10 interesting stories served every morning and every evening.
...
Read the original on xdaforums.com »
...
Read the original on lend-me-your-ears.specr.net »
The European Commission has opened
a “call
for evidence” to help shape its European Open Digital Ecosystem Strategy. The commission is looking to reduce its dependence on software from non-EU countries:
The feedback period runs until midnight (Brussels time) February 3, 2026. The commission seeks input from all interested stakeholders, “in particular the European open-source community
(including individual contributors, open-source companies and
foundations), public administrations, specialised business sectors,
the ICT industry, academia and research institutions”.
...
Read the original on lwn.net »
I discovered a Default ArcGIS API key embedded in Flock Safety’s public-facing JavaScript bundles. This single credential granted access to the company’s ArcGIS mapping environment, and 50 private layers, the same infrastructure that consolidates license plate detections, patrol car locations, drone telemetry, body camera locations, 911 call data, and surveillance camera locations from approximately 12,000 law enforcement, community, and private sector deployments nationwide. The key was not restricted by referrer, IP, or origin allowing it to be used by anyone, anywhere. It was exposed publicly across 53 separate Flock Safety front-end bundles and environments, each instance independently granting access to their ArcGIS mapping platform.Across the United States, license plate readers, drones, and audio sensors quietly record the movements of millions of people every day. Flock Safety operates one of the largest and most rapidly expanding of these networks, with hundreds of thousands of cameras generating over 30 billion vehicle detections each month, and an undisclosed amount of people detections.At the center of this infrastructure is FlockOS, which Flock markets under the headline “One map. Smarter Response.” According to their own documentation, the ArcGIS-powered interface “consolidates all data streams and the locations of each connected asset, enabling greater situational awareness and a common operating procedure.” (Source: ClearGov Resource Document)That “one map” is not a metaphor. It is the ArcGIS stack itself and the exposed API key unlocked it.The exposed credential was an organization-wide ArcGIS API key tied directly to Flock Safety’s ArcGIS mapping environment. It appeared in client-side JavaScript bundles served from development subdomains that were publicly accessible.Querying the ArcGIS API with this key returned metadata confirming its scope and the extent of Flock’s misconfiguration:The credential was tagged appTitle: “Default API Key”, the auto-generated key Esri creates at account signup. According to Esri’s ArcGIS documentation:“An API key is a permanent access token that defines the scope and permission for granting your public-facing application access to specific, ready-to-use services and private content… An API key is created for you when you sign up for an ArcGIS Developer account.“The key’s metadata listed 50 “portal:app:access:item: privileges each granting access to a private ArcGIS item.Given Flock’s centralized “one map” architecture where participating agencies contribute data to shared, Flock-owned layers rather than maintaining separate instances each of those 50 private items likely aggregates data from hundreds or thousands of agencies. A single Detections layer would contain hotlist hits from all ~5,000 participating police departments. A single Mobile Units layer would show patrol car positions across every integrated agency.“For the highest level of security, always set the API key scopes and referrers before deploying an application.“Flock applied no referrer restrictions, no IP allowlist, and no scope limitations. They took the default key, granted it access to 50 private items, and embedded it in client-side JavaScript bundles across 53 publicly accessible endpoints:Each endpoint independently served the same unrestricted credential 53 times, and any one of them could have been used to access Flock’s ArcGIS environment.ru=({
esriMapsApiKey: t,
baseLayers: n,
dynamicLayers: i,
featureLayers: o,
markerLayers: a,
nonClusteredMarkerLayers: s,
clusteredMarkerLayers: l,
heatmapLayers: h,
focusedMarkers: p,
selectedLayers: g,
setSelectedLayers: A,
onBaseLayerChange: y,
onCustomMapLayerSelectionChange: b
})A single component consumes the Esri API key alongside every layer type: base maps, dynamic overlays, feature layers, clustered and non-clustered markers, and heatmaps. Layer selection state is managed uniformly across all data sources.Internal permission flags from JavaScript bundles confirm FlockOS’s role as the unified interface:FlockOS is the interface; ArcGIS is the substrate. The exposed API key granted access to the common mapping layer where all Flock Safety applications converge: camera inventories, mobile units, detection outputs, hotlists, search geometries, drone telemetry, Raven analytics, officer-accessible views, and Flock911 incidents.People searches rendered as tracked objects on the mapSearch footprints—the actual polygons and radii investigators draw when selecting geographic areas of interestCounts of interior and exterior cameras per locationAudio and transcript data flows through the same map context as cameras, patrol units, and alerts. No separate security boundary exists at the mapping layer.Every status chip rendered on the patrol/device tray (via hQ) only recognizes the values: Docked, Buffering, Recording, Inactive, Offline, Off, ON, ONLINE, ACTIVE, Charging, and