(date: 2024-03-23 16:16:54)
date: 2024-03-22, from: Dan Rather’s Steady
His legal fees are trumping campaign cash
https://steady.substack.com/p/can-trump-afford-to-run-for-president
date: 2024-03-22, from: Om Malik blog
Microsoft has hired a big chunk of the team that started Inflection, an AI startup developing large language models. They will lead Microsoft AI, a new division within the company that consolidates its consumer AI initiatives with Copilot, Bing, and Edge. DeepMind co-founder Mustafa Suleyman, who co-founded the company alongside Karén Simonyan, and LinkedIn co-founder …
https://om.co/2024/03/22/microsofts-brazen-ai-inflection/
date: 2024-03-22, updated: 2024-03-14, from: Bruce Schneier blog
A new species of squid was discovered, along with about a hundred other species.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here.
date: 2024-03-22, updated: 2024-03-22, from: Daring Fireball
https://www.youtube.com/watch?v=1H4SNFtEzys
date: 2024-03-22, updated: 2024-03-21, from: Bruce Schneier blog
BleepingComputer has the details. It’s $2M less than in 2022, but it’s still a lot.
The highest reward for a vulnerability report in 2023 was $113,337, while the total tally since the program’s launch in 2010 has reached $59 million.
For Android, the world’s most popular and widely used mobile operating system, the program awarded over $3.4 million.
Google also increased the maximum reward amount for critical vulnerabilities concerning Android to $15,000, driving increased community reports.
During security conferences like ESCAL8 and hardwea.io, Google awarded $70,000 for 20 critical discoveries in Wear OS and Android Automotive OS and another $116,000 for 50 reports concerning issues in Nest, Fitbit, and Wearables…
https://www.schneier.com/blog/archives/2024/03/google-pays-10m-in-bug-bounties-in-2023.html
date: 2024-03-22, updated: 2024-03-22, from: Julia Evans blog
https://jvns.ca/blog/2024/03/22/the-current-branch-in-git/
date: 2024-03-22, from: Robert Reich’s blog
He gave me a great gift
https://robertreich.substack.com/p/my-mentor-ken-galbraith
date: 2024-03-22, from: John Naughton’s online diary
Figures in a cloister Quote of the Day “I’ve been accused of vulgarity. I say that’s bullshit.” Mel Brooks Musical alternative to the morning’s radio news Liam O’Flynn | The Rocks Of Bawn Link Long Read of the Day A … Continue reading
https://memex.naughtons.org/friday-22-march-2024/39268/
date: 2024-03-21, updated: 2024-03-21, from: Daring Fireball
https://www.theverge.com/2024/3/21/24107976/apple-carplay-doj-lawsuit-anticompetitive-digital-key
date: 2024-03-21, updated: 2024-03-21, from: Daring Fireball
https://support.apple.com/guide/applestyleguide/welcome/web
date: 2024-03-21, updated: 2024-03-23, from: Daring Fireball
https://sixcolors.com/post/2024/03/u-s-versus-apple-a-first-reaction/
date: 2024-03-21, updated: 2024-03-21, from: Daring Fireball
date: 2024-03-21, updated: 2024-03-21, from: Daring Fireball
https://www.nytimes.com/2024/03/21/technology/apple-doj-lawsuit-antitrust.html
date: 2024-03-21, from: Economics from the Top-Down
Yes, the Bitcoin network uses loads of energy. But so does mainstream finance. So which system is more energy intensive? In this post, I do the math.
The post Is Bitcoin More Energy Intensive Than Mainstream Finance? appeared first on Economics from the Top Down.
date: 2024-03-21, updated: 2024-03-17, from: Bruce Schneier blog
This mini-essay was my contribution to a round table on Power and Governance in the Age of AI. It’s nothing I haven’t said here before, but for anyone who hasn’t read my longer essays on the topic, it’s a shorter introduction.
The increasingly centralized control of AI is an ominous sign. When tech billionaires and corporations steer AI, we get AI that tends to reflect the interests of tech billionaires and corporations, instead of the public. Given how transformative this technology will be for the world, this is a problem.
