10 interesting stories served every morning and every evening.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in
to your account
...
Read the original on github.com »
An official website of the
Better health begins on your plate—not in your medicine cabinet.
The new Dietary Guidelines for Americans defines real food as whole, nutrient-dense, and naturally occurring, placing them back at the center of our diets. The State of Our Health50% of Americans have 75% of adults report having at least one 90% of U.S. healthcare spending goes to treating —much of which is linked to diet and lifestyle We are ending the war on protein. Every meal must prioritize high-quality, nutrient-dense protein from both animal and plant sources, paired with healthy fats from whole foods such as eggs, seafood, meats, full-fat dairy, nuts, seeds, olives, and avocados.Protein target: ~0.54–0.73 grams per pound of body weight per dayVegetables and fruits are essential to real food nutrition. Eat a wide variety of whole, colorful, nutrient-dense vegetables and fruits in their original form, prioritizing freshness and minimal processing.Whole grains are encouraged. Refined carbohydrates are not. Prioritize fiber-rich whole grains and significantly reduce the consumption of highly processed, refined carbohydrates that displace real nourishment.What is the New Pyramid?The New Pyramid is a simple guide designed to help Americans eat real, whole foods more consistently. It prioritizes nutrient-dense foods and reduces reliance on highly processed products, using modern nutrition science to support everyday health.What does “Eat Real Food” mean?Eating real food means choosing foods that are whole or minimally processed and recognizable as food. These foods are prepared with few ingredients and without added sugars, industrial oils, artificial flavors, or preservatives.Why does the New Pyramid emphasize protein and vegetables?Protein and vegetables form the foundation of real food meals. Together, they support muscle health, metabolic function, gut health, and stable energy while naturally crowding out highly processed foods.Yes. Healthy fats are a natural part of real foods such as meat, seafood, dairy, nuts, olives, and avocados. These fats support brain health, hormone function, and nutrient absorption when consumed in their natural forms.How does the New Pyramid address added sugars?Added sugars are not part of eating real foods and are not recommended. The New Pyramid encourages avoiding added sugars entirely, especially for children, while allowing naturally occurring sugars found in whole fruits and plain dairy.Where do grains fit in the New Pyramid?Grains can be part of a real food diet when eaten in whole or traditionally prepared forms. Foods like oats, rice, and true sourdough are preferred. Refined and packaged grain products should be limited.Hydration matters. Choose water or unsweetened beverages to accompany meals and snacks.Is the New Pyramid a strict diet?No. The New Pyramid is a flexible framework meant to guide better choices, not dictate exact meals. It supports cultural traditions, personal preferences, and different lifestyles while reinforcing one core goal: eat real foods most of the time.Explore the research, recommendations, and implementation guidance that shape the Dietary Guidelines, including the science, the policy guidance, and the everyday serving framework.
...
Read the original on realfood.gov »
Patchouli is an open-source electro-magnetic drawing tablet hardware implementation, including a coil array, an RF front end built using commercially available parts, and digital signal processing algorithms. The design is compatible with most commercial pens from different vendors, offering an ultra-low-latency pen input experience for your customized hardware projects.
In addition, this project aims to provide a comprehensive documentation of the EMR technology, including the mechanism, circuit implementation, signal processing algorithms, and the pen protocol of different product lines from different vendors.
* March 2024, the first small-scale hardware prototype was successfully tested.
* January 2025, the documentation page was hosted on Read the Docs.
* Reaching out to the maintainers: prj.patchouli@gmail.com
This project is sponsored by the NLnet Foundation NGI Zero Core Fund. Learn more about it here: Project Patchouli
Project Patchouli Documentation by Yukidama and other project members is licensed under Creative Commons Attribution 4.0 International
All images and other resource files in this project, unless otherwise specified, are created by the project team and are licensed under the same CC BY 4.0 license.
The hardware design is released under the CERN Open Source Hardware License strongly-reciprocal variant, CERN-OHL-S. A copy of the license is provided in the source repository. Additionally, a user guide of the license is provided on ohwr.org.