Uploading. Statuses in the “online/charging/buffering” group render as green; “inactive/offline/off” renders gray; and “recording” renders red. This confirms the complete set of device states actively rendered on the shared map UI.The exposed Default API Key was not an isolated incident.I separately disclosed an additional critical vulnerability involving unauthenticated ArcGIS token minting. This vulnerability allows unauthenticated users to obtain valid ArcGIS tokens scoped to Flock Safety’s production environment from their development environment, tokens titled “Flock Safety Prod” that grant access to the geographic mapping of Flock’s camera network locations.I am withholding specific technical details to prevent exploitation while the vulnerability remains unpatched. However, its existence more than 55 days after responsible disclosure with no remediation, demonstrates a systemic pattern of credential mismanagement.Both keys operated under the same active subscription with nearly one million available credits. Critically, development environments were configured with broader access than production, and those development sites were publicly accessible.The 50 “portal:app:access:item” privileges reference private item IDs that cannot be inventoried without actively querying each one which I did not do. However, ArcGIS collaboration features allow partner organizations to share layers into another organization’s portal, and evidence suggests this capability was actively used.An individual at a sheriff’s office with an active Flock deployment confirmed during the course of this research that their agency shares ArcGIS layers directly with Flock Safety’s organization. This corroborates the technical architecture documented in Esri’s collaboration documentation and aligns with the privilege structure observed in the exposed credential metadata.What I can state with certainty:Esri’s own documentation confirms that such privileges grant access to “hosted feature services, web maps, web scenes, tile layers” and other private portal contentA law enforcement source with direct knowledge of their agency’s Flock integration confirmed that layer sharing with Flock Safety’s ArcGIS organization occurs in practiceThe key appeared across 53 publicly accessible endpoints with no referrer restrictions, IP limitations, or access controlsMany of the photo’s I’ve used as examples are from publicly exposed ArcGIS datasets owned by Police Departments, that have relevant Flock Safety data in them.Taken together, these findings establish that the exposed credential provided a viable technical pathway to access shared law enforcement data. The precise contents of each private layer remain unverified, yet the circumstantial evidence is substantial.Foreign intelligence services would not need access to communications content if they could reliably observe movement at this scale. Historical location data revealing the presence, routines, and associations of politicians, federal agents, intelligence personnel, military leadership, or special operations units constitutes intelligence in its own right.Consider a scenario: If members of SEAL Team 6 or Delta Force disappear from roadways for several days, that absence is itself a signal. If, during the same timeframe, a primary French translator also vanishes from routine movement patterns, the signal sharpens. A coordinated absence across these roles would strongly suggest the initiation of a special operations mission inferred solely from movement data collected by a nationwide license plate reader network. A top secret clearance wouldn’t be needed for top secret information.China has previously compromised hotel infrastructure for years at a time, not to surveil ordinary guests, but to capture rare overlaps where officials from different countries stayed in the same location on the same night. (Source) If adversaries are willing to infiltrate hotel systems for fragments of movement data, the intelligence value of a nationwide, centralized surveillance map should be self-evident.Persistent, indiscriminate movement tracking enables coercion, blackmail, and influence operations that do not require access to communications content. Members of Congress, senior military leaders, diplomats, corporate executives and their spouses and children are all placed at heightened risk. With sufficient coverage and time, patterns of life emerge. Affairs, undisclosed meetings, sensitive relationships, and routine behaviors become visible once movement data is collected and correlated at scale.This is not a theoretical concern. The documented history of law enforcement misuse of license plate reader systems, including Flock’s own platforms, demonstrates that access to movement data is routinely weaponized for personal purposes by those entrusted with it.Braselton, Georgia (November 2025): Police Chief Michael Steffman was arrested and charged with stalking, harassment, and multiple counts of misusing automated license plate recognition systems after a months-long Georgia Bureau of Investigation probe revealed he used Flock cameras to track and harass multiple individuals. Steffman resigned hours before his arrest after serving the department for 20 years. Subsequent public records analysis by the grassroots coalition Get The Flock Out revealed that Steffman had searched Flock data from agencies in other states, including Capitola, California, demonstrating the cross-jurisdictional reach enabled by Flock’s network sharing capabilities. (Source)Sedgwick, Kansas (2023–2024): Police Chief Lee Nygaard used Flock Safety license plate readers to track his ex-girlfriend’s