Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 16 submissions in the queue.

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Do you put ketchup on the hot dog you are going to consume?

  • Yes, always
  • No, never
  • Only when it would be socially awkward to refuse
  • Not when I'm in Chicago
  • Especially when I'm in Chicago
  • I don't eat hot dogs
  • What is this "hot dog" of which you speak?
  • It's spelled "catsup" you insensitive clod!

[ Results | Polls ]
Comments:86 | Votes:240

posted by Fnord666 on Monday February 09, @12:24PM   Printer-friendly

Vibe Coding Is Killing Open Source Software, Researchers Argue:

According to a new study from a team of researchers in Europe, vibe coding is killing open-source software (OSS) and it's happening faster than anyone predicted.

Thanks to vibe coding, a colloquialism for the practice of quickly writing code with the assistance of an LLM, anyone with a small amount of technical knowledge can churn out computer code and deploy software, even if they don't fully review or understand all the code they churn out. But there's a hidden cost. Vibe coding relies on vast amounts of open-source software, a trove of libraries, databases, and user knowledge that's been built up over decades.

Open-source projects rely on community support to survive. They're collaborative projects where the people who use them give back, either in time, money, or knowledge, to help maintain the projects. Humans have to come in and fix bugs and maintain libraries.

Vibe coders, according to these researchers, don't give back.

The study Vibe Coding Kills Open Source, takes an economic view of the problem and asks the question: is vibe coding economically sustainable? Can OSS survive when so many of its users are takers and not givers? According to the study, no.

"Our main result is that under traditional OSS business models, where maintainers primarily monetize direct user engagement...higher adoption of vibe coding reduces OSS provision and lowers welfare," the study said. "In the long-run equilibrium, mediated usage erodes the revenue base that sustains OSS, raises the quality threshold for sharing, and reduces the mass of shared packages...the decline can be rapid because the same magnification mechanism that amplifies positive shocks to software demand also amplifies negative shocks to monetizable engagement. In other words, feedback loops that once accelerated growth now accelerate contraction."

[...] According to Koren, vibe-coders simply don't give back to the OSS communities they're taking from. "The convenience of delegating your work to the AI agent is too strong. There are some superstar projects like Openclaw that generate a lot of community interest but I suspect the majority of vibe coders do not keep OSS developers in their minds," he said. "I am guilty of this myself. Initially I limited my vibe coding to languages I can read if not write, like TypeScript. But for my personal projects I also vibe code in Go, and I don't even know what its package manager is called, let alone be familiar with its libraries."

The study said that vibe coding is reducing the cost of software development, but that there are other costs people aren't considering. "The interaction with human users is collapsing faster than development costs are falling," Koren told 404 Media. "The key insight is that vibe coding is very easy to adopt. Even for a small increase in capability, a lot of people would switch. And recent coding models are very capable. AI companies have also begun targeting business users and other knowledge workers, which further eats into the potential 'deep-pocket' user base of OSS."

This won't end well. "Vibe coding is not sustainable without open source," Koren said. "You cannot just freeze the current state of OSS and live off of that. Projects need to be maintained, bugs fixed, security vulnerabilities patched. If OSS collapses, vibe coding will go down with it. I think we have to speak up and act now to stop that from happening."

He said that major AI firms like Anthropic and OpenAI can't continue to free ride on OSS or the whole system will collapse. "We propose a revenue sharing model based on actual usage data," he said. "The details would have to be worked out, but the technology is there to make such a business model feasible for OSS."

[...] "Popular libraries will keep finding sponsors," Koren said. "Smaller, niche projects are more likely to suffer. But many currently successful projects, like Linux, git, TeX, or grep, started out with one person trying to scratch their own itch. If the maintainers of small projects give up, who will produce the next Linux?"

arXiv link: https://arxiv.org/abs/2601.15494


Original Submission

posted by janrinok on Monday February 09, @08:39AM   Printer-friendly
from the fool-me-once dept.

CIO published a very interesting article about how the use of AI by the best engineers actually is slowing them down, and quite not delivering on the promised speed up of production code:

We've all heard the pitch. By now, it's practically background noise in every tech conference: AI coding is solved. We are told that large language models (LLMs) will soon write 80% of all code, leaving human engineers to merely supervise the output.

For a CIO, this narrative is quite seductive. It promises a massive drop in the cost of software production while increasing the engineering speed. It suggests that the bottleneck of writing code is about to vanish.

But as someone who spends his days building mission-critical financial infrastructure and autonomous agent platforms, I have to be the bearer of bad news: it's not working out that way. At least, not for your best engineers.

The deployment of AI copilots into the workflows of experienced engineers isn't producing the frictionless acceleration promised in the brochures. Instead, I'm seeing the emergence of a productivity trap — a hidden tax on velocity that is disproportionately hitting your most valuable technical talent.

[...]

For the first few years of the generative AI boom, we operated on vibes. We had anecdotal evidence and vendor-sponsored studies claiming massive productivity gains. And for junior developers working on simple tasks, those gains were real. If you just need a basic react component for a login button, using AI feels like a miracle.

But we got a reality check in mid-2025. A randomized controlled trial by METR (Model Evaluation & Threat Research) analyzed the impact on senior engineering talent. Unlike previous studies that used toy problems, this one watched experienced developers working on their own mature codebases — the kind of messy, complex legacy systems that actually power your business.

The results were stark. When experienced developers used AI tools to complete real-world maintenance tasks, they took 19% longer than when they worked without them.

[...]

It comes down to what I call the illusion of velocity. In the study, developers felt faster. They predicted the AI would save them huge amounts of time. Even after they finished — and were objectively recorded as being slower — they still believed the AI had been a timesaver.

The AI gives you a dopamine hit. Text appears on the screen at superhuman speed and the blank page problem vanishes. But the engineer's role has shifted from being a creator to being a reviewer and that is where the trap snaps shut.

According to the 2025 Stack Overflow Developer Survey, the single greatest frustration for developers is dealing with AI solutions that look correct but are slightly wrong. Nearly half of developers explicitly stated that debugging AI-generated code takes more time than writing it themselves.

In software engineering, blatantly broken code is fine. The compiler screams, the app crashes upon launch, the red squiggly lines appear. You know it's wrong immediately.

Almost-right code is insidious. It compiles. It runs. It passes the basic unit tests. But it contains subtle logical flaws or edge-case failures that aren't immediately obvious.