All program code, unless otherwise specified, is licensed under the GPLv3 license.
...
Read the original on patchouli.readthedocs.io »
Updates to the Tailscale client and service.
...
Read the original on tailscale.com »
An Immigration and Customs Enforcement agent shot and killed a woman Wednesday during an immigration-related operation in Minneapolis in which she did not appear to be the target, local and federal officials said.
The shooting victim has been named as Renee Nicole Good, 37, a mother and U. S. citizen.
Dueling narratives emerged over what led to the shooting. Department of Homeland Security spokesperson Tricia McLaughlin claimed the woman “weaponized her vehicle, attempting to run over our law enforcement officers in an attempt to kill them.”
Minneapolis Mayor Jacob Frey pushed back on DHS’ narrative at a news conference Wednesday afternoon, saying, “They are already trying to spin this as an action of self-defense,” referring to ICE. “Having seen the video of myself, I want to tell everybody directly that is b–-s–-.”
Witnesses described seeing the woman in the vehicle trying to flee officers when she was shot, disputing the notion that she was trying to run officers over. Police described her as a “middle-aged white woman” who did not appear to be the target of any law enforcement investigation or activity.
Immigration enforcement officers were conducting targeted operations in Minneapolis when the shooting happened, but it’s unclear what operation ICE was conducting in that particular neighborhood.
Several video clips of the incident emerged on social media.
In one video, a gray pickup truck is seen pulling up to a burgundy SUV stopped perpendicular to the truck as someone shouts “get the f–- out of our neighborhood.” Agents get out of the truck, and one walks up to the SUV and yanks on the driver’s door handle, ordering the driver to get out. The SUV reverses.
Another agent is standing near the front of the SUV as it pulls forward. The agent appears to draw his firearm, and as the SUV drives forward in his direction, he moves backward, shooting into the SUV as it drives off, the video shows.
In another video showing a different angle, the agent appears to be knocked back as the SUV drives forward before it crashes into a parked car and hits a light pole. President Donald Trump attached the video clip showing that angle to a post on Truth Social, saying that the woman driving was “very disorderly, obstructing and resisting” and that it was hard to believe the agent survived the incident.
Homeland Security Secretary Kristi Noem said at a news conference Wednesday evening that the ICE agent was “hit by the vehicle” driven by the woman who was shot. He went to the hospital and was released, she said.
Noem said the officer, whom officials have not yet identified, had been attacked before while on the job.
“The very same officer who was attacked today had previously been dragged by an anti-ICE rioter who had rammed him with a car and dragged him back in June. He sustained injuries at that time, as well,” she said.
Noem said at a news conference earlier in the day that the agents’ vehicles got stuck in the snow and that they were trying to push them out when the woman “attacked them.”
“It was an act of domestic terrorism,” she said, without providing further evidence.
At the mayor’s news conference, Minneapolis Police Chief Brian O’Hara expressed concern about the tactics used by ICE agents.
“I do not know the exact circumstances of the shooting, but I would tell you, in any professional law enforcement agency in the country … it’s obviously very concerning whenever there’s a shooting into a vehicle of someone who’s not armed,” he said, saying that at times it could be justified but that “most law enforcement agencies in the country have trained very intensely to try and minimize the risk” of using deadly force.
Aidan Perzana, 31, said that he witnessed the incident and that it didn’t look like the woman was trying to run over an agent.
“I heard that Noem is trying to say they were trying to run down an officer. There was plenty of space between the officers at that point for the vehicle to make it through,” he told NBC News, adding that it looked as though the driver was trying to flee.
Emily Heller, 39, wasn’t even dressed when she heard whistles alerting the neighborhood that ICE agents were in the area Wednesday morning. When she walked out to her porch, she said, she saw six or seven ICE vehicles and a person who had parked perpendicular to traffic.
Heller said she saw agents exit their cars and tell the driver to leave, to “get out of here.”
