News

One command turns any open-source repo into an AI agent backdoor. OpenClaw proved no supply-chain scanner has a detection category for it
Just two months ago, researchers at the Data Intelligence Lab at the University of Hong Kong introduced CLI-Anything, a new state-of-the-art tool that analyzes any repo’s source code and generates a structured command line interface (CLI) that AI coding agents can operate with a …
venturebeat.com
A blueprint for using AI to strengthen democracy
Every few centuries, changes in how information moves reshape how societies govern themselves. The printing press spread vernacular literacy, helping give rise to the Reformation and, eventually, representative government. The telegraph made it possible to administer vast nations…
MIT Technology Review
Pornhub Expands Access in the U.K. Thanks to Apple’s New Age Verification System
The porn site is once again allowing new users in the U.K. to access its content if they verify their age through an Apple device.
gizmodo.com
★ Software as the Product of Obsession Times Voice
Back in 2009, Merlin Mann and I jointly gave a talk at SxSW titled “Obsession Times Voice”. Regarding how it turned out, I wrote: My muse for the session was this quote from Walt Disney: “We don’t make movies to make money; we make money to make more movies.” To me, that’s it. Th…
daringfireball.net
Pedometer++ 8.0
David Smith, “Six Years Perfecting Maps on watchOS”: I love going on wilderness adventures. I am rarely happier than when I am far off into the mountains without a soul in sight. As a result, I have spent a lot of time learning how to safely explore and navigate when I’m away fro…
david-smith.org
Nia DaCosta Is Just as Disappointed by the ‘Bone Temple’ Box Office as You Are
The '28 Years Later' sequel opened about six months after the previous film, and the director wonders if that might have worked against it.
gizmodo.com
International tech
There’s a certain type of boomer who treats unsolicited opinions as a love language — about your weight, your job, your spouse, your house, your parenting — and is genuinely confused when their adult children seem distant, because in their generation criticism was care, and nobody has told them clearly that the rules of love changed about thirty years ago.
When people talk about the gulf between adult children and their boomer parents, they usually frame it as a story about cruelty, or coldness, or some failure of empathy on one side or the other. I don’t think that’s what’s going on, mostly. I think it’s a translation problem that…
siliconcanals.com
Armory Gets ₹100 Cr Defence Ministry Order For Counter Drone Systems
Defence tech startup Armory has bagged a ₹100 Cr ($10.5 Mn) order from the defence ministry for its AI-powered counter-unmanned…
inc42.com
The global cybersecurity gap deepens as AI-powered attacks surge
Restricted access to powerful defensive AI tools like Anthropic’s Mythos leaves some companies, central banks, and nations more vulnerable than others.
restofworld.org
Supersized and scaling: China pushes 10,000-card computing clusters in AI race
In China, computing facilities have emerged as a new form of infrastructure over the past two years, sparking an arms race among cities and technology companies to build 10,000-card computing clusters. These clusters – which link 10,000 or more artificial intelligence accelerator…
scmp.com
I’m 38 and I noticed last summer that my parents only ask about logistics — the drive, the weather, the dogs, the job — and never about how I actually am, and I realized I’d been answering questions about the surface of my life for so long I’d forgotten what it felt like to be asked about anything underneath
I drove to my parents’ house last summer for a long weekend, and somewhere on the second day I noticed something I’d been not-noticing for about thirty years. It was the Saturday morning, in the kitchen. My mother had asked me how the drive had been. I told her. Then she asked ab…
siliconcanals.com
Apple could allow users to switch between AI providers like OpenAI, Google, and Anthropic in iOS 27 features
Apple is reportedly planning a major change with iOS 27, where users… Content originally published on The Tech Portal - Global technology news, latest gadget news and breaking tech news.
thetechportal.com

Trending

Using NFC to Power Devices Instead of Qi
It shouldn’t be any surprise that NFC and similar RFID implementations are capable of providing power to a receiver, since this is after all how RFID tags can work without …read more
hackaday.com
Cutting Steel Gears with Homemade EDM
Electrostatic discharge machining (EDM) may be slower than alternatives like laser cutting, water jets, or a milling machine, but for some applications there’s no alternative: it can cut through any …read more
hackaday.com
California farmers to destroy 420k peach trees following Del Monte bankruptcy
Article URL: https://www.sfgate.com/centralcoast/article/usda-aid-california-farmers-22240694.php Comments URL: https://news.ycombinator.com/item?id=48026349 Points: 264 # Comments: 320
sfgate.com
How Giant Tanks Of Fluid Could Help Support The Power Grid
If you’ve been paying any attention to the renewable energy space, you’ll know that generation isn’t really the problem anymore. Solar panels are cheap, and wind turbines are everywhere. The …read more
hackaday.com
IBM didn't want Microsoft to use the Tab key to move between dialog fields
Article URL: https://devblogs.microsoft.com/oldnewthing/20260505-00/?p=112298 Comments URL: https://news.ycombinator.com/item?id=48025687 Points: 298 # Comments: 173
devblogs.microsoft.com
A Digital Audio Recorder For TOSLink
Every now and then in our travels we come upon a project with such an obvious need that it’s almost a surprise nobody has thought of doing it before. So …read more
hackaday.com
.de TLD offline due to DNSSEC?
Article URL: https://dnssec-analyzer.verisignlabs.com/nic.de Comments URL: https://news.ycombinator.com/item?id=48027897 Points: 523 # Comments: 242
dnssec-analyzer.verisignlabs.com
Defeating the [Works By Design]’s Unpickable Lock
Even though the very concept of an ‘unpickable lock’ is as plausible as making water not be wet, this doesn’t take away from the intellectual thrill of devising solutions to …read more
hackaday.com
Connecting LLMs to the Real World: Tool Use, Function Calling, and MCP
In this article, we will look at this progression that has happened from basic tool use to function calling to the Model Context Protocol, allowing the LLMs to go from isolated text generation tools to assistants that can do interesting stuff for the end users.
bytebytego.com