vehicle 164 times and her new boyfriend’s vehicle 64 times over a four-month period. He logged false justifications including “missing child,” “drug investigation,” and “suspicious activity” to conceal the personal nature of his searches. Nygaard also followed the couple in his patrol vehicle outside city limits. He resigned during the misconduct investigation. His police certification was revoked, though he faced no criminal charges. (Source)Orange City, Florida (2024–2025): Officer Jarmarus Brown was arrested and charged with stalking and unauthorized computer access after using Flock license plate readers to track his ex-girlfriend’s whereabouts for approximately seven months. An audit revealed he had repeatedly run tags for three specific vehicles. A fellow officer had warned Brown to “stop running her vehicle in that system because he could get in trouble” a warning Brown ignored. Brown also placed a GPS AirTag in the victim’s wallet without her knowledge. When confronted by investigators, Brown admitted the situation was “dumb as hell on my end.” He was served termination paperwork following his arrest. (Source)These cases share common patterns: trusted officials often in leadership positions weaponizing surveillance tools against women with no connection to criminal investigations. The systems provided few meaningful barriers to misuse, and detection typically occurred only after victims independently reported suspicious behavior.My research directly supports Senator Ron Wyden’s claims that “Flock cannot live up to its commitment to protect the privacy and security of Oregonians” (Letter to Flock) and his urging for the “Federal Trade Commission (FTC) investigate Flock Safety… and, where appropriate, hold the company responsible for its negligent cybersecurity practices” (Letter to FTC).After the City of Staunton canceled its Flock Safety contract, CEO Garrett Langley sent an unsolicited email to Staunton Police Department (source) stating:“I’m writing to you directly because I want there to be zero confusion about what’s happening. Flock has never been hacked. Ever.“That statement is technically correct only in the narrowest sense. The absence of a breach was not the result of internal security controls, audits, or monitoring but of responsible disclosure. I identified the vulnerability and reported it so it could be remediated.The absence of a hack does not imply the presence of security. Had this credential been found by anyone else, this may have been one of the largest data breaches and national security incidents of this decade.In the same communication, Flock asserted:“Flock is CJIS compliant”
“Flock adheres to the highest security standards, including NDAA, SOC 2 (Type II), SOC 3, ISO 27001, HECVAT, FERPA, and alignment with NIST and CAIQ.“As a cybersecurity professional who has conducted dozens of compliance assessments, these statements are familiar. Compliance frameworks are often mistaken for guarantees of security, when in reality they are scoped evaluations of specific controls, not comprehensive examinations of an organization’s risk posture. The scope of what is tested is defined by the company being assessed, which means compliance reflects what was reviewed, not everything that exists.I requested access to Flock’s audit reports; they were not provided. What I can say is this: a default, organization-wide API key embedded across 53 publicly reachable development and production-adjacent web assets would not survive even a basic review for exposed secrets or subdomains. Its persistence strongly suggests that this attack surface was either excluded from the assessment scope or insufficiently tested.When a default, organization-wide credential persists across 53 publicly reachable assets, the failure is not merely procedural, it is architectural. The exposed surface was not a peripheral feature or isolated test environment. It was development infrastructure configured with privileges that would have granted access to private ArcGIS items shared within Flock Safety’s organization.What You Can DoIf you’re a resident: File a public records request for your city’s Flock Safety contract and any internal audit logs. Attend the next city council meeting where surveillance procurement is discussed. The EFF maintains a Street-Level Surveillance resource for tracking these deployments.If you’re a journalist: The technical evidence presented here is a starting point. I’m available for follow-up. There are more threads to pull.If you’re in law enforcement: Ask your vendor hard questions. Request their penetration test results. Demand to know where your agency’s data lives and who else can access it. Your officers’ safety depends on infrastructure that adversaries cannot trivially compromise.If you’re a policymaker: Senator Wyden’s letters to Flock and the FTC are public record. Support an investigation. Mandate independent security audits for any vendor handling law enforcement location data.Although the API key has now been rotated, the lesson remains. If a single cybersecurity researcher in his early twenties could gain direct technical access to an exposure of this magnitude, a well-resourced foreign adversary operating with intent could observe far more.Flock Safety did not merely leak an API key. They exposed the operational heartbeat of the nation, and they did so repeatedly, across 53 separate instances.That reality should concern everyone.Information is leverage and we move the fulcrum. We can help you:Shape the identity you want the world to seeLeave it to us to secure
The world’s leading All-Source Intelligence Firm for Cybersecurity and Privacy
...
