Why is my air fryer spying on me? We reveal the smart devices gathering data
In a revealing investigation, Which? scrutinizes smart devices, uncovering extensive data collection practices that often exceed functional needs, raising privacy concerns. The study highlights how products like air fryers, smartwatches, TVs, and speakers gather data, sometimes sharing it with third parties for marketing. Notably, air fryers from Xiaomi and Aigostar request unnecessary permissions, such as audio recording, and send data to China. Smartwatches from Huawei and others demand "risky" permissions, while smart TVs from Samsung and LG connect to multiple trackers. Which? urges manufacturers to prioritize privacy over profit, emphasizing the need for clear guidelines and enforcement, especially for foreign companies. The upcoming ICO guidance in 2025 is crucial for ensuring transparency and consumer protection.
Netflix buffering issues: Boxing fans complain about Jake Paul vs. Mike Tyson
Boxing fans eagerly anticipated Netflix's live stream of the Jake Paul vs. Mike Tyson fight, but were met with significant technical issues, including buffering, choppy analysis, and the "black screen of death." As the main card progressed, social media buzzed with complaints about Netflix's performance. This raises concerns, especially with Netflix slated to stream two NFL games on Christmas Day. The increased viewership may have worsened the streaming problems, leaving fans frustrated as they missed key moments, such as the Mario Barrios vs. Abel Ramos match. This situation poses a challenge for boxing promoters relying on Netflix for smooth broadcasts.
Amazon employees send AWS chief an letter against RTO policy
In a recent open letter, 523 Amazon Web Services employees expressed their dissatisfaction with the company's new return-to-office (RTO) policy, which mandates a five-day office presence starting January 2025. The employees argue that their remote work during the pandemic proved effective and that the policy disregards these lessons. Amazon CEO Andy Jassy and AWS chief Matt Garman advocate for in-person work to boost collaboration and innovation, but employees criticize this stance as lacking data-driven support. The letter highlights a growing cultural shift at Amazon, with concerns that the RTO policy could lead to a loss of experienced staff, undermining the company's innovative edge. The controversy centers on the perceived disconnect between leadership's claims and employee experiences, as well as the lack of data supporting the RTO decision.
Getting Started with FPGAs
I wrote a book titled Getting Started with FPGAs, aimed at making field programmable gate arrays (FPGAs) accessible and enjoyable for both novices and seasoned enthusiasts. This guide is best paired with the Go Board, a development board I designed to facilitate hands-on learning. Through detailed code examples in Verilog and VHDL, patient explanations, and practical projects, you'll learn to think like an FPGA engineer. The book covers digital logic basics, state machines, and the FPGA build process, including simulation and synthesis. You'll also explore key FPGA primitives and learn to implement design building blocks, manage clock domains, and perform high-speed data transmission. With this comprehensive guide, creating functional FPGA projects becomes straightforward and engaging.
Tsugaru OS – A New Free FM-Towns OS
Tsugaru OS is a copyright-free operating system designed for the FM Towns platform, allowing users to run free and re-released games without infringing on the original Towns OS copyrights. The project aims to support the development of new FM Towns applications and currently enables the play of popular games like Panic Ball 2, VSGP, and Sky Duel without using any original Towns OS files. Tsugaru OS is unique in its ability to boot without CMOS setup, assigning drive letters from the first partition of SCSI ID 0. It utilizes external tools like Free386 and ORICON, and requires specific software for building, including Python, NASM, and Visual C++.
NSO's attacks against WhatsApp users unsealed
In a significant legal win for WhatsApp, a U.S. federal judge has unsealed documents revealing the operations of NSO Group's Pegasus spyware. These documents, sourced from NSO employee depositions and internal communications, including WhatsApp messages, highlight the spyware's use against journalists and activists. Notably, NSO disconnected 10 government clients for misuse. The documents challenge NSO's claims of non-involvement in cyberattacks, showing that clients only needed to input a target's phone number for Pegasus to operate. This revelation could aid global lawsuits against NSO. Despite NSO's denial of wrongdoing, WhatsApp's persistence in legal action is yielding results. Controversially, the documents suggest NSO's deeper involvement in targeting decisions than previously admitted.