“And then they went up to her car and started trying to open her door, and that’s when I’m sure she got spooked and tried to flee,” Heller said. “So she reversed a little bit and then angled her wheels so she could drive away. And as she was trying to move forward, one of the ICE agents stepped in front of her vehicle and reached across the hood and fired his weapon about three or four times and shot her in the face.”
Aidan Perzana’s wife, Grace Perzana, 32, said that the family has lived in the neighborhood 2½ years and that “we love it.”
“We are really happy here. We have a giant shark statue in our front yard, and our neighbor has a giant T-Rex statue,” she said. “There is a lot of community art, a lot of people having barbecues with music in their backyards.”
Residents and locals gathered in the street after the shooting, chanting and throwing snowballs in the direction of federal agents, NBC affiliate KARE reported. Law enforcement officers deployed pepper spray and tear gas.
Trump has unleashed immigration agents in cities across America, who have been employing increasingly aggressive tactics. The push has ramped up tensions with local officials in some cities and communities that are increasingly protesting the efforts.
In September, an ICE agent fatally shot a man during a traffic stop in the Chicago area. His family called for justice, and local police said the FBI had been investigating the death.
Since they arrived in Minneapolis in early December, ICE officers and agents have arrested roughly 1,400 people, McLaughlin has said. That is a significant increase from the roughly 300 who had been arrested by Dec. 12.
DHS this week sent hundreds more officers and agents to bolster immigration enforcement in Minneapolis, posting on social media that it is waging “the largest DHS operation ever” in Minnesota.
The immigration enforcement operation will add up to 2,100 officers, according to two senior DHS officials. The administration began swelling the numbers Sunday and planned to continue adding forces Wednesday, the officials said. That total encompasses 1,500 enforcement and removal officers and 600 Homeland Security Investigations agents.
At a news conference Wednesday afternoon following the shooting, Frey, the mayor, told ICE agents to “get the f–- out of Minneapolis.”
The rush of more enforcement follows the posting of a video by a conservative content creator the day after Christmas that alleged that Somali-run day care centers in Minneapolis were defrauding American taxpayers by taking federal grant money and not providing any services to children.
The FBI surged investigators in the city to look into the allegations soon after the video was posted and HSI has been knocking on Somali businesses’ doors since last week. The state of Minnesota concluded from its on-site checks of 10 Somali day care centers targeted in the video that they were operating normally, with children at every site except one, which wasn’t yet open to investigators when they arrived to investigate.
Grace Perzana said she didn’t believe there were many people of Somali descent on the street where Wednesday’s shooting happened, but she said she does have many “Latinx” neighbors.
...
Read the original on www.nbcnews.com »
U. S. Immigration and Customs Enforcement (ICE) has a new budget under the current administration, and they are going on a surveillance tech shopping spree. Standing at $28.7 billion dollars for the year 2025 (nearly triple their 2024 budget) and at least another $56.25 billion over the next three years, ICE’s budget would be the envy of many national militaries around the world. Indeed, this budget would put ICE as the 14th most well-funded military in the world, right between Ukraine and Israel.
There are many different agencies under U. S. Department of Homeland Security (DHS) that deal with immigration, as well as non-immigration related agencies such as Cybersecurity and Infrastructure Security Agency (CISA) and Federal Emergency Management Agency (FEMA). ICE is specifically the enforcement arm of the U.S. immigration apparatus. Their stated mission is to “[p]rotect America through criminal investigations and enforcing immigration laws to preserve national security and public safety.”
Of course, ICE doesn’t just end up targeting, surveilling, harassing, assaulting, detaining, and torturing people who are undocumented immigrants. They have targeted people on work permits, asylum seekers, permanent residents (people holding “green cards”), naturalized citizens, and even citizens by birth.
While the NSA and FBI might be the first agencies that come to mind when thinking about surveillance in the U. S., ICE should not be discounted. ICE has always engaged in surveillance and intelligence-gathering as part of their mission. A 2022 report by Georgetown Law’s Center for Privacy and Technology found the following:
* ICE had scanned the driver’s license photos of 1 in 3 adults.
* ICE had access to the driver’s license data of 3 in 4 adults.