Read the original on nexanet.ai »
To use the Mastodon web application, please enable JavaScript. Alternatively, try one of the native apps for Mastodon for your platform.
...
Read the original on mathstodon.xyz »
The alpha stage is an early, unstable version meant primarily for testing.
* Demonstrated basic website navigation functionality, supporting essentials like the homepage, tabs, and simple searches
* Advanced tab management is now complete, with the exception of the Tab Switcher UI, which is not supported yet.
* Tabs now function independently and can be opened in parallel
* Session persistence is implemented: previously opened tabs, along with their history, will reopen when the application is launched again.
* Tabs currently appear in the main window and are supported in the left sidebar as well.
* Bookmarks system a simple bookmark feature is now available.
* Users can save pages, organize them into folders
* Users can view them in the bookmarks dialog, sidebar, and bookmarks bar.
* Password management framework establishes the core infrastructure needed for secure password handling and future improvements in this area.
...
Read the original on help.kagi.com »
The New York Times has frame-by-frame analysis, from three angles, of the murder of 37-year-old Renee Good in Minneapolis yesterday. She was shot to death by mask-wearing ICE agent Jonathan Ross, with what was obviously no justification. The shooting is, justifiably, national news. I’m sure you’ve read about it. But this Times analysis coolly and calmly shows just how outrageous it was, and how preposterous the claims from President Trump and Secretary of Hats Kristi Noem are ostensibly attempting to defend it — both as an act of self-defense by the cowardly ICE agent and, even more absurdly, as an act of “domestic terrorism” by Good, who was attempting to do nothing more than drive away from the scene.
George Orwell, in 1984: “The Party told you to reject the evidence of your eyes and ears. It was their final, most essential command.” Let’s stop pussyfooting around what happened here. This ICE agent murdered Renee Good, in broad daylight, in front of many witnesses and multiple cameras. Trust the evidence of your eyes and ears.
But I want to add another note. The main footage here comes from bystander Caitlin Callenson. Here’s her full 4m:25s footage, uncensored, hosted — with credit, and I hope, permission — on the YouTube account of Minnesota Reformer. Be warned that it shows Good being shot to death (albeit sans gore), and contains many loud profanities. This is very good and clear footage. It is difficult viewing but you should watch it. Callenson was very close to Good’s vehicle. I’d say about 30 feet or so. You can see why she thought to start filming before the murderous agent drew his gun and fired. The scene was already chaotic. But then, after the murderous agent fired three shots — just 30 or 40 feet in front of Callenson — Callenson had the courage and conviction to stay with the scene and keep filming. Not to run away, but instead to follow the scene. To keep filming. To continue documenting with as best clarity as she could, what was unfolding.
I’d like to think I’d have done the same. I’m not sure at all that I would have. I definitely might have been using my iPhone to shoot video of the incident up until the shots were fired. But when that happened, my mind would immediately have turned to “These agents are scared and angry and out of control, and that one just went psycho and fired his gun unprovoked. That guy is just as likely to shoot more people as he was the woman he just shot. His angry, scared, obviously undertrained colleagues might join in. And the most likely people they’ll shoot next are people pointing cameras at them.” I do not know what I would have done in that moment. I hope I never find out. But I know with certainty what I would immediately think, which is that if I choose to continue shooting video of the incident, there is a very good chance one of them will shoot or brutalize me next. It would make more sense to shoot someone filming the scene than it did to shoot Renee Good in the first place. Good’s killing was utterly senseless. Shooting a witness with a running camera and then destroying their phone to eliminate the evidence (and a witness) would make some sense. Sick sense, but sense.