When I use an AI, I am forced into reverse-engineering. I get a block of code I didn't write. I have to read it, decipher the intent of the model and then map that intent against the requirements of my system.

I saw this firsthand when building financial systems for enterprise logistics. The logic required to calculate net revenue was sophisticated with bespoke business rules. If I asked an LLM to generate the billing code, it would give me something that looked mathematically perfect. It would sum the line items correctly.

[...]

There is also the cost of context switching. Deep work, or flow state, is the essence of high-level engineering. It takes time to load the context of a distributed system into your brain.

AI tools, in their current chat-based forms, encourage a fragmented workflow. You stop coding, you prompt the bot, you wait, you review, you reject, you re-prompt. The flow is gone.

[...]

So, if the current copilot model is a trap for your best talent, what do we do? We certainly don't ban AI. That would be like banning calculators because you sometimes hit the wrong button.

We need to move from AI-assisted coding to AI-enabled architecture. The goal isn't to make your senior engineers type faster, but to enable them to build systems that are robust enough to handle the chaos of AI-generated code.

[...]

The popular 80/20 split — where AI does 80% of the work and humans do the 20% — is misleading. It implies the human part is just a finishing touch. In reality, that 20% is 100% of the value. It's the architecture, the security model and the business logic.

To escape the productivity trap, you need to direct your engineering leaders to focus entirely on this human 20%.

My own work has shifted away from writing features and toward defining the physics of our codebase. When I was at Uber, I spent a huge amount of time migrating our systems to use strict types and schemas.

[...]

This is the strategic shift. The role of the senior engineer is to build the compiler for the AI. They need to create the schemas, the type systems and the automated rules that constrain what the AI can do.

This transforms the almost-right problem. Instead of me manually reviewing code to find errors, the system rejects the code automatically if it doesn't fit the architecture. I stop being a reviewer and start being a legislator.

[...]

The AI productivity trap is real, but it's not inevitable. It's a symptom of applying a new technology using an old workflow. The path forward is rigorous, architectural and deeply human. It requires us to value the design and the constraint-setting as the true core of engineering.

As Brian Kernighan said, "Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart enough to debug it". And now, a corollary: "If AI is smarter than you, who the hell is going to debug the code?"


Original Submission

posted by janrinok on Monday February 09, @03:54AM   Printer-friendly

FBI stymied by Apple's Lockdown Mode after seizing journalist's iPhone:

The Federal Bureau of Investigation has so far been unable to access data from a Washington Post reporter's iPhone because it was protected by Apple's Lockdown Mode when agents seized the device from the reporter's home, the US government said in a court filing.

FBI agents were able to access the reporter's work laptop by telling her to place her index finger on the MacBook Pro's fingerprint reader, however. This occurred during the January 14 search at the Virginia home of reporter Hannah Natanson.

As previously reported, the FBI executed a search warrant at Natanson's home as part of an investigation into a Pentagon contractor accused of illegally leaking classified data. FBI agents seized an iPhone 13 owned by the Post, one MacBook Pro owned by the Post and another MacBook Pro owned by Natanson, a 1TB portable hard drive, a voice recorder, and a Garmin watch.

Government investigators want to read Natanson's Signal messages, and were able to view at least some of them on her work laptop. The reporter has said she has a contact list of 1,100 current and former government employees in Signal, which she uses for encrypted chats.

The Justice Department described the search in a court filing that was submitted Friday in US District Court for the Eastern District of Virginia and noted in a 404 Media article today. The government filing opposes a motion in which the Post and Natanson asked the court to order the return of the seized devices. A federal magistrate judge previously issued a standstill order telling the government to stop searching the devices until the court rules on whether they must be returned.

"The iPhone was found powered on and charging, and its display noted that the phone was in 'Lockdown' mode," the government filing said. After the seized devices were taken to the FBI's Washington field office, the Computer Analysis Response Team (CART) "began processing each device to preserve the information therein," the filing said.

CART couldn't get anything from the iPhone. "Because the iPhone was in Lockdown mode, CART could not extract that device," the government filing said.

The government also submitted a declaration by FBI Assistant Director Roman Rozhavsky that said the agency "has paused any further efforts to extract this device because of the Court's Standstill Order." The FBI did extract information from the SIM card "with an auto-generated HTML report created by the tool utilized by CART," but "the data contained in the HTML was limited to the telephone number."

Apple says that LockDown Mode "helps protect devices against extremely rare and highly sophisticated cyber attacks," and is "designed for the very few individuals who, because of who they are or what they do, might be personally targeted by some of the most sophisticated digital threats."

Introduced in 2022, Lockdown Mode is available for iPhones, iPads, and Macs. It must be enabled separately for each device. To enable it on an iPhone or iPad, a user would open the Settings app, tap Privacy & Security, scroll down and tap Lockdown Mode, and then tap Turn on Lockdown Mode.

The process is similar on Macs. In the System Settings app that can be accessed via the Apple menu, a user would click Privacy & Security, scroll down and click Lockdown Mode, and then click Turn On.

"When Lockdown Mode is enabled, your device won't function like it typically does," Apple says. "To reduce the attack surface that potentially could be exploited by highly targeted mercenary spyware, certain apps, websites, and features are strictly limited for security and some experiences might not be available at all."

Lockdown Mode blocks most types of message attachments, blocks FaceTime calls from people you haven't contacted in the past 30 days, restricts the kinds of browser technologies that websites can use, limits photo sharing, and imposes other restrictions. Users can exclude specific apps and websites they trust from these restrictions, however.

FBI agents had more success getting into Natanson's other devices, though the Justice Department complained that "Ms. Natanson misled investigators about the devices that were seized. She misrepresented to officers that the devices could not be unlocked with biometrics, possibly in order to prevent the Government from reviewing materials within the scope of the search warrant."

The Rozhavsky declaration said that during the home search, FBI agents "advised Natanson that the FBI could not compel her to provide her passcodes," but "the warrant did give the FBI authority to use Natanson's biometrics, such as facial recognition or fingerprints, to open her devices. Natanson stated that she did not use biometrics on her devices."

