Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: protocol Clear Filter

Google launches new protocol for agent-driven purchases

On Tuesday, Google announced a new open protocol for purchases initiated by AI agents — automated software programs that can shop and make decisions on behalf of users — with backing from more than 60 merchants and financial institutions. Called the Agent Payments Protocol (AP2), the system is meant to be interoperable between AI platforms, payment systems and vendors, providing a traceable paper trail for each transaction. In a post announcing the protocol, Google executives emphasized their c

Microsoft says Windows September updates break SMBv1 shares

​Microsoft has confirmed that the September 2025 Windows security updates are causing connection issues to Server Message Block (SMB) v1 shares. The list of platforms affected by this known issue is quite extensive, as it includes both client (Windows 11 24H2/23H2/22H2 and Windows 10 22H2/21H2) and server (Windows Server 2025 and Windows Server 2022) platforms. In a service alert seen by BleepingComputer, Microsoft said this known issue affects those connecting to SMBv1 shares over the NetBIOS

Bring Your Own Agent to Zed – Featuring Gemini CLI

You can now interact with third-party agents directly within Zed. To make this possible, we created the Agent Client Protocol (ACP), and we've partnered with Google to integrate Gemini CLI as the initial reference implementation. Because software developers rely on diverse tools in a variety of different tech stacks, we see room for multiple agents competing to solve problems in different domains. Just as the Language Server Protocol unbundled language intelligence from monolithic IDEs, our goa

Blacksky grew to millions of users without spending a dollar

If you haven’t been watching closely, you could be forgiven for assuming that Bluesky is a just liberal Twitter clone, or a newfangled imitator of Mastodon. But under the surface, something fascinating has been happening: this is the first time ever that a public benefit corporation with a small team has quickly scaled an open source social network, built on top of decentralized infrastructure, to tens of millions of users. For us at New_ Public, nothing illustrates the potential of this model

Social media's next evolution: decentralized, open-source, and scalable

If you haven’t been watching closely, you could be forgiven for assuming that Bluesky is a just liberal Twitter clone, or a newfangled imitator of Mastodon. But under the surface, something fascinating has been happening: this is the first time ever that a public benefit corporation with a small team has quickly scaled an open source social network, built on top of decentralized infrastructure, to tens of millions of users. For us at New_ Public, nothing illustrates the potential of this model

Media over QUIC (MoQ): Refactoring the Internet's real-time media stack

13 min read For over two decades, we've built real-time communication on the Internet using a patchwork of specialized tools. RTMP gave us ingest. HLS and DASH gave us scale. WebRTC gave us interactivity. Each solved a specific problem for its time, and together they power the global streaming ecosystem we rely on today. But using them together in 2025 feels like building a modern application with tools from different eras. The seams are starting to show—in complexity, in latency, and in the f

ForgeFed: ActivityPub-based forge federation protocol

ForgeFed is a federation protocol for software forges and code collaboration tools for the software development lifecycle and ecosystem. This includes repository hosting websites, issue trackers, code review applications, and more. ForgeFed provides a common substrate for people to create interoperable code collaboration websites and applications. Federation means that these websites can interact, allowing the humans using them to interact too, despite being registered on different websites. Fo

A large number of protocols on Ethereum and Solana blockchains have no revenue

Have you heard of disguised unemployment? It refers to a situation where a portion of the workforce appears to be employed, but isn't contributing to the economy's output. Consider the massive capital expenditure loss from ghost cities, which represent unoccupied infrastructure. Something similar can be said for the top smart contract blockchains, which hosts hundreds of decentralized protocols. Of these, only a minority are generating revenue, while the rest produce no yield, loosely represent

MCP overlooks hard-won lessons from distributed systems

Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises Fool me once, shame on you; fool me twice, shame on me. Julien Simon 9 min read · Jul 29, 2025 -- 19 Listen Share The Model Context Protocol (MCP) promises to standardize AI-tool interactions as the “USB-C for AI.” While its simplicity accelerates adoption, MCP systematically overlooks four decades of hard-won lessons from distributed systems. This isn’t an academic concern: enterprises deploying MCP today are buildin

MCP's Disregard for 40 Years of RPC Best Practices

Why MCP’s Disregard for 40 Years of RPC Best Practices Will Burn Enterprises Fool me once, shame on you; fool me twice, shame on me. Julien Simon 9 min read · Jul 29, 2025 -- 26 Listen Share The Model Context Protocol (MCP) promises to standardize AI-tool interactions as the “USB-C for AI.” While its simplicity accelerates adoption, MCP systematically overlooks four decades of hard-won lessons from distributed systems. This isn’t an academic concern: enterprises deploying MCP today are buildin

Microsoft 365 apps to soon block file access via FPRPC by default

Microsoft has announced that the Microsoft 365 apps for Windows will start blocking access to files via the insecure FPRPC legacy authentication protocol by default starting late August. These changes apply only to Microsoft 365 apps for Windows and will not affect Microsoft Teams users across Windows, Mac, web, iOS, or Android. "Microsoft 365 apps will block insecure file open protocols like FPRPC by default starting version 2508, with new Trust Center settings to manage these protocols," the