But in that moment of pandemonium and obvious danger to herself, Callenson didn’t merely continue filming. She didn’t merely stand her ground. She proceeded into the scene to get closer to Good’s vehicle after it crashed into a parked car, Mr. Brown-style. She pointed her camera directly at the only-partially-masked face of the murderous agent as he walked away from Good’s crashed vehicle, then got into an unmarked Chevy Tahoe and just fled from the scene like the obvious coward he is. I presume the murderous agent will soon be identified, and Callenson’s clear steady-handed footage may be the reason why. [Update: While I was finishing this post, the Minnesota Star Tribune identified and named him — Jonathan Ross — and indeed, it was Callenson’s footage that made his identification possible.] And, to top it off, all the while — starting before the shooting — Callenson was screaming “Shame!” in the faces of these agents, and calling them out on their abhorrent indefensible actions. To each of their directives to her, she responds, with the definition of righteous anger, “You shot someone in the fucking face!” (Emily Heller, Renee Good’s neighbor, showed similar courage, telling an ICE agent who refused to allow a citizen physician to check on Good (who laid dying or dead inside her car), as she filmed the scene, “How can I relax, you just killed my fucking neighbor! You shot her in the fucking face! You killed my fucking neighbor! How do you show up to work every day?”)
Callenson’s courage in the face of obvious danger is just remarkable. My god. She rose to the moment in a crucible of chaos, insanity, and murderous violence. We all need to think about what she did, to really imagine ourselves in the same moment — the danger she stood up to, and the principles she stood up for — if we hope to do the same if a similar moment comes to us.
And, to top it off, she had the presence of mind to shoot her historic footage in widescreen.
...
Read the original on daringfireball.net »
On every WebAssembly discussion, there is inevitably one comment (often near the top) asking what happened.
It seems to have been advertised as a world-changing advancement. Was it just oversold? Was it another JVM applet scenario, doomed to fail?
I’d like to tackle this in a weirdly roundabout way because I think these sorts of questions make a few misplaced assumptions that are critical to clarify.
Of course, WebAssembly does see real-world usage. Let’s list some examples!
For many of these, WebAssembly is critical to either their entire product or a major feature.
But I think this alone is not very convincing. We don’t yet see major websites entirely built with webassembly-based frameworks. We’re not building our applications directly to WebAssembly for maximum portability. But why not?
To answer this, we need a good mental model for what WebAssembly is. This will help us qualify where it is most impactful and the limitations we’re up against.
This makes questions like “how fast is WebAssembly” a bit hard to answer. You don’t ask how fast algebraic notation is—it’s not a very sensible question.
Taken in the context of something like JavaScript, the language is only as fast as the engine running it. JavaScript the language has no speed, but you can benchmark JS engines like V8, SpiderMonkey, and JavaScriptCore. You can benchmark the IO libraries of JS runtimes like Bun, Deno, and Node.
What people actually mean is “how useful are the constructs of this language to efficient mappings of modern hardware” and “what is the current landscape of systems taking advantage of these constructs”.
Through clever-enough engineering, you can make any system sufficiently fast with some trade-offs. If compiling your code directly to C doesn’t bother you, getting “near native” speeds is possible in both JavaScript and WebAssembly.
That’s right, you can compile WebAssembly! You can also choose to interpret it directly—that’ll be up to your runtime, just like every other system.
So let’s ask the actual question of WebAssembly: how useful are the constructs of this language to efficient mappings of modern hardware? Turns out, pretty useful!
WebAssembly is a pretty close approximation of an assembly language. Not too close, mind you. It’s higher level than that. But it’s close enough to cleanly compile to most assembly languages without a significant speed trade-off.
And yes, you can write WebAssembly by hand! I made a rustlings-esque course called watlings where you can hand-write WAT to solve some basic exercises.
WAT is a very close approximation to Wasm. It is almost 1:1 in that you can compile WAT to Wasm and then back to WAT with barely any loss in information (you may lose variable names and some metadata). It looks like this:
Try reading the code. It will feel both familiar and foreign.
We have functions and S-expressions. We have imports and exports. But we also have instructions like i32.add and implicit stack returns.
Wasm is a bytecode perhaps best compared to JVMIS (i.e. JVM bytecode). They have similar goals and constraints, but different landscapes and guarantees.
Compared to JVM bytecode, Wasm has a significantly smaller API and stronger safety guarantees. It has fewer opinions on your memory management strategy and more limitations on what your program can do without permission from its host environment.
It can crunch numbers, but must be explicitly provided its memory and all imports. In this way, it is much different from an actual assembly language (or, a more widely used one).
We’ll wrap back around to this later.