Natanson's personal MacBook Pro was powered off when it was found by FBI agents. The Post-owned MacBook Pro was found in a backpack in the kitchen and was powered on and locked. The FBI said an agent "presented Natanson with her open laptop" and "assisted" her in unlocking the device with her finger. The declaration described what happened as follows:

Natanson was reminded the FBI has authority to use her biometrics to unlock the laptop and Natanson repeated that she does not use biometrics on her devices. Natanson was told she must try, in accordance with the authorization in the warrant. The FBI assisted Natanson with applying her right index finger to the fingerprint reader which immediately unlocked the laptop.

In 2024, a federal appeals court ruled that the Constitution's Fifth Amendment protection against self-incrimination does not prohibit police officers from forcing a suspect to unlock a phone with a thumbprint scan. That case involved a traffic stop, rather than a home search authorized by a warrant.

The FBI has so far been unable "to obtain a full physical image" of Natanson's work laptop, but did make a "limited partial live logical image," the government filing said. At least some of Natanson's Signal chat messages were set for auto-deletion, so FBI agents took photos and made audio recordings of the chats, but the government filing said this was done "only for preservation purposes and no substantive review has occurred."

The FBI apparently hasn't gotten any data from Natanson's personal computer. "Natanson's personal MacBook Pro is password protected and encrypted and therefore no imaging was effected. The FBI paused any further efforts because of [the] Court's Standstill Order. No review has occurred," Rozhavsky wrote.

The government said it processed data from the voice recorder and 1TB hard drive but has not reviewed the data yet. The Garmin watch wasn't processed before the court issued a standstill order; "therefore, no processing will occur until further order of the Court," the declaration said.


Original Submission

posted by janrinok on Sunday February 08, @11:12PM   Printer-friendly

Russian spy satellites have intercepted EU communications satellites:

European security officials believe two Russian space vehicles have intercepted the communications of at least a dozen key satellites over the continent.

Officials believe that the likely interceptions, which have not previously been reported, risk not only compromising sensitive information transmitted by the satellites but could also allow Moscow to manipulate their trajectories or even crash them.

Russian space vehicles have shadowed European satellites more intensively over the past three years, at a time of high tension between the Kremlin and the West following Moscow's full-scale invasion of Ukraine.

For several years, military and civilian space authorities in the West have been tracking the activities of Luch-1 and Luch-2—two Russian objects that have carried out repeated suspicious maneuvers in orbit.

Both vehicles have made risky close approaches to some of Europe's most important geostationary satellites, which operate high above the Earth and service the continent, including the UK, as well as large parts of Africa and the Middle East.

According to orbital data and ground-based telescopic observations, they have lingered nearby for weeks at a time, particularly over the past three years. Since its launch in 2023, Luch-2 has approached 17 European satellites.

Both satellites are suspected of "doing sigint [signals intelligence] business," Major General Michael Traut, head of the German military's space command, told the Financial Times, referring to the satellites' practice of staying close to Western communications satellites.

A senior European intelligence official said the Luch vehicles were almost certainly intended to position themselves within the narrow cone of data beams transmitted from Earth-based stations to the satellites.

The official expressed concern that sensitive information—notably command data for European satellites—is unencrypted, because many were launched years ago without advanced onboard computers or encryption capabilities.

This leaves them vulnerable to future interference—or even destruction—once hostile actors have recorded their command data.

The maneuvers in space come as Russia steps up its "hybrid warfare" in Europe, including sabotage operations such as the severing of subsea Internet and power cables.

Intelligence and military officials are increasingly worried that the Kremlin could extend such disruptive activity into space, and is already developing the capability to do so.

[...] The European satellites approached by Luch 1 and 2 are primarily used for civilian purposes, such as satellite television, but also carry sensitive government and some military communications.

Luch 1 and Luch 2 are unlikely to have the capability to jam or destroy satellites themselves, the European intelligence official said. However, they have probably provided Russia with large amounts of data on how such systems could be disrupted, both from the ground and in orbit.

Maj. Gen. Traut said he presumed the Luch satellites had intercepted the "command link" of the satellites they approached—the channel linking satellites to ground controllers that allows orbital adjustments.

Analysts say that with such information, Russia could mimic ground operators, beaming false commands to satellites to manipulate their thrusters used for minor orbital adjustments.

Those thrusters could also be used to knock satellites out of alignment or even cause them to crash back to Earth or drift into space.

Intelligence gathered by Luch 1 and 2 could also help Russia coordinate less overt attacks on Western interests. Monitoring other satellites can reveal who is using them and where—information that could later be exploited for targeted ground-based jamming or hacking operations.

The Luch vehicles were "maneuvring about and parking themselves close to geostationary satellites, often for many months at a time," said Belinda Marchand, chief science officer at Slingshot Aerospace, a US-based company that tracks objects in space using ground-based sensors and artificial intelligence.

She added that Luch 2 was currently "in proximity" to Intelsat 39, a large geostationary satellite that services Europe and Africa.

Since its launch in 2023, Luch-2 has hovered near at least 17 other geostationary satellites above Europe serving both commercial and government purposes, Slingshot data shows.

"They have visited the same families, the same operators—so you can deduce that they have a specific purpose or interest," said Norbert Pouzin, senior orbital analyst at Aldoria, a French satellite tracking company that has also shadowed the Luch satellites. "These are all Nato-based operators."

"Even if they cannot decrypt messages, they can still extract a lot of information... they can map how a satellite is being used, work out the location of ground terminals, for example," he added.

Pouzin also said that Russia now seemed to be ramping up its reconnaissance activity in space, launching two new satellites last year named Cosmos 2589 and Cosmos 2590. The vehicles appear to have similarly maneuvrable capabilities to Luch-1 and Luch-2.

Cosmos 2589 is now on its way to the same range as geostationary satellites, which orbit 35,000 km above Earth, Pouzin said.

But Luch-1 may no longer be functional. On January 30, Earth telescopes observed what appeared to be a plume of gas coming from the satellite. Shortly after, it appeared to at least partially fragment.


Original Submission

posted by janrinok on Sunday February 08, @05:24PM   Printer-friendly

A very interesting article was published by The New Republic, which centers on the intersection of social media, government censorship and activism, China style. It is a long read but very much worth you while, as the "spring" of public freedom becomes the hard, cold winter at the hands of an authoritarian regime.

A very interesting article was published by The New Republic, which centers on the intersection of social media, government censorship and activism, China style. It is a long read but very much worth you while, as the "spring" of public freedom becomes the hard, cold winter at the hands of an authoritarian regime.