To benefit society as a whole we need an …
https://www.schneier.com/blog/archives/2024/03/public-ai-as-an-alternative-to-corporate-ai.html
date: 2024-03-21, from: Robert Reich’s blog
Friends, On Friday, machinists at Rogue Valley International Airport in Medford, Oregon, discovered that a United Airlines plane that had landed from San Francisco was missing an external panel (see photo, above). The plane was manufactured by Boeing. It was carrying 139 passengers and 6 crew. No one was injured, thank heavens. The missing panel went unnoticed during the flight.
https://robertreich.substack.com/p/why-boeing-is-such-as-shitty-company
date: 2024-03-21, updated: 2024-03-21, from: Daring Fireball
https://support.apple.com/en-us/docs
date: 2024-03-20, from: Liam on Linux
I can’t speak for anyone else but I can tell you why I did it.
I was broke, I know PCs and Macs and Mac OS X – I ran OS X 10.0, 10.1 and 10.2 on a PowerMac 7600 using XPostFacto.
I got the carcase of a Core 2 Extreme PC on my local Freecycle group in 2012.
https://twitter.com/lproven/status/257060672825851904
RAM, no hard disks, no graphics, but case/mobo/CPU/PSU etc.
I took the nVidia card and hard disks from my old Athlon XP. I got the machine running, and thought it was worth a try since it was mostly Intel: Intel chipset, Intel CPU, etc.
I joined some fora, did some reading, used Clover and some tools from TonyMacX86 and so on.
After two days’ work it booted. I got no sound from my SoundBlaster card, so I pulled it, turned the motherboard sound back on, and reinstalled.
It was a learning experience but it worked very well. I ran Snow Leopard on it, as it was old enough to get no new updates that would break my Hack, but new enough that all the modern browsers and things worked fine. (2012 was the year Mountain Lion came out, so I was 2 versions behind, which suited me fine – and it ran PowerPC apps, and I preferred the UI of the PowerPC version of MS Word, my only non-freeware app.)
I had 4 CPU cores, it was maxed out with 8GB RAM, and it was nice and quick. As it was a desktop, I disabled all support for sleep and hibernation: I turn my desktops off at night to save power. It drove a matched pair of 21” CRT monitors perfectly smoothly. I had an Apple Extended keyboard on an ADB-to-USB convertor since my PS/2 ports weren’t supported.
It wasn’t totally reliable – occasionally it failed to boot, but a power cycle usually brought it back. It was fast and pretty stable, it ran all the OS X FOSS apps I usually used, it was much quicker than my various elderly PowerMacs and the hardware cost was essentially £0.
It was more pleasant to use than Linux – my other machines back then ran the still-somewhat-new Ubuntu, using GNOME 2 because Unity hadn’t gone mainstream yet.
Summary: why not? It worked, it gave me a very nice and perfectly usable desktop PC for next to no cost except some time, it was quite educational, and the machine served me well for years. I still have it in a basement. Sadly its main HDD is not readable any more.
It was fun, interesting, and the end result was very usable. At that time there was no way I could have afforded to buy an Intel Mac, but a few years, one emigration and 2 new jobs later, I did so: a 2011 i5 Mac mini which is now my TV-streaming box, but which I used as my main machine until 2017 when I bought a 27” Retina iMac from a friend.
Cost, curiosity, learning. All good reasons in my book.
This year I Hacked an old Dell Latitude E7270, a Core i7 machine maxed out with 16GB RAM – with Big Sur because its Intel GPU isn’t supported in the Monterey I tried at first. It works, but its wifi doesn’t, and I needed to buy a USB wifi dongle. But performance wasn’t great, it took an age to boot with a lot of scary text going past, and it didn’t feel like a smooth machine. So, I pulled its SSD and put a smaller one in, put ChromeOS Flex on it, and it’s now my wife’s main computer. Fast, simple, totally reliable, and now I have spare Wifi dongle. :-/ I may try on one of my old Thinkpads next.
It is much easier to Hackintosh a PC today than it was 10-12
years ago, but Apple is making the experience less rewarding, as is
their right. They are a hardware company.