Philosopher of Change: How Henri Bergson's View of Reality Came to Be
In "Philosopher of Change: How Henri Bergson's View of Reality Came to Be," the narrative unfolds against the backdrop of Henri Bergson's early life, marked by his father's fluctuating fortunes and the family's frequent relocations. Born in 1859 to Michal and Kate Bergson, Henri's upbringing was shaped by instability and adaptation, mirroring the philosophical ideas he would later champion. Bergson's philosophy, which posits that change is the essence of reality rather than a mere overlay on a static world, emerged from his experiences of upheaval and transformation. This perspective, which challenged traditional views of permanence, eventually propelled him to global fame, even overshadowing Darwinism at its peak. The article highlights the unique and clever inversion of philosophical norms that Bergson proposed, emphasizing change as the fundamental reality.
A Visual Guide to the Aztec Pantheon
As a lifelong enthusiast of South American and Mesoamerican civilizations, inspired by the anime The Mysterious Cities of Gold, I embarked on a journey to explore the rich tapestry of the Aztec Pantheon. Despite my early fascination, I initially knew only a couple of Aztec gods, unlike the numerous Greek, Egyptian, or Norse deities I could name. Ten years ago, I discovered Aztec codices, which opened up a world of over a hundred deities, each with unique roles in human life. Through painstaking research and restoration of illustrations, I aim to celebrate the complexity of the Aztec Pantheon and make it accessible to a wider audience. The challenge lies in the fragmented and sometimes contradictory sources, exacerbated by the historical destruction of rival materials by the Aztecs and the subsequent annihilation by Spanish conquerors. Despite these challenges, the work of early anthropologists like Bernardino de Sahagún remains invaluable. This project is ongoing, with 137 gods cataloged so far, and I invite collaboration to expand this database. Special thanks to those who supported my research, and I recommend resources like Mexicolore and MayaIncaAztec for further exploration.
Pleasant Debugging with GDB and DDD
In "Pleasant Debugging with GDB and DDD," the author explores the intricacies of using GDB, a powerful debugger for Linux and BSD systems, and its graphical front-end, DDD. While GDB's interface is cryptic, mastering it is rewarding. The article provides various configuration and scripting tips to enhance the debugging experience. It discusses four customization options for GDB, from using the default interface to employing graphical front-ends like DDD. Despite DDD's age and the need for configuration tweaks to work with newer GDB versions, it offers valuable features, such as remote debugging over SSH. The author highlights the clever use of GDB in batch mode for profiling and analyzing core dumps. A notable challenge with DDD is its tendency to freeze due to misinterpreted GDB settings, but the author provides solutions to address this issue. The article is a practical guide for those familiar with debugging basics, aiming to improve their workflow with GDB and DDD. (Summary based on 41% of story text.)
TSMC secures $11.6B in funding as CHIPS Act faces uncertain future
Taiwan Semiconductor Manufacturing Company (TSMC) has successfully secured $11.6 billion in funding, a significant boost amid the uncertain future of the U.S. CHIPS Act. This development underscores TSMC's strategic positioning in the semiconductor industry, as it navigates geopolitical tensions and supply chain challenges. The CHIPS Act, designed to bolster domestic semiconductor production in the U.S., faces legislative hurdles, casting doubt on its implementation. TSMC's funding highlights its proactive approach to maintaining its market leadership. The situation presents a unique intersection of global politics and technology, with potential implications for international trade and economic policies.
Show HN: A Tiny-C language compiler, rewritten in Python
The PyTiny-C project is a Python-based compiler for the Tiny-C language, which is a simplified version of C designed for educational purposes to help users learn about compiler construction. The project involves translating the original Tiny-C compiler from C to Python while maintaining a close one-to-one correspondence between the two languages. Tiny-C supports a limited set of features, including predefined integer variables from "a" to "z" initialized to zero, and does not allow the declaration of new variables. The compiler reads input from standard input and outputs non-zero variable values. It supports basic control structures like if-else, while, and do-while loops, and performs minimal error checking to emphasize the compiler's structure. This project is particularly useful for those interested in understanding compiler design and implementation in a simplified context.
Find a needle in a haystack with Git bisect
In my quest to pinpoint the source of a regression bug, I turned to my trusty tool, Git bisect. The bug was reported on October 21 and was absent in our previous release, branched from main as release-5.7.0. With significant changes in main since then, I needed to find the exact commit that introduced the bug. Starting with a known good commit from the merge-base of main and release-5.7.0, and a bad commit from just before the bug report, I faced 2,088 intervening commits. Git bisect, employing a binary search approach, efficiently narrowed this down to just 11 commits, ultimately identifying commit1234 as the culprit. This clever tool saved me considerable time, highlighting its invaluable role in debugging.