You can compile many languages to Wasm.
Notable among them are Rust, C, Zig, Go, Kotlin, Java, and C#. Commonly interpreted languages have even had their runtimes compiled to WebAssembly, such as Python, PHP, and Ruby. There are also many languages that solely compile to WebAssembly, such as AssemblyScript, Grain, and MoonBit.
For many of these, it is important not to require a garbage-collector. For others, it would be helpful to include one. Wasm allows for both (with the GC option being much more recent).
Your browser includes a Wasm “engine”, making this doubly an attractive compilation target. This means without much setup, your phone and laptop can run Wasm programs already.
Like how JVM can have many implementations of its runner, there are many implementations that run independently of your browser such as Wasmtime, WasmEdge, and Wasmer.
These languages can output a single artifact without being too specific to your computer’s hardware. You only need a Wasm runner to execute it (note more JVM analogies).
Right now, Wasm is looking really similar to JVM. The main differences seem to be around memory management strategies and how many platforms support it.
The security story is what really starts to drive in the wedge.
WebAssembly maintains a minimal attack surface by treating all external interactions as explicit, host-defined imports. We went over this earlier. Its “deny-by-default” architecture, small instruction set, hidden control-flow stack (i.e. no raw pointers), and linear memory combine to create a very strong security story.
It is such that you can ensure process-like isolation within a single process. Cloudflare takes advantage of this aspect within V8 to run untrusted code very efficiently using V8 isolates. This means significant efficiency gains without significant security trade-offs.
Wasm programs can start 100x faster if you can avoid spinning up a separate process. Fermyon, a company in the Wasm hosting space, advertises sub-millisecond spinup times.
In these cases, the performance is a direct result of what the security guarantees enable.
In other cases, security can unlock feature support.
Flash is a multimedia platform that was primarily used for animations and games up until it was dropped from all major browsers in January of 2021 (primarily) due to security concerns. Ruffle has revived Flash experiences on sites like Newgrounds by acting as an interpreter and VM for ActionScript.
Cloudflare allows running Python code with similar security guarantees to its JS code by using Pyodide, which is a Wasm build of CPython.
Figma runs untrusted user plugins in your browser by running them in a QuickJS engine that is compiled to Wasm.
Elsewhere, the security allows for extreme embeddability.
We’ve gone over the number of ways you can run Wasm programs. A Wasm runner can be pretty light. Instead of forcing library authors into a specific language (usually Lua or JavaScript), supporting Wasm itself opens the door to a much wider set of choices.
Tools like Zellij, Envoy, and Lapce support Wasm for their plugin ecosystem.
In environments where a JavaScript engine is already being used, this means access to programs you would not have been able to run otherwise.
This includes image processing, ocr, physics engines, rendering engines, media toolkits, databases, and parsers, among many others.
In a majority of these cases, the use of Wasm will be transparent to you. A library you installed will just be using it somewhere in its dependency tree.
Godot and Figma have codebases written in C++, but are often browser-ready by compiling to (or in combination with) WebAssembly.
It seems the most common use of Wasm is bridging the language gap. Certain ecosystems seem to have suites of tools more common to them. Squoosh would be a much more limited application if it could only choose image compression libraries from NPM.
Browsers run WebAssembly with roughly the same pipeline that runs JavaScript. This seemingly puts a hard limit on the performance of Wasm applications, but they will often be more or less performant due to their architecture or domain.
Using languages with richer type systems and more sophisticated optimizing compilers can produce more efficient programs. The JIT model of engines like V8 might prevent optimizations if the cost of optimizing exceeds the gains from running the optimized code. You might avoid megamorphic functions more easily by avoiding JavaScript.
However, there is a cost to crossing the host-program boundary, especially if cloning memory. Zaplib’s post-mortem is an interesting read here. Incrementally moving a codebase to Wasm can incur significant costs in boundary crossing, eliminating any benefit in the short term.
A small API surface also means binary bloat as system APIs are more often re-created than imported. There are standards like WASI which aim to help here. Still, there is no native string type (yet).
Zig seems to produce the smallest Wasm binaries among mainstream languages.
Practical performance of Wasm in native contexts (i.e. outside of a JS engine) seems to suffer for a variety of reasons. Threading and IO of any sort incurs some cost. Memory usage is larger. Cold start is slower.
