54:37
Steve Friedl's Unixwiz.net Tech Tips An Illustrated Guide to the Kaminsky DNS Vulnerability The big security news of Summer 2008 has been Dan Kaminsky's discovery of a serious vulnerability in DNS. This vulnerability could allow an attacker to redirect network clients to alternate servers of his own choosing, presumably for ill ends. This all led to a mad dash to patch DNS servers worldwide, and though there have been many writeups of just how the vulnerability manifests itself, we felt the ne
Keywords: answer dns nameserver net query
Find related items on AmazonPublished on: 2025-10-29 08:54:37
Steve Friedl's Unixwiz.net Tech Tips An Illustrated Guide to the Kaminsky DNS Vulnerability The big security news of Summer 2008 has been Dan Kaminsky's discovery of a serious vulnerability in DNS. This vulnerability could allow an attacker to redirect network clients to alternate servers of his own choosing, presumably for ill ends. This all led to a mad dash to patch DNS servers worldwide, and though there have been many writeups of just how the vulnerability manifests itself, we felt the ne
Keywords: answer dns nameserver net query
Find related items on AmazonPublished on: 2025-11-05 00:23:38
Cable company Altice agreed to give Warner and other record labels the names and contact information of 100 broadband subscribers who were accused of pirating songs. The subscribers "were the subject of RIAA or third party copyright notices," said a court order that approved the agreement between Altice and the plaintiff record companies. Altice is notifying each subscriber "of Altice's intent to disclose their name and contact information to Plaintiffs pursuant to this Order," and telling the
Keywords: altice names notices plaintiffs subscribers
Find related items on AmazonGo K’awiil is a project by nerdhub.co that curates technology news from a variety of trusted sources. We built this site because, although news aggregation is incredibly useful, many platforms are cluttered with intrusive ads and heavy JavaScript that can make mobile browsing a hassle. By hand-selecting our favorite tech news outlets, we’ve created a cleaner, more mobile-friendly experience.
Your privacy is important to us. Go K’awiil does not use analytics tools such as Facebook Pixel or Google Analytics. The only tracking occurs through affiliate links to amazon.com, which are tagged with our Amazon affiliate code, helping us earn a small commission.
We are not currently offering ad space. However, if you’re interested in advertising with us, please get in touch at [email protected] and we’ll be happy to review your submission.