What would it cost to kill coal
Coal, the dirtiest fossil fuel, still accounts for a third of global energy, posing a significant challenge to climate efforts. The article explores the financial implications of phasing out coal, calculating the cost of compensating investors for their coal plants. Using data from Global Energy Monitor and Rystad Energy, the analysis estimates a $5.7 trillion price tag to end coal, with a cost of $34 per tonne of CO2 emissions avoided. This is notably cheaper than typical carbon offsets or direct air capture. However, the political complexities, particularly involving Chinese entities, make this transition daunting. Despite these challenges, the potential climate benefits of eliminating coal are immense, highlighting the need for innovative and efficient solutions. The surprising insight is the relatively low cost per tonne of CO2 avoided compared to other methods, emphasizing the economic feasibility of this approach.
Black Plastic Kitchen Tools Might Expose You to Toxic Chemicals
In this article, we explore the potential health risks associated with black plastic kitchen tools, which may expose users to toxic chemicals. Recent studies suggest that microplastics, often found in these tools, could contribute to heart disease, lung disorders, and other health issues. To help mitigate these risks, we offer 12 practical tips for reducing exposure, such as opting for alternatives like stainless steel or wood, and avoiding high-heat cooking with plastic utensils. This topic is particularly concerning due to the widespread use of plastic in everyday kitchenware, highlighting the need for increased awareness and safer choices in our kitchens.
The Polars vs. Pandas difference nobody is talking about – Labs
At PyData Berlin 2024, Polars generated buzz, especially for its features like lazy execution and multithreading. However, a key innovation often overlooked is its support for non-elementary group-by aggregations. While pandas handles elementary aggregations well, it struggles with complex operations like finding the maximum 'views' where 'sales' exceed their mean per 'id'. The pandas API requires cumbersome workarounds, often involving inefficient Python lambda functions. In contrast, Polars allows these operations to be expressed cleanly using its syntax, enabling efficient execution. This highlights the potential limitations of dataframe libraries that mimic pandas' API, urging developers to embrace innovative approaches like Polars.
Don't Look Twice: Faster Video Transformers with Run-Length Tokenization
In "Don't Look Twice: Faster Video Transformers with Run-Length Tokenization," we introduce Run-Length Tokenization (RLT), a novel method to enhance the efficiency of video transformers by eliminating redundant tokens from the input. Unlike existing methods that progressively prune tokens, leading to overhead and no training speedup, or content-agnostic approaches that require dataset-specific tuning, RLT preemptively identifies and removes redundant tokens. This content-aware strategy replaces repeated tokens with a single token and a positional encoding, offering a significant speedup with minimal accuracy loss. RLT boosts throughput by 40% with just a 0.1% accuracy drop in action recognition and reduces fine-tuning time by over 40%, maintaining baseline performance. It also excels in video-language tasks, reducing training time and throughput by 30% on Epic Kitchens-100. On datasets like Kinetics-400 and UCF101, RLT cuts token count by 30%, and up to 80% on longer videos or higher FPS settings. The cleverness of RLT lies in its ability to enhance efficiency without additional training or dataset-specific adjustments.
Learn how to safely catch venomous funnel-web spiders
In an intriguing call to action, the Australian Reptile Park (ARP) is urging Sydneysiders to safely collect funnel-web spiders and their egg sacs during the breeding season. This initiative, which may seem daunting to some, is crucial for producing antivenom that has saved countless lives since 1981. Despite the spiders' fearsome reputation, ARP assures the public that capturing them is safe if done correctly, as they cannot climb plastic or glass. The park's social media post humorously suggested putting the "fun" back in "funnel-web," sparking both amusement and interest. With perfect conditions for increased sightings, ARP emphasizes the importance of public participation to meet the demand for venom. Notably, survivors like Nicole Webber and Karen Wright credit the antivenom program for saving their lives, underscoring its life-saving impact.
Beating the bookies with their own numbers
In "Beating the Bookies with Their Own Numbers," Lisandro Kaunitz and colleagues reveal how the online sports betting market is skewed in favor of bookmakers through sophisticated data analysis. While traditional strategies like expert predictions and arbitrage have shown inconsistent results, the authors propose a novel approach: exploiting the probability information embedded in publicly available odds to identify mispriced bets. Their strategy demonstrated profitability in both historical simulations and real-world betting over several months. The study highlights the inefficiency of the football betting market and exposes how bookmakers counteract these inefficiencies with discriminatory practices against successful bettors. This revelation is both surprising and controversial, as it challenges the perceived fairness of the sports gambling industry.