Show HN: Aura – Like robots.txt, but for AI actions

AURA: The Protocol for a Machine-Readable Web AURA (Agent-Usable Resource Assertion) is an open protocol for making websites understandable and operable by AI agents. It proposes a new standard for AI-web interaction that moves beyond fragile screen scraping and DOM manipulation towards a robust, secure, and efficient machine-readable layer for the internet. The web was built for human eyes. AURA is a specification for giving it a machine-readable "API". The Vision: Why AURA? Current AI agen

These protocols will help AI agents navigate our messy lives

What should these protocols say about security? Researchers and developers still don’t really understand how AI models work, and new vulnerabilities are being discovered all the time. For chatbot-style AI applications, malicious attacks can cause models to do all sorts of bad things, including regurgitating training data and spouting slurs. But for AI agents, which interact with the world on someone’s behalf, the possibilities are far riskier. For example, one AI agent, made to read and send e

QUIC for the kernel

QUIC for the kernel Ready to give LWN a try? With a subscription to LWN, you can stay current with what is happening in the Linux and free-software community and take advantage of subscriber-only site features. We are pleased to offer you a free trial subscription, no credit card required, so that you can see for yourself. Please, join us! The QUIC transport-layer network protocol is not exactly new; it was first covered here in 2013. Despite carrying a significant part of the traffic on the I

QUIC for the Kernel

QUIC for the kernel The QUIC transport-layer network protocol is not exactly new; it was first covered here in 2013. Despite carrying a significant part of the traffic on the Internet, QUIC has been anything but quick when it comes to getting support into the Linux kernel. The pace might be picking up, though; Xin Long has posted the first set of patches intended to provide mainline support for this protocol. QUIC was created to address a number of problems that have been observed with TCP on

Extending Emacs with Fennel (2024)

After watching this year’s EmacsConf and seeing Guile Emacs being resurrected I thought to myself - why limit ourselves to Guile? Sure, Guile isn’t just a Scheme implementation, thanks to its compiler-tower-based design. Other languages exist for Guile VM, such as Emacs Lisp, and Guile manual lists the following languages with various stages of completeness: ECMAScript Brainfuck Lua Ruby Python Sure, it would be nice, if Emacs could natively run all of these, but we have to understand, tha

5 key questions your developers should be asking about MCP

Want smarter insights in your inbox? Sign up for our weekly newsletters to get only what matters to enterprise AI, data, and security leaders. Subscribe Now The Model Context Protocol (MCP) has become one of the most talked-about developments in AI integration since its introduction by Anthropic in late 2024. If you’re tuned into the AI space at all, you’ve likely been inundated with developer “hot takes” on the topic. Some think it’s the best thing ever; others are quick to point out its short

Topics: ai mcp protocol tool use

Jack Dorsey backs an open-source development collective with $10 million

Jack Dorsey has been back in the news lately after unveiling a pair of new apps he worked on, Bluetooth-based messenager Bitchat and UV exposure tracker Sun Day . The Block CEO put those together under the auspices of a new development collective called "and Other Stuff," a nonprofit that he is backing with a $10 million cash injection through his StartSmall foundation , as TechCrunch reports. The group plans to work on open-source projects, including ones that could become consumer social medi

Linux Foundation adopts A2A protocol to help solve one of AI's most pressing challenges

koto_feja/Getty Images The Linux Foundation announced at the Open Source Summit in Denver that it will now host the Agent2Agent (A2A) protocol. Initially developed by Google and now supported by more than 100 leading technology companies, A2A is a crucial new open standard for secure and interoperable communication between AI agents. Also: What are AI agents? How to access a team of personalized assistants In his keynote presentation, Mike Smith, a Google staff software engineer, told the con

MCP: An (Accidentally) Universal Plugin System

There's this thing about USB-C that nobody really talks about. Not the part where we all had to buy new dongles (RIP my dongle drawer, 2010-2023). The other part. See, we all thought USB-C was just going to be about charging things and moving files around like the other USBs. Very serious. Very purposeful. But because of the way it is it can do... other things. My friend Rex connected his toaster to his monitor last week. I don't know why. The toaster doesn't know why. But it worked, and now R

Topics: ai just like mcp protocol

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

Ariadne Suite ariadne.ciphernomad.org This repository contains the Ariadne Suite, our canonical Rust implementation of the Ariadne Protocol. The protocol is a novel cryptographic architecture we designed around the Labyrinth Construction to provide aperiodic, or non-repeating, cryptographic transformations. The project mission is to create resilient, open-source tools for digital sovereignty. This is independent research, released as a public good. Its continuation, development, and future s

KiCad and Wayland Support

These problems exist because Wayland’s design omits basic functionality that desktop applications for X11, Windows and macOS have relied on for decades—things like being able to position windows or warp the mouse cursor. This functionality was omitted by design, not oversight. The fragmentation doesn’t help either. GNOME interprets protocols one way, KDE another way, and smaller compositors yet another way. As application developers, we can’t depend on a consistent implementation of various Way

Show HN: I wrote a BitTorrent Client from scratch

A BitTorrent client implementation in Go that supports downloading files using the BitTorrent protocol. This project implements the core functionality of a BitTorrent client, including torrent file parsing, peer discovery, and file downloading. Features Bencode Encoding/Decoding Support for all Bencode types (strings, integers, lists, dictionaries) Robust error handling and validation Torrent File Processing Parse .torrent files (both single-file and multi-file torrents) Info hash calculation