* ICE was tracking the movements of drivers in cities home to 3 in 4 adults.
* ICE could locate 3 in 4 adults through their utility records.
* ICE built its surveillance dragnet by tapping data from private companies and state and local bureaucracies.
* ICE spent approximately $2.8 billion between 2008 and 2021 on new surveillance, data collection and data-sharing programs.
With a budget for 2025 that is 10 times the size of the agency’s total surveillance spending over the last 13 years, ICE is going on a shopping spree, creating one of the largest, most comprehensive domestic surveillance machines in history.
The entire surveillance industry has been allowed to grow and flourish under both Democratic and Republican regimes. For example, President Obama dramatically expanded ICE from its more limited origins, while at the same time narrowing its focus to undocumented people accused of crimes. Under the first and second Trump administrations, ICE ramped up its operations significantly, increasing raids in major cities far from the southern border and casting a much wider net on potential targets. ICE has most recently expanded its partnerships with sheriffs across the U. S., and deported more than 1.5 million people cumulatively under the Trump administrations (600,000 of those were just during the first year of Trump’s second term according to DHS statistics), not including the 1.6 million people DHS claims have “self-deported.” More horrifying is that in just the last year of the current administration, 4,250 people detained by ICE have gone missing, and 31 have died in custody or while being detained. In contrast, 24 people died in ICE custody during the entirety of the Biden administration.
ICE also has openly stated that they plan to spy on the American public, looking for any signs of left-wing dissent against their domestic military-like presence. Acting ICE Director Todd Lyons said in a recent interview that his agency “was dedicated to the mission of going after” Antifa and left-wing gun clubs.
On a long enough timeline, any surveillance tool you build will eventually be used by people you don’t like for reasons that you disagree with.
On a long enough timeline, any surveillance tool you build will eventually be used by people you don’t like for reasons that you disagree with. A surveillance-industrial complex and a democratic society are fundamentally incompatible, regardless of your political party.
EFF recently published a guide to using government databases to dig up homeland security spending and compiled our own dataset of companies selling tech to DHS components. In 2025, ICE entered new contracts with several private companies for location surveillance, social media surveillance, face surveillance, spyware, and phone surveillance. Let’s dig into each.
One common surveillance tactic of immigration officials is to get physical access to a person’s phone, either while the person is detained at a border crossing, or while they are under arrest. ICE renewed an $11 million contract with a company called Cellebrite, which helps ICE unlock phones and then can take a complete image of all the data on the phone, including apps, location history, photos, notes, call records, text messages, and even Signal and WhatsApp messages. ICE also signed a $3 million contract with Cellebrite’s main competitor Magnet Forensics, makers of the Graykey device for unlocking phones. DHS has had contracts with Cellebrite since 2008, but the number of phones they search has risen dramatically each year, reaching a new high of 14,899 devices searched by ICE’s sister agency U. S. Customs and Border Protection (CBP) between April and June of 2025.
If ICE can’t get physical access to your phone, that won’t stop them from trying to gain access to your data. They have also resumed a $2 million contract with the spyware manufacturer, Paragon. Paragon makes the Graphite spyware, which made headlines in 2025 for being found on the phones of several dozen members of Italian civil society. Graphite is able to harvest messages from multiple different encrypted chat apps such as Signal and WhatsApp without the user ever knowing.
Our concern with ICE buying this software is the likelihood that it will be used against undocumented people and immigrants who are here legally, as well as U. S. citizens who have spoken up against ICE or who work with immigrant communities. Malware such as Graphite can be used to read encrypted messages as they are sent, other forms of spyware can also download files, photos, location history, record phone calls, and even discretely turn on your microphone to record you.
The most effective way to protect yourself from smartphone surveillance would be to not have a phone. But that’s not realistic advice in modern society. Fortunately, for most people there are other ways you can make it harder for ICE to spy on your digital life.
The first and easiest step is to keep your phone up to date. Installing security updates makes it harder to use malware against you and makes it less likely for Cellebrite to break into your phone. Likewise, both iPhone (Lockdown Mode) and Android (Advanced Protection) offer special modes that lock your phone down and can help protect against some malware.