Show HN: Linux Voice AI
Linux Voice AI introduces an innovative way to interact with your Linux desktop through voice commands, eliminating the need for manual input. This tool empowers users to execute tasks effortlessly, enhancing productivity and accessibility. The platform is designed to seamlessly integrate with existing Linux systems, offering a hands-free experience. A unique aspect of Linux Voice AI is its open-source nature, encouraging community collaboration and customization. While the technology promises convenience, some users may raise concerns about privacy and data security, as voice-activated systems often involve data processing. Nonetheless, Linux Voice AI represents a significant step forward in user interface evolution.
How Public Key Cryptography Works, Using Only Simple Math
Public key cryptography revolutionizes secure communication by using two keys: a public key for encryption and a private key for decryption. Unlike traditional methods that rely on a shared secret, this system allows anyone to encrypt a message, but only the intended recipient can decrypt it. This is akin to using invisible ink, where anyone can make a message disappear, but only the recipient can make it reappear. The concept relies on mathematical puzzles called trapdoor functions, which are easy to compute in one direction but difficult to reverse without a secret. The RSA algorithm, developed in 1977, remains a cornerstone of internet security. However, quantum computing poses a potential threat by efficiently reversing these functions, though solutions like lattice problems are being explored. The surprising aspect is how public key cryptography, despite its complexity, has become fundamental to modern digital communication, including digital signatures and cryptocurrencies. The controversy lies in the looming threat of quantum computing, which could undermine current cryptographic systems.
OpenAI's tumultuous early years revealed in emails from Musk, Altman, and others
In a revealing glimpse into OpenAI's early years, a lawsuit has unearthed emails between Elon Musk, Sam Altman, and others, highlighting internal tensions and strategic decisions. The emails expose Musk's desire for control over OpenAI, despite his stated aversion to being CEO, raising concerns about potential AGI dictatorship. Former chief scientist Ilya Sutskever voiced worries about Musk's leadership and Altman's motivations, suggesting Altman's focus was more business-oriented than philosophical. Notably, OpenAI considered acquiring chipmaker Cerebras via Tesla, but this plan was abandoned. Microsoft's early involvement, offering $60 million in Azure compute, was met with skepticism, with Musk expressing disdain for corporate alliances. Additionally, Valve's Gabe Newell was an early advisor, though his role remains unclear. The controversy lies in the existential threat of AI and corporate control, with Musk's intentions and Altman's business focus being central points of contention.
Ask HN: How to check who the black bar is honoring?
In a post on Hacker News, a user inquires about the black bar displayed on the site, which typically signifies a tribute to someone who has passed away. The user notes the absence of any related death announcements and suggests implementing a feature that reveals the honoree's identity when hovering over the bar. This would provide clarity and context for users, enhancing their understanding of the tribute. The suggestion is practical and user-friendly, addressing a common curiosity among the community without sparking any controversy.
Jawboning in Plain Sight: The Unconstitutional Censorship Tolerated by the DMCA
The article from R Street Institute critiques the Digital Millennium Copyright Act (DMCA), particularly Section 512, for enabling government-induced censorship through "jawboning." This term refers to the indirect suppression of speech by pressuring internet intermediaries to remove content without judicial oversight, which the author argues is unconstitutional. The DMCA's safe harbor provisions protect intermediaries from liability but compel them to censor user content to maintain this protection, often based on mere accusations. The article highlights the controversy of this practice, likening it to unconstitutional censorship, and calls for amending the DMCA to prevent such coercion and protect free speech. The discussion is timely, given recent Supreme Court cases addressing similar issues of government pressure on internet platforms. (Summary based on 20% of story text.)
7th Circuit Again Says Long-Term Pole Camera Surveillance Isn't Unconstitutional
The Seventh Circuit Appeals Court has once again ruled that long-term pole camera surveillance is not unconstitutional, despite concerns about privacy and evolving technology. In the Tuggle case, the court expressed hesitation in fully endorsing 18 months of surveillance, highlighting the problematic nature of the Katz test, which bases Fourth Amendment searches on societal expectations of privacy. As technology becomes more pervasive, these expectations diminish, potentially granting the government broader surveillance powers with fewer constitutional checks. The court upheld the constitutionality of 13 months of surveillance in a similar case, despite arguments that prolonged, warrantless monitoring constitutes a Fourth Amendment search. The controversy lies in the court's reliance on outdated precedents, which may not adequately address modern surveillance capabilities, such as facial recognition and data aggregation. The concurring opinion suggests it's time to reconsider these precedents in light of technological advancements, emphasizing the need for courts to adapt to changing privacy expectations.