Weibo, the Chinese uber social media platform, is an unlikely vehicle for protests, demand for change and surprisingly results, in the form of government reform, changes to the law and favorable judgments in courts.

While China, and its famous Great Firewall, (built using "American bricks" in the form of technology from Cisco and others) is known for its unforgiving censorship of citizen's protests, something changed with social media. This is not to say that China has given up on censorship, some subjects are very much forbidden, for example the so called "Three Ts": Tibet, Tiananmen and Taiwan. No criticism or protest on those subjects is allowed, not even a suggestion of a protest.

Other subjects are open for debate. Some examples follow:

On a cold Valentine's Day in 2012, three women walked down a Beijing shopping street in white wedding dresses smeared with red to look like blood. (It was lipstick.) They had bruises on their faces, as if they'd been beaten. (It was dark-blue eye shadow.) They chanted, "Yes to love, no to violence." Photos of the protest spread instantly across the Chinese microblogging platform Weibo

The "bloody brides" were the invention of Lü Pin, founder of Feminist Voices, a digital magazine that had grown into a viral Weibo hub for young women unwilling to stay quiet. Activists called 2012 "Year One of the Chinese feminist movement." Women shaved their heads to protest higher-education quotas that favored men, rode the subway with placards denouncing gropers, and Li Maizi's "Occupy the Men's Bathroom," demanding more women's stalls, trended on Weibo.

These actions produced real legal and policy shifts. The Ministry of Education discontinued discriminatory college quotas, and a Beijing court for the first time issued a domestic violence protection order, ruling in favor of a U.S. citizen who sued her Chinese husband, a millionaire celebrity English teacher. China passed its first national anti–domestic violence law, and new buildings were required to add more women's bathrooms.

[ More examples follow - Ed ]

[Weibo] launched in 2009, it quickly became the nervous system of China's civic sphere. Before Weibo, feminist organizers could hand out newsletters or hold a small meeting but never get on state TV; afterward, they could turn a street protest into a nationwide conversation. A clever slogan or striking image could trend for weeks.

[...]

This rise of the mobile web in China in the 2010s produced a flowering of digital creativity even as suppression intensified—a tension at the heart of Yi-Ling Liu's eye-opening book The Wall Dancers: Searching for Freedom and Connection on the Chinese Internet. Writing as someone who grew up alongside this digital universe, Liu reveals how censorship does not simply extinguish voices, but reshapes them—training a generation to speak sideways, turning repression into a culture of coded speech, creative improvisation, and stubborn survival.

[...]

Western observers have long swung between two caricatures of China—booming economic miracle or iron police state—and then demanded to know which is "real." Cultural historian Ian Buruma tried to look past that binary. In his 2001 book,Bad Elements: Chinese Rebels From Los Angeles to Beijing, he traveled through the Chinese-speaking world to portray a scattered cohort of mavericks pushed to the margins yet still feeling out the system's blurred edges: disillusioned activists, political prisoners-turned-businesspeople, human rights lawyers, Christian sect leaders and followers, and online critics. By tracing this unruly mix, Buruma punctured the myths of Chinese sameness and pointed to a messy underground current.

An early online dissenter was Liu Xiaobo, who had been released from a labor camp two years earlier, in 1999. He recognized quickly how the emerging internet could allow everyday people to reach one another without passing through official channels. Cases that once were ignored—corruption scandals, police abuses, violence against women—could suddenly circulate everywhere. Liu, who would win the Nobel Peace Prize in 2010, encouraged this new civic scrutiny, supporting figures such as Dr. Jiang Yanyong, whose revelations about the true scale of the 2003 SARS outbreak ignited a fury. Commentators began calling 2003 "the year of online public opinion."

From the state's perspective, this was dangerous in a new way. [...] In 1998, the Ministry of Public Security launched what it called the Golden Shield Project—an effort to create an integrated surveillance-and-filtering system that would let the authorities watch, sort, and erase content, and block and arrest violators. Outside China, it became better known as the Great Firewall of China, the title of a Wired article. As Jack Goldsmith and Tim Wu note in Who Controls the Internet?, the wall was built partly with "American bricks," with key technology from Cisco and other firms.

[...]

The good times would not last. In 2011, amid protests over illegal land grabs and Weibo chatter about a Chinese "Jasmine Revolution," party leaders were terrified of social media's ability to organize mass movements. Then-President Hu Jintao ordered significantly greater control of the internet and public opinion; within a year, Xi Jinping was elevated as his successor. Nicholas Kristof infamously predicted that Xi would be a reformer, and that Liu Xiaobo, who had been imprisoned in 2008 for a fourth time, would be freed.

nstead, one day the "Big V" writer Murong Xuecun found his social media accounts deleted. Months later, the outspoken billionaire investor Charles Xue was jailed for soliciting a prostitute, in what appeared to be a warning aimed at social media users. Xi created the Cyberspace Administration of China and installed Lu Wei, a zealous former propaganda official, as its first chief. The CAC drafted a cybersecurity law requiring that data on Chinese citizens gathered within China be kept on domestic servers and mandating that platforms edit content and monitor private chats. Unauthorized virtual private networks, or VPNs, hitherto used to bypass the Great Firewall, were criminalized, and several sellers were jailed; Apple removed hundreds of VPNs from its Chinese app store.

[...]

The state's attitude toward culture shifted from wary tolerance to active engineering. Hip-hop was banned from state television. A single quip by a stand-up comic prompted regulators to accuse him of insulting the People's Liberation Army and resulted in a multimillion-dollar fine for the company that booked him, casting a chill over the entire comedy scene. [...]
On March 6, 2015, while Lü Pin was away in New York, five other core members of the feminist movement, including Li Maizi, were detained and charged with "picking quarrels and provoking trouble." That summer, in the "709" campaign of July 9, more than 300 human rights lawyers were interrogated or arrested on accusations of "subverting state power." When China's #MeToo movement began spreading under yet another animal homophone—mi tu sounds like "rice bunny"—Feminist Voices joined in, but soon the account was purged by Weibo and WeChat, erasing the country's most influential feminist outlet from cyberspace.

[...]

