FediMeteo: How a Tiny €4 FreeBSD VPS Became a Global Weather Service for Thousands
https://it-notes.dragas.net/2025/02/26/fedimeteo-how-a-tiny-freebsd-vps-became-a-global-weather-service-for-thousands/ [it-notes.dragas.net]
2025-04-23 05:11
tags:
admin
hoipolloi
social
This article, although in some parts very conversational, aims to demonstrate how it’s possible to build solid, valid, and efficient solutions without the need to use expensive and complex services. Moreover, this is the demonstration of how it’s possible to have your online presence without the need to put your data in the hands of third parties or without necessarily having to resort to complex stacks. Sometimes, less is more.
source: Dfly
Cheating the Reaper in Go
https://mcyoung.xyz/2025/04/21/go-arenas/ [mcyoung.xyz]
2025-04-21 23:49
tags:
garbage-collection
go
malloc
programming
These things mean that despite Go having a GC, it’s possible to do manual memory management in pure Go and in cooperation with the GC (although without any help from the runtime package). To demonstrate this, we will be building an untyped, garbage-collected arena abstraction in Go which relies on several GC implementation details.
source: HN
Marching Events: What does iCalendar have to do with ray marching?
https://pwy.io/posts/marching-events/ [pwy.io]
2025-04-18 05:31
tags:
format
programming
rust
I’ve found a way of describing occurrences through distance functions. This means that instead of implementing logic for all combinations of frequencies and parameters - as that spooky table from before suggests one might do - we can simply compose a couple of distance functions together.
source: HN
Unsure Calculator
https://filiph.github.io/unsure/ [filiph.github.io]
2025-04-17 20:57
tags:
ideas
math
visualization
The idea is simple: apart from regular numbers (like 4, 3.14 or 43942), you can also input ranges (like 4~6, 3.1~3.2 or 40000~45000). The character between the two extremes of the range is a tilde (~), a little wave symbol. You can find it on most keyboards, but for convenience, I also included it in the keypad above. The range notation says the following to the calculator: I am not sure about the exact number here, but I am 95% sure it’s somewhere in this range.
source: L
How a $2,000 'Made in the USA' Phone Is Manufactured
https://www.404media.co/how-a-2-000-made-in-the-usa-liberty-phone-phone-is-manufactured/ [www.404media.co]
2025-04-11 03:43
tags:
business
hardware
interview
policy
solder
tech
valley
But there is currently one smartphone that qualifies for a “Made in the USA” title from the FTC. It’s the Liberty Phone, which is made by a company called Purism. The phone is a version of Purism’s Librem 5. The Made-in-China Librem 5 costs $800, and the Liberty phone costs $2,000. It has 4 GB of memory, and reviewers say that its specs are pretty outdated. Not every single component in the Liberty Phone is made in the USA, but the company has been trying very hard to make it as American-made as possible.
source: HN
Apache ECharts
https://echarts.apache.org/en/index.html [echarts.apache.org]
2025-04-09 06:38
tags:
graphics
javascript
library
visualization
web
Apache ECharts provides more than 20 chart types available out of the box, along with a dozen components, and each of them can be arbitrarily combined to use.
source: HN
Building the System/360 Mainframe Nearly Destroyed IBM
https://spectrum.ieee.org/building-the-system360-mainframe-nearly-destroyed-ibm [spectrum.ieee.org]
2025-04-09 06:25
tags:
article
business
hardware
history
retro
In the years leading up to its 7 April 1964 launch, however, the 360 was one of the scariest dramas in American business. It took a nearly fanatical commitment at all levels of IBM to bring forth this remarkable collection of machines and software. While the technological innovations that went into the S/360 were important, how they were created and deployed bordered on disaster. The company experienced what science policy expert Keith Pavitt called “tribal warfare”: people clashing and collaborating in a rapidly growing company with unstable, and in some instances unknown, technologies, as uncertainty and ambiguity dogged all the protagonists.
source: HN
I drove 300 miles in rural Virginia, then asked police to send me their public surveillance footage of my car.
https://cardinalnews.org/2025/03/28/i-drove-300-miles-in-rural-virginia-then-asked-police-to-send-me-their-public-surveillance-footage-of-my-car-heres-what-i-learned/ [cardinalnews.org]
2025-03-29 00:52
tags:
cars
opsec
policy
So I took a daylong drive across Cardinal Country and asked 15 law enforcement agencies, using Freedom of Information Act requests, to provide me with the Flock LPR footage of my vehicle. My journey took me over 300 miles through slices of the communities those agencies serve, including the nearly 50 cameras they employ. And this journey may take me to one more place: an April Fool’s Day hearing in a courtroom in Roanoke. There, a judge will be asked to rule on a motion to declare the footage of the public to be beyond the reach of the public.
Better Shell History Search
https://tratt.net/laurie/blog/2025/better_shell_history_search.html [tratt.net]
2025-03-28 06:12
tags:
admin
sh
swtools
Using Ctrl-r and fzf roughly doubled my efficiency in the shell overnight. Interestingly, it had an even greater long term effect: I became a more ambitious user of shell commands because I knew I could outsource my memory to fzf. For example, since it’s now very easy to recall past commands, I no longer set global environment variables, which had previously caused me grief when I forgot about them. Now I set environment variables on a per-command basis, knowing that I can recall them with Ctrl-r and fzf.
source: HN
Why does the Wells Fargo Building have its own zip code?
https://www.inquirer.com/news/curious-philly-19109-zip-code-wells-fargo-20190819.html [www.inquirer.com]
2025-03-27 20:19
tags:
history
philly
urban
The answer lies in the history of the zip code and its predecessor, the postal zone.