Consuming the Bluesky firehose for less than $2.50/mo
In this playful exploration of Bluesky's data, I demonstrate how to access the platform's firehose for less than $2.50 a month. With Bluesky's 15 million users and rapid growth, the public data available is vast and intriguing. By using Jetstream, you can connect to the entire network in real-time via a websocket JSON feed. I created a simple app that captures and displays deleted posts anonymously, offering a glimpse into what users choose to erase. This app runs efficiently on Fly's smallest instance, costing just $1.94 monthly, plus $0.30 for storage. While this app is basic, it highlights the potential for more complex applications to operate cost-effectively. The concept of showcasing deleted content might raise privacy concerns, as it involves displaying information users intended to remove.
India is turning into an SUV country
India is rapidly embracing SUVs, a trend evident as you travel to Bangalore, the nation's startup hub. The journey begins smoothly at the city's new garden-themed terminal and continues on the well-maintained National Highway 44. However, navigating within Bangalore presents a stark contrast, as it holds the title of India's most congested city. According to TomTom, a navigation-technology firm, rush hour speeds average a mere 18kph (11mph). This juxtaposition highlights the growing preference for larger vehicles despite the city's notorious traffic woes, raising questions about urban planning and environmental impact in the face of increasing SUV popularity.
Ask HN: Have you gotten anywhere cold messaging investors?
In the Hacker News thread titled "Ask HN: Have you gotten anywhere cold messaging investors?", the author seeks insights from fellow entrepreneurs about their experiences with cold messaging investors. The discussion revolves around whether unknown startup founders have successfully secured funding by reaching out to investors through emails, LinkedIn messages, or website applications. The author is curious about the outcomes of such efforts and the volume of contacts needed to achieve success. This inquiry taps into the broader debate about the effectiveness of cold outreach in the startup ecosystem, highlighting the challenges faced by founders without established networks.
Noam Chomsky Has Been Proved Right
In "Noam Chomsky Has Been Proved Right," the article on ForeignPolicy.com explores the enduring critiques of U.S. foreign policy by Noam Chomsky, as encapsulated in the book "The Myth of American Idealism" co-authored by Nathan J. Robinson. Chomsky's work challenges the notion that U.S. foreign policy is driven by ideals like democracy and human rights, arguing instead that it often serves corporate interests and results in significant global harm. The book critiques the hypocrisy of U.S. actions, such as supporting dictatorships and violating international laws, while questioning the limited role of public influence in policy-making. The article acknowledges the complexity of these issues, noting that corporate interests don't always dictate policy and that other global powers have acted similarly. It also raises questions about public consent and the resilience of U.S. global influence. The piece highlights the shift in credibility from mainstream narratives to Chomsky's once-marginalized perspective, marking a significant evolution in the discourse on U.S. foreign policy.
Half-Life 2: 20th Anniversary Update
Valve has meticulously revisited every map in Half-Life 2 for its 20th Anniversary Update, addressing longstanding bugs and restoring lost content to enhance the gaming experience. The update includes fixes for disappearing objects and world holes, and it rebalances lighting to accommodate HDR settings, using the original release as a benchmark. Notably, the introduction of new radial fog results in cleaner horizon lines, and higher-resolution lightmaps have been added throughout the game. A unique touch is the restoration of the G-Man model’s reflective eye glint, removing the unintended green glow. Additionally, missing grass sprites and blacked-out models have been corrected, ensuring a more polished and immersive experience for players.
Unexpected Keyboard – customiseable Android Keyboard with all keys available
The "Unexpected Keyboard" is a lightweight, privacy-conscious virtual keyboard for Android, designed to enhance typing efficiency by allowing users to access more characters through swiping keys towards their corners. Originally created for programmers using Termux, it is now suitable for everyday use. The keyboard is ad-free, does not make network requests, and is open source, emphasizing user privacy. Its unique feature of corner-swiping for additional symbols differentiates it from other keyboards. The project invites contributions, with building instructions available in the Contributing section. A similar app, Calculator++, offers a comparable user experience for advanced math operations.