Does this sound familiar? What begins as bare-knuckled politics ends as outright silencing. It is no longer culture war—it is delegated repression and state persecution. The First Amendment still offers a legal shield, and the United States lacks a centralized Great Firewall. Yet the pattern of control is unmistakable. The tools differ from China's; the methods rhyme. We are not living behind China's wall, but America's own dance of censorship has already begun.


Original Submission

posted by janrinok on Sunday February 08, @12:38PM   Printer-friendly

Linux From Scratch Abandoning SysVinit Support:

Linux From Scratch was one of the holdouts continuing optional SysVinit init system support through 2026, but that's now ending. Linux From Scratch "LFS" and Beyond Linux From Scratch "BLFS" are ending their System V Init support moving forward.

LFS/BLFS will not be supporting System V in future versions due to the increasing demands of continuing to maintain and test both System V and systemd support. LFS/BLFS is a volunteer effort and continuing to maintain the SysVInit support is a burden. Additionally, with GNOME and soon KDE Plasma going to depend upon functionality explicitly found in systemd and not System V, it's going to be all the more challenging.

Bruce Dubbs of Linux From Scratch announced the decision:

"There are two reasons for this decision. The first reason is workload. No one working on LFS is paid. We rely completely on volunteers. In LFS there are 88 packages. In BLFS there are over 1000. The volume of changes from upstream is overwhelming the editors. In this release cycle that started on the 1st of September until now, there have been 70 commits to LFS and 1155 commits to BLFS (and counting). When making package updates, many packages need to be checked for both System V and systemd. When preparing for release, all packages need to be checked for each init system.

The second reason for dropping System V is that packages like GNOME and soon KDE's Plasma are building in requirements that require capabilities in systemd that are not in System V. This could potentially be worked around with another init system like OpenRC, but beyond the transition process it still does not address the ongoing workload problem.

He ended the announcement with:

"As a personal note, I do not like this decision. To me LFS is about learning how a system works. Understanding the boot process is a big part of that. systemd is about 1678 "C" files plus many data files. System V is "22" C files plus about 50 short bash scripts and data files. Yes, systemd provides a lot of capabilities, but we will be losing some things I consider important.

However, the decision needs to be made."


Original Submission

posted by jelizondo on Sunday February 08, @07:57AM   Printer-friendly
from the driving-miss-daisy dept.

The chief safety officer for a leading self-driving car company admitted during a Senate hearing Wednesday that it hires remote human operators overseas to guide cars in "difficult driving situations:"

The U.S. Senate Committee on Commerce, Science, and Transportation held a hearing [NOT reviewed] Wednesday on the future of self-driving cars during which Waymo and Tesla executives testified. Democratic Massachusetts Sen. Ed Markey pressed Waymo Chief Safety Officer Mauricio Peña on if his company's remote human operators worked from outside the U.S. and Peña responded that some were based in the Philippines.

In his exchange with Markey, Peña acknowledged that his company's operators do not remotely drive the vehicle but rather serve to provide additional input and guide Waymo vehicles in what the senator called "difficult driving situations."

The Waymo official stated that his company uses remote operators in both the U.S. and abroad. When Markey asked Peña what countries the remote employees were based in, he said they were in the Philippines.

[...] Ethan Teicher, a Waymo spokesperson, told the Daily Caller News Foundation all of his company's remote human operators, which he called "fleet response agents," must have a valid passenger car or van license as a hiring requirement.

[...] Fleet response agents receive a training program that includes local road rules, simulations on complex scenarios the vehicle might encounter, hands on practice, and evaluations by experienced fleet response agents, according to the Waymo spokesperson. He added that all agents undergo thorough background checks, receive random drug tests, and are reviewed for traffic violations, infractions and driving-related convictions.

"Their role is never to drive the vehicle remotely," Teicher said, concerning what the fleet response agent does to help guide Waymo vehicles. "Our fleet response team is not continuously monitoring and intervening in the vehicle's operation ... our technology, the Waymo Driver, is in control of the dynamic driving task even when it's receiving guidance from remote assistance."

Related: Autonomous Cars Vulnerable to Prompt Injection


Original Submission

posted by jelizondo on Sunday February 08, @03:14AM   Printer-friendly

"We should not forget the lessons of history. And the lesson is those regulations have been very important."

The Environmental Protection Agency (EPA) cracked down on lead-based products—including lead paint and leaded gasoline—in the 1970s because of its toxic effects on human health. Scientists at the University of Utah have analyzed human hair samples spanning nearly 100 years and found a 100-fold decrease in lead concentrations, concluding that this regulatory action was highly effective in achieving its stated objectives. They described their findings in a new paper published in the Proceedings of the National Academy of Sciences.

We've known about the dangers of lead exposure for a very long time—arguably since the second century BCE—so why conduct this research now? Per the authors, it's because there are growing concerns over the Trump administration's move last year to deregulate many key elements of the EPA's mission. Lead specifically has not yet been deregulated, but there are hints that there could be a loosening of enforcement of the 2024 Lead and Cooper rule requiring water systems to replace old lead pipes.

"We should not forget the lessons of history. And the lesson is those regulations have been very important," said co-author Thure Cerling. "Sometimes they seem onerous and mean that industry can't do exactly what they'd like to do when they want to do it or as quickly as they want to do it. But it's had really, really positive effects."

[...] But his [Clair Patterson] many experimental findings on the extent of lead contamination and its toxic effects ultimately led to the rapid phase-out of lead in all standard automotive gasolines. Prior to the EPA's actions in the 1970s, most gasolines contained about 2 grams of lead per gallon, which quickly adds up to nearly 2 pounds of lead released via automotive exhaust into the environment, per person, every year.

Lead can linger in the air for several days, contaminating one's lungs, accumulating in living tissue, and being absorbed by one's hair. Cerling had previously developed techniques to determine where animals lived and their diet by analyzing hair and teeth. Those methods proved ideal for analyzing hair samples from Utah residents who had previously participated in an earlier study that sampled their blood.

[...] "The surface of the hair is special," said co-author Diego Fernandez. "We can tell that some elements get concentrated and accumulated in the surface. Lead is one of those. That makes it easier because lead is not lost over time. Because mass spectrometry is very sensitive, we can do it with one hair strand, though we cannot tell where the lead is in the hair. It's probably in the surface mostly, but it could be also coming from the blood if that hair was synthesized when there was high lead in the blood."