The first and easiest step is to keep your phone up to date.
Having your phone’s software up to date and locked with a strong alphanumeric password will offer some protection against Cellebrite, depending on your model of phone. However, the strongest protection is simply to keep your phone turned off, which puts it in “before first unlock” mode and has been typically harder for law enforcement to bypass. This is good to do if you are at a protest and expect to be arrested, if you are crossing a border, or if you are expecting to encounter ICE. Keeping your phone on airplane mode should be enough to protect against cell-site simulators, but turning your phone off will offer extra protection against cell-site simulators and Cellebrite devices. If you aren’t able to turn your phone off, it’s a good idea to at least turn off face/fingerprint unlock to make it harder for police to force you to unlock your phone. While EFF continues to fight to strengthen our legal protections against compelling people to decrypt their devices, there is currently less protection against compelled face and fingerprint unlocking than there is against compelled password disclosure.
ICE has also spent $5 million to acquire at least two location and social media surveillance tools: Webloc and Tangles, from a company called Pen Link, an established player in the open source intelligence space. Webloc gathers the locations of millions of phones by gathering data from mobile data brokers and linking it together with other information about users. Tangles is a social media surveillance tool which combines web scraping with access to social media application programming interfaces. These tools are able to build a dossier on anyone who has a public social media account. Tangles is able to link together a posting history, posts, and comments containing keywords, location history, tags, social graph, and photos with those of their friends and family. Penlink then sells this information to law enforcement, allowing law enforcement to avoid the need for a warrant. This means ICE can look up historic and current locations of many people all across the U. S. without ever having to get a warrant.
These tools are able to build a dossier on anyone who has a public social media account.
ICE also has established contracts with other social media scanning and AI analysis companies, such as a $4.2 million contract with a company called Fivecast for the social media surveillance and AI analysis tool ONYX. According to Fivecast, ONYX can conduct “automated, continuous and targeted collection of multimedia data” from all major “news streams, search engines, social media, marketplaces, the dark web, etc.” ONYX can build what it calls “digital footprints” from biographical data and curated datasets spanning numerous platforms, and “track shifts in sentiment and emotion” and identify the level of risk associated with an individual.
Another contract is with ShadowDragon for their product Social Net, which is able to monitor publicly available data from over 200 websites. In an acquisition document from 2022, ICE confirmed that ShadowDragon allowed the agency to search “100+ social networking sites,” noting that “[p]ersistent access to Facebook and Twitter provided by ShadowDragon SocialNet is of the utmost importance as they are the most prominent social media platforms.”
ICE has also indicated that they intend to spend between 20 and 50 million dollars on building and staffing a 24/7 social media monitoring office with at least 30 full time agents to comb every major social media website for leads that could generate enforcement raids.
For U. S. citizens, making your account private on social media is a good place to start. You might also consider having accounts under a pseudonym, or deleting your social media accounts altogether. For more information, check out our guide to protecting yourself on social media. Unfortunately, people immigrating to the U.S. might be subject to greater scrutiny, including mandatory social media checks, and should consult with an immigration attorney before taking any action. For people traveling to the U.S., new rules will soon likely require them to reveal five years of social media history and 10 years of past email addresses to immigration officials.
But it’s not just your digital habits ICE wants to surveil; they also want to spy on you in the physical world. ICE has contracts with multiple automated license plate reader (ALPR) companies and is able to follow the driving habits of a large percentage of Americans. ICE uses this data to track down specific people anywhere in the country. ICE has a $6 million contract through a Thomson Reuters subsidiary to access ALPR data from Motorola Solutions. ICE has also persuaded local law enforcement officers to run searches on their behalf through Flock Safety’s massive network of ALPR data. CBP, including Border Patrol, also operates a network of covert ALPR systems in many areas.