(Repurposed from a
Lobsters
comment.)
comments
https://liam-on-linux.dreamwidth.org/90591.html
date: 2024-03-20, updated: 2024-03-20, from: Daring Fireball
https://wiki.keyboardmaestro.com/manual/Whats_New
date: 2024-03-20, updated: 2024-03-20, from: Daring Fireball
https://www.barebones.com/support/bbedit/notes-15.0.html
date: 2024-03-20, updated: 2024-03-14, from: Bruce Schneier blog
The Wall Street Journal is reporting on a variety of techniques drivers are using to obscure their license plates so that automatic readers can’t identify them and charge tolls properly.
Some drivers have power-washed paint off their plates or covered them with a range of household items such as leaf-shaped magnets, Bramwell-Stewart said. The Port Authority says officers in 2023 roughly doubled the number of summonses issued for obstructed, missing or fictitious license plates compared with the prior year.
Bramwell-Stewart said one driver from New Jersey repeatedly used what’s known in the streets as a flipper, which lets you remotely swap out a car’s real plate for a bogus one ahead of a toll area. In this instance, the bogus plate corresponded to an actual one registered to a woman who was mystified to receive the tolls. “Why do you keep billing me?” Bramwell-Stewart recalled her asking…
date: 2024-03-20, from: Robert Reich’s blog
Friends, Our Office Hours is used to deliberate issues in the open that are quietly being debated but without the advantage of fuller debate. And because this space is reserved for active participants in our community, we can debate even uncomfortable issues freely.
https://robertreich.substack.com/p/office-hours-should-biden-keep-kamala
date: 2024-03-20, from: Daniel Stenberg Blog
years++; It feels like it was not very long ago that we had the big curl 25 year celebrations. I still have plenty of fluid left in my 25 year old whiskey from last year and I believe I will treat myself a drink from that tonight. I have worked on curl full-time and spare … Continue reading curl turns 26 today
https://daniel.haxx.se/blog/2024/03/20/curl-turns-26-today/
date: 2024-03-20, updated: 2024-03-20, from: Daring Fireball
https://www.wsj.com/tech/ai/nvidia-annual-conference-chips-7692760d
date: 2024-03-20, updated: 2024-03-20, from: Daring Fireball
https://ourworldindata.org/weather-forecasts
date: 2024-03-20, updated: 2024-03-20, from: Daring Fireball
date: 2024-03-20, from: John Naughton’s online diary
Gardener’s world Quote of the Day ”A clothes rack in search of a war zone.” Gavin Jacobson on the faux intellectual Bernard-Henri Lévy Musical alternative to the morning’s radio news Samuel Barber | Adagio for Strings, Op.11 | Vienna Philharmonic … Continue reading
https://memex.naughtons.org/wednesday-20-march-2024/39262/
date: 2024-03-20, from: Om Malik blog
I recently redesigned my homepage to provide a clearer context about “me” as a writer and as a person. Not just to simplify things, but also to put more “I” in the new age of “AI” where it will increasingly become challenging to distinguish human from machine. The best part of the Internet is that it is always evolving. It is nothing if not a reflection of we the people, who …
https://om.co/2024/03/19/ai-is-changing-writing-here-is-what-to-do-about-it/
date: 2024-03-19, from: Dan Rather’s Steady
Felons present and pardoned in Trump-world
https://steady.substack.com/p/the-white-house-to-the-big-house
date: 2024-03-19, updated: 2024-03-20, from: Daring Fireball
date: 2024-03-19, updated: 2024-03-19, from: Daring Fireball
https://www.thesun.co.uk/tv/26774029/aaron-taylor-johnson-offered-role-james-bond/
date: 2024-03-19, updated: 2024-03-19, from: Daring Fireball
date: 2024-03-19, from: David Rosenthal’s blog
Thankfully, pig butchering scams are getting attention. Three weeks after I posted Tracing The Pig Butchers, John M. Griffin and Kevin Mei posted How Do Crypto Flows Finance Slavery? The Economics of Pig Butchering:Through blockchain addresses used by ‘‘pig butchering’’ victims, we trace crypto flows and uncover methods commonly used by scammers to obfuscate their activities, including multiple transactions, swapping between cryptocurrencies through DeFi smart contracts, and bridging across blockchains. The perpetrators interact freely with major crypto exchanges, sending over 104,000 small potential inducement payments to build trust with victims. Funds exit the crypto network in large quantities, mostly in Tether, through less transparent but large exchanges—Binance, Huobi, and OKX. These criminal enterprises pay approximately 87 basis points in transaction fees and appear to have recently moved at least $75.3 billion into suspicious exchange deposit accounts, including $15.2 billion from exchanges commonly used by U.S. investors. Our findings highlight how the ‘‘reputable’’ crypto industry provides the common gateways and exit points for massive amounts of criminal capital flows. We hope these findings will help shed light on and ultimately stop these heinous crimes.