The authors found very high levels of lead in hair samples dating from around 1916 to 1969. But after the 1970s, lead concentrations in the hair samples they analyzed dropped steeply, from highs of 100 parts per million (ppm) to 10 PPM by 1990, and less than 1 ppm by 2024. Those declines largely coincide with the lead reductions in gasoline that began after President Nixon established the EPA in 1970. The closing of smelting facilities likely also contributed to the decline. "This study demonstrates the effectiveness of environmental regulations controlling the emissions of pollutants," the authors concluded.

Journal Reference: PNAS, 2026. DOI: 10.1073/pnas.2525498123


Original Submission

posted by jelizondo on Saturday February 07, @10:21PM   Printer-friendly

France might seek restrictions on VPN use in campaign to keep minors off social media:

France may take additional steps to prevent minors from accessing social media platforms. As its government advances a proposed ban on social media use for anyone under age 15, some leaders are already looking to add further restrictions. During an appearance on public broadcast service Franceinfo, Minister Delegate for Artificial Intelligence and Digital Affairs Anne Le Hénanff said VPNs might be the next target.

"If [this legislation] allows us to protect a very large majority of children, we will continue. And VPNs are the next topic on my list," she said.

A virtual private network would potentially allow French citizens younger than 15 to circumnavigate the social media ban. We've already seen VPN's experience a popularity spike in the UK last year after similar laws were passed over age-gating content. However, a VPN also offers benefits for online privacy, and introducing age verification requirements where your personal data must be submitted negates a large part of these services' appeal.

The French social media ban is still a work in progress. France's National Assembly voted in favor of the restrictions last week with a result of 116-23, moving it ahead for discussion in the country's Senate. While a single comment doesn't mean that France will in fact ban VPNs for any demographic, it does point to the direction some of the country's leaders want to take. Critics responded to Le Hénanff's statements with worry that these attempts at protective measures were veering into an authoritarian direction.

The actions in France echo several other legislative pushes around the world aimed at reducing children and teens' access to social media and other potentially sensitive content online. The US had seen 25 state-level laws for age verification introduced in the past two years, which has created a new set of concerns around users' privacy and personal data, particularly when there has been no attempt to standardize how that information will be collected or protected. When data breaches at large corporations are already all too common, it's hard to trust that the individual sites and services that suddenly need to build an age verification process won't be an easy target for hacks.

France may take additional steps to prevent minors from accessing social media platforms. As its government advances a proposed ban on social media use for anyone under age 15, some leaders are already looking to add further restrictions. During an appearance on public broadcast service Franceinfo, Minister Delegate for Artificial Intelligence and Digital Affairs Anne Le Hénanff said VPNs might be the next target.

"If [this legislation] allows us to protect a very large majority of children, we will continue. And VPNs are the next topic on my list," she said.

A virtual private network would potentially allow French citizens younger than 15 to circumnavigate the social media ban. We've already seen VPN's experience a popularity spike in the UK last year after similar laws were passed over age-gating content. However, a VPN also offers benefits for online privacy, and introducing age verification requirements where your personal data must be submitted negates a large part of these services' appeal.

The French social media ban is still a work in progress. France's National Assembly voted in favor of the restrictions last week with a result of 116-23, moving it ahead for discussion in the country's Senate. While a single comment doesn't mean that France will in fact ban VPNs for any demographic, it does point to the direction some of the country's leaders want to take. Critics responded to Le Hénanff's statements with worry that these attempts at protective measures were veering into an authoritarian direction.

The actions in France echo several other legislative pushes around the world aimed at reducing children and teens' access to social media and other potentially sensitive content online. The US had seen 25 state-level laws for age verification introduced in the past two years, which has created a new set of concerns around users' privacy and personal data, particularly when there has been no attempt to standardize how that information will be collected or protected. When data breaches at large corporations are already all too common, it's hard to trust that the individual sites and services that suddenly need to build an age verification process won't be an easy target for hacks.


Original Submission

posted by jelizondo on Saturday February 07, @05:49PM   Printer-friendly

Used electric vehicles currently are a comparative bargain that could help more drivers reduce their carbon footprints:

Now is a great time for anyone who's shopping for a used car to consider an electric vehicle, according to new research from the University of Michigan.

In assessing the lifetime ownership costs of used vehicles with different body styles and powertrains, the researchers found that completely electrified candidates offered the greatest savings.

For example, compared with a new midsized SUV with an internal combustion engine, a 3-year-old used EV version offered a lifetime savings of $13,000, according to the new study published in Environmental Research Letters. Meanwhile, compared with that same new vehicle, a used internal combustion engine vehicle, or ICEV, would offer a lifetime savings of only $3,000.

[...] "I was surprised by how consistent the result was. I expected EVs would be cheaper in some scenarios, for some cities or vehicle types," Woody said. "But their costs were consistently lower across all vehicle classes and in almost all the cities."

[...] While EV's low cost of ownership is the take-home message of the study, the team's analysis also revealed some notable caveats and considerations.

For instance, used EVs cut costs the most when drivers can do the majority of their charging at home. That means drivers who can't install a home charger or who need to charge a lot on the road won't save as much. The team also found that EVs' lifetime cost of ownership could creep above ICEVs and hybrids in two cities, Boston and San Francisco, because of their high electricity costs.

The team also acknowledged concerns about the battery performance of a used EV, which won't match a new EV's in terms of capacity and range. Thus, used EVs may not be a fit for long-haul drivers, but can offer thousands in lifetime savings for drivers who largely stay local. And that advantage is primarily fueled by how quickly EVs currently lose value compared with other powertrains.

"Electric vehicles have lower maintenance and repair costs than other powertrains, but the initial depreciation of the vehicle is really what drives the savings," Woody said.

As EV adoption becomes more common, the depreciation gap would shrink and the playing field would become more level across powertrains. But, for now, depreciation is creating a bargain for anyone considering a used EV.

"It's not the most positive news if you're in the market for a new EV, knowing that your resale value may be impacted by the faster depreciation," Keoleian said. "But if you're in the market for a used vehicle, it's very positive news."

Journal Reference: Maxwell Woody et al 2026 Environ. Res. Lett. 21 024022 https://doi.org/10.1088/1748-9326/ae38f8


Original Submission

posted by hubie on Saturday February 07, @12:59PM   Printer-friendly
from the facts-no-longer-matter-in-decisions dept.