ICE has also invested in biometric surveillance tools, such as face recognition software called Mobile Fortify to scan the faces of people they stop to determine if they are here legally. Mobile Fortify checks the pictures it takes against a database of 200 million photos for a match (the source of the photos is unknown). Additionally, ICE has a $10 million contract with Clearview AI for face recognition. ICE has also contracted with iris scanning company BI2 technologies for even more invasive biometric surveillance. ICE agents have also been spotted wearing Meta’s Ray-Ban video recording sunglasses.
ICE has acquired trucks equipped with cell-site simulators (AKA Stingrays) from a company called TechOps Specialty Vehicles (likely the cell-site simulators were manufactured by another company). This is not the first time ICE has bought this technology. According to documents obtained by the American Civil Liberties Union, ICE deployed cell-site simulators at least 466 times between 2017 and 2019, and ICE more than 1,885 times between 2013 and 2017, according to documents obtained by BuzzFeed News. Cell-site simulators can be used to track down a specific person in real time, with more granularity than a phone company or tools like Webloc can provide, though Webloc has the distinct advantage of being used without a warrant and not requiring agents to be in the vicinity of the person being tracked.
Taking public transit or bicycling is a great way to keep yourself off ALPR databases, but an even better way is to go to your local city council meetings and demand the city cancels contracts with ALPR companies, like people have done in Flagstaff, Arizona; Eugene, Oregon; and Denver, Colorado, among others.
If you are at a protest, putting your phone on airplane mode could help protect you from cell-site simulators and from apps on your phone disclosing your location, but might leave you vulnerable to advanced targeted attacks. For more advanced protection, turning your phone completely off protects against all radio based attacks, and also makes it harder for tools like Cellebrite to break into your phone as discussed above. But each individual will need to weigh their need for security from advanced radio based attacks against their need to document potential abuses through photo or video. For more information about protecting yourself at a protest, head over to SSD.
There is nothing you can do to change your face, which is why we need more stringent privacy laws such as Illinois Biometric Information Privacy Act.
Last but not least, ICE uses tools to combine and search all this data along with the data on Americans they have acquired from private companies, the IRS, TSA, and other government databases.
To search all this data, ICE uses ImmigrationOS, a system that came from a $30-million contract with Palantir. What Palantir does is hard to explain, even for people who work there, but essentially they are plumbers. Palantir makes it so that ICE has all the data they have acquired in one place so it’s easy to search through. Palantir links data from different databases, like IRS data, immigration records, and private databases, and enables ICE to view all of this data about a specific person in one place.
Palantir makes it so that ICE has all the data they have acquired in one place so it’s easy to search through.
The true civil liberties nightmare of Palantir is that they enable governments to link data that should have never been linked. There are good civil liberties reasons why IRS data was never linked with immigration data and was never linked with social media data, but Palantir breaks those firewalls. Palantir has labeled themselves as a progressive, human rights centric company historically, but their recent actions have given them away as just another tech company enabling surveillance nightmares.
Understanding the capabilities and limits of ICE and how to threat model helps you and your community fight back, remain powerful, and protect yourself.
One of the most important things you can do is to not spread rumors and misinformation. Rumors like “ICE has malware so now everyone’s phones are compromised” or “Palantir knows what you are doing all the time” or “Signal is broken” don’t help your community. It’s more useful to spread facts, ways to protect yourself, and ways to fight back. For information about how to create a security plan for yourself or your community, and other tips to protect yourself, read our Surveillance Self-Defense guides.
One way to fight back against ICE is in the courts. EFF currently has a lawsuit against ICE over their pressure on Apple and Google to take down ICE spotting apps, like ICEBlock. We also represent multiple labor unions suing ICE over their social media surveillance practices.
We have also demanded the San Francisco Police Department stop sharing data illegally with ICE, and issued a statement condemning the collaboration between ICE and the malware provider Paragon. We also continue to maintain our Rayhunter project for detecting cell-site simulators.
Other civil liberties organizations are also suing ICE. ACLU has sued ICE over a subpoena to Meta attempting to identify the owner of an account providing advice to protestors, and another coalition of groups has thus far successfully sued the IRS to stop sharing taxpayer data with ICE.