Griffin & Wei Fig. 9 |
We start with 3,256 Ethereum addresses, 770 Bitcoin addresses, and 702 Tron addresses. Most addresses are used ten or more times, and 28% of addresses are used more than one hundred times. Of these initial sets, Ethereum addresses receive $5.8 billion in funds, compared to $389 million for Tron and $373 million for Bitcoin. Given that the Ethereum addresses represent approximately 88% of the total funds, we begin by examining Ether (ETH, the native cryptocurrency on Ethereum) and token (commonly known as ERC-20 tokens) transactions on the Ethereum blockchain.
We trace victim funds in bulk and follow their paths to centralized exchange deposit addresses from January 2020 to February 2024. Figure 1 plots the resulting network for a three percent sample of nodes from the traced network and highlights many features.This reveals four main points:
First, the figure shows how crypto often originates from large exchanges where investors commonly have accounts (Coinbase, Crypto.com, and Binance) and flows into the network.The victims need to convert fiat into cryptocurrency using well-known, trusted exchanges.
Second, funds are often swapped for Tether (known as USDT) through Tokenlon.Tokenlon is not a mixer, similar to Tornado Cash, but “a relatively obscure decentralized exchange”. The scammers’ goal is partly to obscure their tracks but also to avoid the volatility of cryptocurrencies by converting to stablecoins at the first opportunity.
Third, after circulating through various hops in the network, crypto exits the system through centralized exchange deposit addresses.Even stablecoins won’t by the Lambo, so the scammers have to get their loot to somewhere that can convert it to fiat.
Fourth, transactions in amounts above $100,000 and in particular $1 million commonly transfer funds to deposit addresses on Binance, Huobi, and OKX.Obviously, they are the offshore exchanges that lack effective KYC/AML, and in particular the one that pled guilty.
But the $75 billion number was certainly a surprise, and it’s hit mainstream outlets including Time. I have to say I have some doubts about the number, particularly given other estimates have been in the low billions, but regardless, it’s clear that the pig butchering issue in crypto is a multi-billion dollar problem.But there are good reasons why Griffin and Wei would come up with much larger numbers for revenue than earlier tracing efforts; they are looking at a much larger fraction of the total scammer network. Zeke Faux’s article in Time starts:
Pig-butchering scammers have likely stolen more than $75 billion from victims around the world, far more than previously estimated, according to a new study.That is not what the paper says. It says they:
recently moved at least $75.3 billion into suspicious exchange deposit accountsThe paper points out that the $75.3B in flows includes some amount of double-counting:
If a network sent funds from say OKX to Binance, it would lead to the double-counting of funds. Additionally, the funds may be due to other activities of the criminal networks. … We examine the sources of funds that later enter into these potential scammer deposit addresses and find that $40.2 billion of the $75.3 billion can be attributed to exchanges.It is unlikely that all this movement from one exchange to another is between scammer accounts, so $35.1B is a conservative estimate.