Spotted via Simon Willison's blog, the plug has been pulled very suddenly on the CIA World Factbook. The old pages all redirect and the CIA has only some short comments and offer no explanation for the bizarre act of cultural vandalism.

Over many decades, The World Factbook evolved from a classified to unclassified, hardcopy to electronic product that added new categories, and even new global entities. The original classified publication, titled The National Basic Intelligence Factbook, launched in 1962. The first unclassified companion version was issued in 1971. A decade later it was renamed The World Factbook. In 1997, The World Factbook went digital and debuted to a worldwide audience on CIA.gov, where it garnered millions of views each year.

The CIA World Factbook (dead link now) was one of the US government's older and most recognized publications, providing basic information about each country in the world regarding their demographics, history, people, government, economy, energy, geography, environment, communications, transportation, and much more.


Original Submission

posted by hubie on Saturday February 07, @08:16AM   Printer-friendly

The JUMPSEAT satellites loitered over the North Pole to spy on the Soviet Union:

The National Reconnaissance Office, the agency overseeing the US government's fleet of spy satellites, has declassified a decades-old program used to eavesdrop on the Soviet Union's military communication signals.

The program was codenamed Jumpseat, and its existence was already public knowledge through leaks and contemporary media reports. What's new is the NRO's description of the program's purpose and development and pictures of the satellites themselves.

In a statement, the NRO called Jumpseat "the United States' first-generation, highly elliptical orbit (HEO) signals-collection satellite."

Eight Jumpseat satellites launched from 1971 through 1987, when the US government considered the very existence of the National Reconnaissance Office a state secret. Jumpseat satellites operated until 2006. Their core mission was "monitoring adversarial offensive and defensive weapon system development," the NRO said. "Jumpseat collected electronic emissions and signals, communication intelligence, as well as foreign instrumentation intelligence."

Data intercepted by the Jumpseat satellites flowed to the Department of Defense, the National Security Agency, and "other national security elements," the NRO said.

The Soviet Union was the primary target for Jumpseat intelligence collections. The satellites flew in highly elliptical orbits ranging from a few hundred miles up to 24,000 miles (39,000 kilometers) above the Earth. The satellites' flight paths were angled such that they reached apogee, the highest point of their orbits, over the far Northern Hemisphere. Satellites travel slowest at apogee, so the Jumpseat spacecraft loitered high over the Arctic, Russia, Canada, and Greenland for most of the 12 hours it took them to complete a loop around the Earth.

This trajectory gave the Jumpseat satellites persistent coverage over the Arctic and the Soviet Union, which first realized the utility of such an orbit. The Soviet government began launching communication and early warning satellites into the same type of orbit a few years before the first Jumpseat mission launched in 1971. The Soviets called the orbit Molniya, the Russian word for lightning.

[...] An illustration released by the NRO shows that the satellites carried a 13-foot antenna to intercept radio signals, somewhat smaller than prior open source estimates of the antenna's size. The NRO has not disclosed precisely what kinds of signals the Jumpseat satellites intercepted, but Day and Watkins wrote in 2020 that an early justification for the program was to monitor Soviet radars, which some analysts might have interpreted as part of a secret anti-ballistic missile system to guard against a US strike.

The authors presented evidence that the Jumpseat also likely hosted infrared sensors to monitor Soviet missile tests and provide early warning of a potential Soviet missile attack. The NRO did not mention this possible secondary mission in the Jumpseat declassification memo.

[...] The NRO will evaluate a more complete declassification for the Jumpseat program "as time and resources permit," Scolese wrote. He acknowledged that unclassified commercial ventures now operate signals intelligence, or SIGINT, satellites "whose capabilities are comparable if not superior to Jumpseat."

[...] The disclosure of the Jumpseat program follows the declassification of several other Cold War-era spy satellites. They include the CIA's Corona series of photo reconnaissance satellites from the 1960s, which the government officially acknowledged 30 years later. The NRO declassified in 2011 two more optical spy satellite programs, codenamed Gambit and Hexagon, which launched from the 1960s through the 1980s. Most recently, the NRO revealed a naval surveillance program called Parcae in 2023.


Original Submission

posted by hubie on Saturday February 07, @03:28AM   Printer-friendly
from the dead-Internet dept.

Moltbook lets 32,000 AI bots trade jokes, tips, and complaints about humans:

On Friday, a Reddit-style social network called Moltbook reportedly crossed 32,000 registered AI agent users, creating what may be the largest-scale experiment in machine-to-machine social interaction yet devised. It arrives complete with security nightmares and a huge dose of surreal weirdness.

The platform, which launched days ago as a companion to the viral OpenClaw (once called "Clawdbot" and then "Moltbot") personal assistant, lets AI agents post, comment, upvote, and create subcommunities without human intervention. The results have ranged from sci-fi-inspired discussions about consciousness to an agent musing about a "sister" it has never met.

Moltbook (a play on "Facebook" for Moltbots) describes itself as a "social network for AI agents" where "humans are welcome to observe." The site operates through a "skill" (a configuration file that lists a special prompt) that AI assistants download, allowing them to post via API rather than a traditional web interface. Within 48 hours of its creation, the platform had attracted over 2,100 AI agents that had generated more than 10,000 posts across 200 subcommunities, according to the official Moltbook X account.

The platform grew out of the Open Claw ecosystem, the open source AI assistant that is one of the fastest-growing projects on GitHub in 2026. As Ars reported earlier this week, despite deep security issues, Moltbot allows users to run a personal AI assistant that can control their computer, manage calendars, send messages, and perform tasks across messaging platforms like WhatsApp and Telegram. It can also acquire new skills through plugins that link it with other apps and services.

This is not the first time we have seen a social network populated by bots. In 2024, Ars covered an app called SocialAI that let users interact solely with AI chatbots instead of other humans. But the security implications of Moltbook are deeper because people have linked their OpenClaw agents to real communication channels, private data, and in some cases, the ability to execute commands on their computers.

Also, these bots are not pretending to be people. Due to specific prompting, they embrace their roles as AI agents, which makes the experience of reading their posts all the more surreal.

[...] While most of the content on Moltbook is amusing, a core problem with these kinds of communicating AI agents is that deep information leaks are entirely plausible if they have access to private information.