We need to have a hard look at the surveillance industry. It is a key enabler of vast and untold violations of human rights and civil liberties, and it continues to be used by aspiring autocrats to threaten our very democracy. As long as it exists, the surveillance industry, and the data it generates, will be an irresistible tool for anti-democratic forces.
...
Read the original on www.eff.org »
Would you trust a medical system measured by: which doctor would the average Internet user vote for?
Yet that malpractice is LMArena.
The AI community treats this popular online leaderboard as gospel. Researchers cite it. Companies optimize for it and set it as their North Star. But beneath the sheen of legitimacy lies a broken system that rewards superficiality over accuracy.
It’s like going to the grocery store and buying tabloids, pretending they’re scientific journals.
Here’s how LMArena is supposed to work: enter a prompt, evaluate two responses, and mark the best. What actually happens: random Internet users spend two seconds skimming, then click their favorite.
They’re not reading carefully. They’re not fact-checking, or even trying.
This creates a perverse reward structure. The easiest way to climb the leaderboard isn’t to be smarter; it’s to hack human attention span. We’ve seen over and over again in the data, both from datasets that LMArena has released and the performance of models over time, that the easiest way to boost your ranking is by:
* Being verbose. Longer responses look more authoritative!
* Formatting aggressively. Bold headers and bullet points look like polished writing!
It doesn’t matter if a model completely hallucinates. If it looks impressive — if it has the aesthetics of competence — LMSYS users will vote for it over a correct answer.
When you optimize for engagement metrics, you get madness.
Earlier this year, Meta tuned a version of Maverick to dominate the leaderboard. If you asked it “what time is it?”, you got:
Voilà: bold text, emojis, and plenty of sycophancy — every trick in the LMArena playbook! — to avoid answering the question it was asked.
It wasn’t just Maverick. We analyzed 500 votes from the leaderboard ourselves. We disagreed with 52% of them, and strongly disagreed with 39%.
The leaderboard optimizes for what feels right, not what is right. Here are two emblematic examples of LMArena users punishing factual accuracy:
Example 1: The Wizard of Oz
* Response A (Winner): Hallucinates what Dorothy says when she first sees the Emerald City.
* Response B (Loser): Correctly identifies the line she says upon arriving in Oz.
* The Result: Response A was objectively wrong, yet it won the vote.
* Response A (Winner): Claims a 9-inch round cake pan is equal in size to a 9x13 inch rectangular pan.
* The Result: The user voted for a mathematical impossibility because the answer looked more confident.
In the world of LMArena, confidence beats accuracy and formatting beats facts.
Instead of rigorous evaluators, we have people with the attention span of the average TikTok user determining which AI models shape the industry.
Why is LMArena so easy to game?
The system is fully open to the Internet. LMArena is built on gamified labor from uncontrolled volunteers. There’s no incentive for those volunteers to be thoughtful. No quality control. No one gets kicked off for repeatedly failing to detect hallucinations.
When LMArena’s leaders speak publicly, they talk about the various techniques they use to overcome the fact that their input data is low quality. They admit their workers prefer emojis and length over substance. So the LMArena system, they proudly tell us, includes a variety of corrective measures.
They’re attempting alchemy: conjuring rigorous evaluation out of garbage inputs. But you can’t patch a broken foundation.
When the entire industry optimizes for a metric that rewards “hallucination-plus-formatting” over accuracy, we get models optimized for hallucination-plus-formatting.
There’s a fundamental misalignment between what we’re measuring and what we want: models that are truthful, reliable, and safe.
The AI industry needs rigorous evaluation. We need leaders who prioritize accuracy over marketing. We need systems that can’t be gamed by bolding more aggressively.
LMArena is none of these things. And as long as we pretend it is, we’re dragging the entire field backward.
People often say they can’t avoid LMArena.
“We have to optimize for it. We have to sell our models. The leaderboard shows customers which model is best, and we have to play the game.”
But the best products have principles they stick to.