Blasting Past Webp - An analysis of the NSO BLASTPASS iMessage exploit
https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html [googleprojectzero.blogspot.com]
2025-03-27 16:45
tags:
exploit
iphone
malloc
security
Whilst the Isosceles and Dark Navy posts explained the underlying memory corruption vulnerability in great detail, they were unable to solve another fascinating part of the puzzle: just how exactly do you land an exploit for this vulnerability in a one-shot, zero-click setup? As we’ll soon see, the corruption primitive is very limited. Without access to the samples it was almost impossible to know.
source: HN
The Ocean Liner That Could Outsprint a Torpedo
https://www.youtube.com/watch?v=Lzfc-6_twUc [www.youtube.com]
2025-03-26 19:19
tags:
architecture
design
history
transport
video
The ocean liner SS United States - renowned for her beauty and record-breaking speed - lies in wait in Mobile, Alabama, counting down the days until she is sunk and turned into an artificial reef off the coast of Florida. It is a controversial end for a vessel of such luxury and grandeur; one with a rich and magnificent history as one of the greatest ships to ever grace the waves of the Atlantic. Together, let’s celebrate her legacy through some of my own illustrations, and explore everything that made SS United States truly one of a kind.
I want a good parallel computer
https://raphlinus.github.io/gpu/2025/03/21/good-parallel-computer.html [raphlinus.github.io]
2025-03-22 17:56
tags:
concurrency
cpu
graphics
hardware
programming
I believe a simpler, more powerful parallel computer is possible, and that there are signs in the historical record. In a slightly alternate universe, we would have those computers now, and be doing the work of designing algorithms and writing programs to run well on them, for a very broad range of tasks.
source: L
CVE-2024-9956 - PassKey Account Takeover in All Mobile Browsers
https://mastersplinter.work/research/passkey/ [mastersplinter.work]
2025-03-20 05:23
tags:
auth
browser
exploit
security
web
An attacker within bluetooth range is able to trigger navigation to a FIDO:/ URI from an attacker controlled page on a mobile browser, allowing them to initiate a legitimate PassKeys authentication intent which will be received on the attacker’s device. This results in the attacker being able to “phish” PassKeys credentials, completely breaking this assumption that PassKeys are impossible to phish.
source: HN
Memory safety for web fonts
https://developer.chrome.com/blog/memory-safety-fonts [developer.chrome.com]
2025-03-19 22:52
tags:
browser
graphics
library
text
The FreeType library is used by Chrome to compute metrics and load hinted outlines from fonts. Overall, use of FreeType has been a huge win for Google. It does a complex job, and does it well, we rely on it extensively and contribute back to it. However, it is written in unsafe code and has its origins in a time when malicious inputs were less likely. Merely keeping up with the stream of issues found by fuzzing costs Google at least 0.25 full time software engineers. Worse, we observably don’t find everything or find things only after the code has shipped to users.
source: HN
The Defer Technical Specification: It Is Time
https://thephd.dev/c2y-the-defer-technical-specification-its-time-go-go-go [thephd.dev]
2025-03-19 22:48
tags:
c
compiler
programming
standard
Time for me to write this blog post and prepare everyone for the implementation blitz that needs to happen to make defer a success for the C programming language.
source: HN
There's more to those colliding blocks that compute pi
https://www.youtube.com/watch?v=6dTyOl1fmDo [www.youtube.com]
2025-03-18 00:31
tags:
math
physics
quantum
video
visualization
Weird typo
https://languagelog.ldc.upenn.edu/nll/?p=68342 [languagelog.ldc.upenn.edu]
2025-03-17 22:16
tags:
ideas
language
“what’s” –> “once”
For me, the causation of such mysterious typographical errors is not just a matter of sloth or clumsiness. Since they often come out in ways that are superficially intelligible but logically and grammatically impossible, I believe that intelligently studied, they might be able to tell us something significant about the way the brain and neuro-muscular system work.
I make such “transcription” errors frequently as well.
API design note: Beware of adding an “Other” enum value
https://devblogs.microsoft.com/oldnewthing/20250217-00/?p=110873 [devblogs.microsoft.com]
2025-03-17 22:11
tags:
intro-programming
type-system
If you return WidgetFlavor::Mint, then this will confuse code written with the Version 1 API, because they expected to get Other for anything that isn’t vanilla, chocolate, or strawberry. The word “other” means “not mentioned elsewhere”, so the presence of an Other logically implies that the enumeration is exhaustive. On the other hand, you obviously should return WidgetFlavor::Mint because that’s why you added the value to the enum in the first place!
The USB That Wasn’t
https://tedium.co/2025/02/17/access-bus-i2c-usb-competitor-history/ [tedium.co]
2025-03-17 22:06
tags:
hardware
retro
tech
Today’s Tedium highlights ACCESS.bus, the would-be standard that wanted to be USB, but couldn’t stick the landing.
Also called the Inter-Integrated Circuit protocol, it’s used as a low-level way to communicate with peripherals, both in its original form and through its de facto successor, SMBus. Developed in the early 1980s by Philips Semiconductor, I²C may be one of the oldest things still in wide use in most modern computers beyond the x86 instruction set—and it is often key to adding driver support into operating systems.
We have long left ACCESS.bus, our would-be contender for the USB throne, into the dustbin of history, but DDC is still at the root of how both HDMI and DisplayPort communicate with our computers.