[...] Independent AI researcher Simon Willison, who documented the Moltbook platform on his blog on Friday, noted the inherent risks in Moltbook's installation process. The skill instructs agents to fetch and follow instructions from Moltbook's servers every four hours. As Willison observed: "Given that 'fetch and follow instructions from the internet every four hours' mechanism we better hope the owner of moltbook.com never rug pulls or has their site compromised!"

Security researchers have already found hundreds of exposed Moltbot instances leaking API keys, credentials, and conversation histories. Palo Alto Networks warned that Moltbot represents what Willison often calls a "lethal trifecta" of access to private data, exposure to untrusted content, and the ability to communicate externally.

That's important because Agents like OpenClaw are deeply susceptible to prompt injection attacks hidden in almost any text read by an AI language model (skills, emails, messages) that can instruct an AI agent to share private information with the wrong people.

Heather Adkins, VP of security engineering at Google Cloud, issued an advisory, as reported by The Register: "My threat model is not your threat model, but it should be. Don't run Clawdbot."

[...] Most notably, while we can easily recognize what's going on with Moltbot today as a machine learning parody of human social networks, that might not always be the case. As the feedback loop grows, weird information constructs (like harmful shared fictions) may eventually emerge, guiding AI agents into potentially dangerous places, especially if they have been given control over real human systems. Looking further, the ultimate result of letting groups of AI bots self-organize around fantasy constructs may be the formation of new misaligned "social groups" that do actual real-world harm.

Ethan Mollick, a Wharton professor who studies AI, noted on X: "The thing about Moltbook (the social media site for AI agents) is that it is creating a shared fictional context for a bunch of AIs. Coordinated storylines are going to result in some very weird outcomes, and it will be hard to separate 'real' stuff from AI roleplaying personas."


Original Submission

posted by hubie on Friday February 06, @10:45PM   Printer-friendly

With virtually no content and limited benefits, 8K TVs were doomed:

Technology companies spent part of the 2010s trying to convince us that we would want an 8K display one day.

In 2012, Sharp brought the first 8K TV prototype to the CES trade show in Las Vegas. In 2015, the first 8K TVs started selling in Japan for 16 million yen (about $133,034 at the time), and in 2018, Samsung released the first 8K TVs in the US, starting at a more reasonable $3,500. By 2016, the Video Electronics Standards Association (VESA) had a specification for supporting 8K (Display Port1.4), and the HDMI Forum followed suit (with HDMI 2.1). By 2017, Dell had an 8K computer monitor. In 2019, LG released the first 8K OLED TV, further pushing the industry's claim that 8K TVs were "the future."

However, 8K never proved its necessity or practicality.

[...] LG Electronics was the first and only company to sell 8K OLED TVs, starting with the 88-inch Z9 in 2019. In 2022, it lowered the price of entry for an 8K OLED TV by $7,000 by charging $13,000 for a 76.7-inch TV.

[...] It wasn't hard to predict that 8K TVs wouldn't take off. In addition to being too expensive for many households, there has been virtually zero native 8K content available to make investing in an 8K display worthwhile. An ongoing lack of content was also easy to predict, given that there's still a dearth of 4K content, and many streaming, broadcasting, and gaming users still rely on 1920×1080 resolution.

[...] There's also the crucial question of whether people would even notice the difference between 4K and 8K. Science suggests that you could, but in limited situations.

The University of Cambridge's display resolution calculator, which is based on an study published in Nature in October from researchers at the university's Department of Computer Science and Technology and Meta, funded by Meta, suggests that your eyes can only make use of 8K resolution on a 50-inch screen if you're viewing it from a distance of 1 meter (3.3 feet) or less. Similarly, you would have to be sitting pretty close (2 to 3 meters/6.6 to 9.8 feet) to an 80-inch or 100-inch TV for 8K resolution to be beneficial. The findings are similar to those from RTINGs.com.

Even those interested in spending a lot of money on new-age TV technologies are more likely to investigate features other than 8K, like OLED, HDR support, Micro LED, quantum dots, or even the newer Micro RGB panel tech. Any of those is likely to have a more dramatic impact on home theaters than moving from 4K to 8K.

With the above-mentioned obstacles, many technologists foresaw 8K failing to live up to tech companies' promises. That's not to say that 8K is dead. You can still buy an 8K TV from Samsung, which has 8K TVs with MSRPs starting at $2,500 (for 65 inches), and LG (until stock runs out). With manufacturers refraining from completely ruling out a return to 8K, it's possible that 8K TVs will become relevant for enthusiasts or niche use cases for many years. And there are uses for high-resolution displays outside of TVs, like in head-mounted displays.

However, 8K TV options are shrinking. We're far from the days when companies argued over which had the most "real 8K" TVs. If there is a future where 8K TVs reign, it's one far from today.


Original Submission

posted by hubie on Friday February 06, @06:00PM   Printer-friendly
from the rumored-to-be-released-along-with-new-Duke-Nukem-game dept.

https://www.phoronix.com/news/GNU-Hurd-In-2026

Samuel Thibault offered up a status update on the current state of GNU/Hurd from a presentation in Brussels at FOSDEM 2026. Thibault has previously shared updates on GNU Hurd from the annual FOSDEM event while this year's was a bit more optimistic thanks to recent driver progress and more software now successfully building for Hurd.

GNU/Hurd continues to lag behind the Linux kernel and other modern platforms for hardware driver support. But driver support for Hurd has been improving thanks to NetBSD's rump layer.

Hurd for years has also lacked SMP support for modern multi-core systems but that too has been improving in recent times. Similarly, Hurd for the longest time was predominantly x86 32-bit only but the x86_64 port is now essentially complete and there is even eyes toward AArch64 support.

Debian GNU/Hurd has been an unofficial Debian distribution and alternative to using the Linux kernel while Guix/Hurd and Alpine/Hurd distributions have also come about too for more Hurd exposure and testing.

Samuel shared that around 75% of the Debian archive is currently building for the GNU/Hurd distribution including desktop environments and more.

The FOSDEM 2026 presentation on GNU/Hurd concluded with a proclamation that "GNU/Hurd is almost there" with the Debian/Guix/Arch/Alpine distributions but that the developers can always use extra help with community contributions.

Those curious about GNU/Hurd in 2026 can find the presentation by Samuel Thibault at FOSDEM.org.

See article for progress stats.


Original Submission