Still, the performance trade-offs might not be significant enough to matter. For most uses, I’d wager it’s “fast enough”. If you’re in a performance-sensitive context, the benefits of Wasm are likely not as relevant.
The Wasm IO YouTube channel has lots of talks worth watching.
In fact, standards and language development in Wasm has stirred significant controversy internally. There is a lot of desire for advancement, but standardization means decisions are hard to reverse. For many, things are moving too quickly and in the wrong direction.
There is the “more official” W3C working group and then the “less official” Bytecode Alliance which works much more quickly and is centered around tooling and language development outside of Wasm directly (e.g. on WIT and the WebAssembly Component Model).
Wasm feature proposals are being quickly advanced and adopted by a wide suite of tools. This is remarkable progress for standardization, but is also scary to watch if you fear large missteps.
So why do people think nothing has happened?
I figure most are under the impression that the advancement of this technology would have had a more visible impact on their work. That they would intentionally reach for and use Wasm tools.
Many seem to think there is a path to Wasm replacing JavaScript within the browser—that they might not need to include a .js file at all. This is very unlikely.
However, you can use frameworks like Blazor and Leptos without being aware or involved in the produced JS artifacts.
Mostly, Wasm tools have been adopted and used by library authors, not application developers. The internals are opaque. This is fine, probably.
Separately, I think the community is not helped by the philosophy of purposely obfuscating teaching material around Wasm. This is a fight I lost a few times.
For now, maybe check out watlings. I’ll expand it at some point, surely.
...
Read the original on emnudge.dev »
Regular physical activity may ease symptoms of depression about as effectively as psychological therapy, according to an updated Cochrane review. When researchers compared exercise with antidepressant medication, they found similar benefits, although the certainty of that evidence was lower.
Regular physical activity may ease symptoms of depression about as effectively as psychological therapy, according to an updated Cochrane review. When researchers compared exercise with antidepressant medication, they found similar benefits, although the certainty of that evidence was lower.
Depression remains a major global health challenge, affecting more than 280 million people worldwide and contributing significantly to disability. Exercise stands out as a low cost and widely accessible option that also improves physical health, making it appealing to both patients and healthcare professionals.
The analysis was led by researchers at the University of Lancashire and drew on data from 73 randomized controlled trials involving nearly 5,000 adults diagnosed with depression. These studies examined how exercise compared with no treatment or control conditions, as well as with psychological therapies and antidepressant drugs.
Overall, the findings showed that exercise led to moderate reductions in depressive symptoms compared with no treatment. When measured against psychological therapy, exercise produced similar improvements, based on moderate certainty evidence from ten trials. Comparisons with antidepressant medication also suggested comparable effects, but the supporting evidence was limited and considered low certainty. Few studies tracked participants after treatment ended, leaving the long-term impact unclear.
Reported side effects were uncommon. People in exercise programs occasionally experienced muscle or joint injuries, while those taking antidepressants reported typical medication-related issues such as fatigue and gastrointestinal problems.
“Our findings suggest that exercise appears to be a safe and accessible option for helping to manage symptoms of depression,” said Professor Andrew Clegg, lead author of the review. “This suggests that exercise works well for some people, but not for everyone, and finding approaches that individuals are willing and able to maintain is important.”
What Kind of Exercise Works Best
The review found that light to moderate intensity activity may be more helpful than vigorous workouts. Greater improvements in depressive symptoms were linked to completing between 13 and 36 exercise sessions.
No single form of exercise clearly outperformed others. However, programs that combined different types of activity and resistance training appeared more effective than aerobic exercise alone. Some activities, including yoga, qigong and stretching, were not evaluated in this analysis and remain areas for future study. As with other findings, long-term benefits are still uncertain due to limited follow-up.
This update added 35 new trials to earlier versions of the review published in 2008 and 2013. Even with the expanded evidence base, the main conclusions changed little. Many of the included studies were small, often involving fewer than 100 participants, which makes it harder to draw firm conclusions.
“Although we’ve added more trials in this update, the findings are similar,” said Professor Clegg. “Exercise can help people with depression, but if we want to find which types work best, for who and whether the benefits last over time, we still need larger, high-quality studies. One large, well-conducted trial is much better than numerous poor quality small trials with limited numbers of participants in each.”
...
Read the original on www.sciencedaily.com »
Please log in (or register) to post as a new dweet (copy-paste code somewhere safe to save it meanwhile).
...
Read the original on www.dwitter.net »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.