Across all exchanges, the scammer network initiated 104,460 deposits to centralized exchanges for amounts below $10,000, most commonly in small amounts clustering at round numbers, such as $100, $200 or $500. The transaction patterns mirror the characteristics of inducement payments in pig butchering scams, which are small payments from scammers to victims used to build trust. … We find 83% of potential inducement payments are sent from addresses used in more than ten transactions, suggesting limited monitoring by crypto exchanges.There is a reason for “limited monitoring by crypto exchanges”. The 87 basis points the authors find on movements of $75.3B is $655M in fees over 4 years, enough to motivate turning a blind eye.
Griffin & Wei Fig. 2a |
Edges that are concave up represent flows moving from left to right (e.g., the curve moves as if going from 9 o’clock to 3 o’clock). Similarly, edges that are concave down represent flows moving from right to left (e.g., from 3 o’clock to 9 o’clock). Nodes are colored by identity, … and their size is proportional to the total amount transacted. Edges are colored by transaction size and identity. Green edges are transactions from exchanges, while blue and purple are transactions to exchanges. Edges entering or exiting exchanges with darker colors represent larger transactions.What Figure 2a shows is that:
The victim sent funds to the left red node and were later transferred to the right red node, which swapped the funds into Tether.
Griffin & Wei Fig. 2b |
Griffin & Wei Fig. 2c |
Since scammers are unlikely to return large sums of stolen funds, we consider deposit addresses that receive more than $100,000 as more likely to be scammer deposit addresses. These addresses are rarely associated with Western exchanges, but are common within Binance, Huobi, and OKX, as well as exchanges such as Kucoin, Bitkub, and MXC. The common feature of these exchanges is that they have loose KYC procedures and are perceived to be outside of U.S. jurisdiction. To more fully understand the scope of the network, we apply “deposit address clustering” by tracking addresses that send funds into these deposit addresses and finding other recipient deposit addresses associated with the same user. To avoid capturing payments made by criminals for things like inducement payments, we exclude all connections below $100,000 and only consider direct connections.This is where the $75.3B number comes from; it is the total inflow into deposit addresses at offshore exchanges believed to be controlled by scammers. Note again the potential for double-counting if scammers move funds between these exchanges. Deposit address clustering was published by Friedhelm Victor in Address clustering heuristics for Ethereum (Section 5.1):
To credit the assets to the correct account, exchanges typically create so-called deposit addresses, which will then forward received funds to a main address. As these deposit addresses are created per customer, multiple addresses that send funds to the same deposit address are highly likely to be controlled by the same entity. … The forwarded amount is often slightly less than what was received, as the exchange has to pay for the transaction costs. In most cases, deposit addresses are EOAs [Externally Owned Accounts], but they can also be smart contracts. When depositing tokens on the cryptocurrency exchange Kraken for example, users are instructed to send them to a given smart contract address, identical versions of which have been mass deployed in advance. This makes it trivial to identify all identical token deposit contracts deployed by Kraken. They are designed to forward received tokens automatically, thereby passing on the transaction costs to the user.
Victor Fig 1 |
Scammers extensively recirculate and swap funds across different addresses and cryptocurrencies. These transactions incur costs, but may help obfuscate the true source of their funds. We estimate that transaction costs for a network of this scale total to 87 basis points as a portion of outflows to exchange deposit addresses. In contrast, Soudijn and Reuter (2016) find costs of 7-16% to move physical Euro bills from Europe to Columbia and money laundering commission estimates range from 4-12% (US Treasury Department, 2002) and 10-20% (US Treasury Department, 2007). Cryptocurrencies thus appear to be a much more cost-effective channel for moving illicit funds across borders. In total, scammer swap transactions may constitute more than 58% of Tokenlon transactions since 2022. We observe large inflows from potentially Chinese victims in 2020; however, after the Chinese financial authorities banned cryptocurrency trading in late 2021, there appears to be a dramatic decrease in Chinese victims and a shift to US-based victims. Overall, in the set of addresses touched by the criminals, we find $1.172 trillion dollars of volume, 84% of which is in Tether.Griffin and Wei conclude:
This project highlights how large-scale tracing of tainted funds can help expose and understand criminal financial activity that can hopefully be used as a roadmap in other criminal contexts. There are several other practical implications of our study. First, organized or “legitimate” crypto exchanges serve as the on- and off-ramps for billions of dollars in criminal proceeds. Users with a crypto exchange account should realize that crypto exchange users are frequent targets of scams, and their funds are just a quick transfer away from being irreversibly lost—a risk that is far less prevalent for traditional investment accounts. Second, our findings indicate that the large players in the crypto space are likely not sufficiently protecting their customers from scams. Third, the Ethereum network appears to drastically reduce barriers for illicit financial flows of transnational organized crime. Fourth, romance scammers prefer the stablecoin Tether over other cryptocurrencies and the Ethereum network over Bitcoin. Fifth, decentralized exchanges also serve as large swapping points to exchange crypto and obfuscate funds. Crypto hedge funds and users (many based in the U.S. and Europe) who might purport to engage in “arbitrage” or “liquidity trading” (PWC, 2023) may simply be making profits by facilitating low-cost money laundering. Finally, the large centralized crypto exchanges located in jurisdictions with opaque regulatory environments (Binance, Huobi, OKX, and others) seem to be preferential potential exit points that can further finance extremely large amounts of criminal activities. Such activity has continued as of February 16, 2024, despite recent crackdowns.Other recent developments in pig-butchering include:
Paolo Ardoino, the chief executive officer of Tether, called the report false and misleading. “With Tether, every action is online, every action is traceable, every asset can be seized and every criminal can be caught,” Ardoino said in a statement. “We work with law enforcement to do exactly that.”This is more obfuscation from Tether. The paper clearly demonstrates that the scammers rapidly convert their takings to stablecoins, overwhelmingly Tether, and that they are able to use offshore exchanges as their off-ramps.
Tether has cooperated with authorities in some cases to freeze accounts tied to fraud. But often by the time the crime is reported, the scammers have already cashed out.
https://blog.dshr.org/2024/03/more-on-pig-butchering.html
date: 2024-03-19, updated: 2024-03-14, from: Bruce Schneier blog
Oh, how the mighty have fallen. A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. Now front pages are splashed with stories of social platforms’ role in misinformation, business conspiracy, malfeasance, and risks to mental health. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in partisan polarization.
Today, tech’s darling is artificial intelligence. Like social media, it has the potential to change the world in many ways, some favorable to democracy. But at the same time, it has the potential to do incredible damage to society…
https://www.schneier.com/blog/archives/2024/03/ai-and-the-evolution-of-social-media.html
date: 2024-03-19, from: Robert Reich’s blog
He is centering his entire campaign on the January 6, 2021 riot and his charge that the 2020 election was stolen.
https://robertreich.substack.com/p/trumps-incitements-to-violence-must
date: 2024-03-19, updated: 2024-03-19, from: Daring Fireball
https://archive.org/details/Maverick1944MemoAboutGobbledygook
date: 2024-03-19, updated: 2024-03-19, from: Daring Fireball
https://mastodon.social/@stroughtonsmith/112118127201793072
date: 2024-03-19, updated: 2024-03-19, from: Daring Fireball
https://workos.com/?utm_source=daringfireball&utm_medium=display&utm_campaign=q12024
date: 2024-03-19, updated: 2024-03-21, from: Daring Fireball
https://twitter.com/KayJebelli/status/1769635526062043315
date: 2024-03-19, updated: 2024-03-19, from: Daring Fireball
date: 2024-03-18, updated: 2024-03-20, from: Daring Fireball
My (admittedly belated) remarks on Apple’s year.
https://daringfireball.net/2024/03/my_2023_apple_report_card
date: 2024-03-18, from: Dan Rather’s Steady
Don’t look now, but are the polls moving?
