October 2025 Archive
511.
My Impressions of the MacBook Pro M4 (michael.stapelberg.ch)
512.
Flies keep landing on North Sea oil rigs (theconversation.com)
513.
How to sequence your DNA for <$2k (maxlangenkamp.substack.com)
514.
Radios, how do they work? (2024) (lcamtuf.substack.com)
515.
Modern Linux tools (ikrima.dev)
516.
How ancient people saw themselves (worldhistory.substack.com)
517.
Living Dangerously with Claude (simonwillison.net)
518.
Go subtleties (harrisoncramer.me)
519.
Circular Financing: Does Nvidia's $110B Bet Echo the Telecom Bubble? (tomtunguz.com)
520.
OpenAI acquires Sky.app (openai.com)
521.
Another European agency shifts off US Tech as digital sovereignty gains steam (zdnet.com)
522.
Show HN: In a single HTML file, an app to encourage my children to invest (roberdam.com)
523.
Falling panel prices lead to global solar boom, except for the US (arstechnica.com)
524.
Without data centers, GDP growth was 0.1% in the first half of 2025 (fortune.com)
525.
Responses from LLMs are not facts (stopcitingai.com)
526.
rlsw – Raylib software OpenGL renderer in less than 5k LOC (github.com)
527.
Show HN: MyraOS – My 32-bit operating system in C and ASM (Hack Club project) (github.com)
528.
It's just a virus, the E.R. told him – days later, he was dead (nytimes.com)
529.
This World of Ours (2014) [pdf] (usenix.org)
530.
Show HN: Bash Screensavers (github.com)
531.
Red Hat confirms security incident after hackers breach GitLab instance (bleepingcomputer.com)
532.
WebDAV isn't dead yet (blog.feld.me)
533.
Steve Jobs and Cray-1 to be featured on 2026 American Innovations $1 coin (usmint.gov)
534.
Key IOCs for Pegasus and Predator Spyware Removed with iOS 26 Update (iverify.io)
535.
How to stop Linux threads cleanly (mazzo.li)
536.
Pointer Pointer (2012) (pointerpointer.com)
537.
Robin Williams' daughter pleads for people to stop sending AI videos of her dad (bbc.co.uk)
538.
The fight between doctors and insurance companies over 'downcoding' (nbcnews.com)
539.
Introducing architecture variants (discourse.ubuntu.com)
540.
NSA and IETF: Can an attacker purchase standardization of weakened cryptography? (blog.cr.yp.to)