https://steady.substack.com/p/the-high-price-of-humiliation
date: 2024-03-18, updated: 2024-03-18, from: Daring Fireball
https://mas.to/@carnage4life/112116603751149754
date: 2024-03-18, updated: 2024-03-18, from: Daring Fireball
date: 2024-03-18, updated: 2024-03-18, from: Daring Fireball
date: 2024-03-18, updated: 2024-03-18, from: Daring Fireball
https://pxlnv.com/linklog/typography-palette-sonoma/
date: 2024-03-18, from: Daniel Stenberg Blog
I am doing another webinar on March 28 2024, introducing newcomers to how to Internet transfers using the libcurl API. Starting at 10am Pacific time. 17:00 UTC. 18:00 CET. Agenda The plan is to spend about 30 minutes going through the topics in the agenda and then take as long as necessary to let the … Continue reading getting started with libcurl
https://daniel.haxx.se/blog/2024/03/18/getting-started-with-libcurl/
date: 2024-03-18, updated: 2024-03-14, from: Bruce Schneier blog
Fascinating analysis of the use of drones on a modern battlefield—that is, Ukraine—and the inability of the US Air Force to react to this change.
The F-35A certainly remains an important platform for high-intensity conventional warfare. But the Air Force is planning to buy 1,763 of the aircraft, which will remain in service through the year 2070. These jets, which are wholly unsuited for countering proliferated low-cost enemy drones in the air littoral, present enormous opportunity costs for the service as a whole. In a set of comments posted on LinkedIn…
https://www.schneier.com/blog/archives/2024/03/drones-and-the-us-air-force.html
date: 2024-03-18, from: Chris Heilmann’s blog
VS Code now has port forwarding. If you want to share what you are working on with the world, open folder in terminal, run your server and forward the port. Set it to public and Bob’s your uncle! This is great for some testing and showing people what you do, but of course should not […]
date: 2024-03-18, from: Chris Heilmann’s blog
Last Friday, I released the 107th edition of WeAreDevelopers DevDigest. It celebrated the 35th birthday of the World Wide Web, we had a video of me interviewing the founders of Daytona about going open source, we covered the news around Devin, the first AI software engineer and went to space in a Yugo. All strapped […]
https://christianheilmann.com/2024/03/18/dev-digest-107-and-the-osscar-goes-to/
date: 2024-03-18, from: Robert Reich’s blog
Please spread the word
https://robertreich.substack.com/p/the-biggest-contrast-in-the-upcoming
date: 2024-03-18, from: Om Malik blog
A few days ago, Vinod Khosla got into a war of words with Marc Andreessen. Or was it Elon? It was an argument over OpenAI and “open” AI. It might have felt like a bunch of capitalist leviathans butting their big heads, but for me, this was classic Vinod. Always speaking his mind, and batting …
https://om.co/2024/03/17/vk-one/
date: 2024-03-18, from: John Naughton’s online diary
Cue Wordsworth… Quote of the Day ”If economists wished to study the horse, they wouldn’t go and look at horses. They’d sit in their studies and say to themselves, ‘What would I do if I were a horse?’” Ely Devons … Continue reading
https://memex.naughtons.org/monday-18-march-2024/39250/
date: 2024-03-17, updated: 2024-03-17, from: Daring Fireball
date: 2024-03-17, from: Om Malik blog
I have become a big fan of vintage fountain pens. When I saw this lovely Ebonized Pearl WASP Clipper, I immediately fell in love with it. This is quite a rare find. Most collectors won’t even take it out of the cabinet. I don’t buy things to put them in a case. For me, it …
https://om.co/2024/03/17/old-tools-new-ideas/
date: 2024-03-17, from: Enlightenment Economics blog
I read Peter Turchin’s (2023) End Times: Elites, Counter-Elites and the Path of Political Disintegration on a long flight yesterday (I’m at Stanford for a couple of workshops). I’m not sure what to make of it. It’s well-written and an … Continue reading
http://www.enlightenmenteconomics.com/blog/index.php/2024/03/were-all-doomed-maybe/
date: 2024-03-17, from: Dan Rather’s Steady
A Reason To Smile
https://steady.substack.com/p/i-will-always-love-you
date: 2024-03-17, from: Robert Reich’s blog
And last week’s winner
https://robertreich.substack.com/p/sunday-caption-contest-the-race-is
date: 2024-03-17, from: Robert Reich’s blog
His speech today in Ohio shows it
https://robertreich.substack.com/p/trump-is-out-of-his-mind-and-desperate