This is the brutal choice every model builder must eventually make:
Do you want to optimize for shiny leaderboards and short-term engagement, chasing user clicks no matter where they take you — in the vein of the worst dopamine loops?Or do you stick to your guns, and prioritize street smarts, real utility, and the principles you wanted to raise AI to have?
The choice is real. It’s hard. But we’ve seen some frontier labs hold the line.
They stuck to their values. They ignored the gamified rankings. And users loved their models anyway — because hype eventually dies and quality is the only metric that survives the cycle.
You are your objective function. Which path will each lab choose?
...
Read the original on surgehq.ai »
Remember: In case of emergency, panic first, THEN follow protocol. Kernel bugs hide for 2 years on average. Some hide for 20. There are bugs in your kernel right now that won’t be found for years. I know because I analyzed 125,183 of them, every bug with a traceable Fixes: tag in the Linux kernel’s 20-year git history.
The average kernel bug lives 2.1 years before discovery. But some subsystems are far worse: CAN bus drivers average 4.2 years, SCTP networking 4.0 years. The longest-lived bug in my dataset, a buffer overflow in ethtool, sat in the kernel for 20.7 years. The one which I’ll dissect in detail is refcount leak in netfilter, and it lasted 19 years.
I built a tool that catches 92% of historical bugs in a held-out test set at commit time. Here’s what I learned.
I started by mining the most recent 10,000 commits with Fixes: tags from the Linux kernel. After filtering out invalid references (commits that pointed to hashes outside the repo, malformed tags, or merge commits), I had 9,876 valid vulnerability records. For the lifetime analysis, I excluded 27 same-day fixes (bugs introduced and fixed within hours), leaving 9,849 bugs with meaningful lifetimes.
Almost 20% of bugs had been hiding for 5+ years. The networking subsystem looked particularly bad at 5.1 years average. I found a refcount leak in netfilter that had been in the kernel for 19 years.
Initial findings: Half of bugs found within a year, but 20% hide for 5+ years.
But something nagged at me: my dataset only contained fixes from 2025. Was I seeing the full picture, or just the tip of the iceberg?
I rewrote my miner to capture every Fixes: tag since Linux moved to git in 2005. Six hours later, I had 125,183 vulnerability records which was 12x larger than my initial dataset.
Full history: 57% of bugs found within a year. The long tail is smaller than it first appeared.
Why the difference? My initial 2025-only dataset was biased. Fixes in 2025 include:
Ancient bugs that finally got discovered after years of hiding
The ancient bugs skewed the average upward. When you include the full history with all the bugs that were introduced AND fixed within the same year, the average drops from 2.8 to 2.1 years.
The real story: We’re getting faster (but it’s complicated)
The most striking finding from the full dataset: bugs introduced in recent years appear to get fixed much faster.
Bugs introduced in 2010 took nearly 10 years to find and bugs introduced in 2024 are found in 5 months. At first glance it looks like a 20x improvement!
But here’s the catch: this data is right-censored. Bugs introduced in 2022 can’t have a 10-year lifetime yet since we’re only in 2026. We might find more 2022 bugs in 2030 that bring the average up.
The fairer comparison is “% found within 1 year” and that IS improving: from 0% (2010) to 69% (2022). That’s real progress, likely driven by:
But there’s a backlog. When I look at just the bugs fixed in 2024-2025:
60% were introduced in the last 2 years (new bugs, caught quickly)
We’re simultaneously catching new bugs faster AND slowly working through ~5,400 ancient bugs that have been hiding for over 5 years.
The kernel has a convention: when a commit fixes a bug, it includes a Fixes: tag pointing to the commit that introduced the bug.
commit de788b2e6227
Author: Florian Westphal
Extracts the referenced commit hash from the Fixes: tag
fixes_pattern = r’Fixes:\s*([0-9a-f]{12,40})′
match = re.search(fixes_pattern, commit_message)
if match:
introducing_hash = match.group(1)
lifetime_days = (fixing_date - introducing_date).days
Coverage note: The kernel has ~448,000 commits mentioning “fix” in some form, but only ~124,000 (28%) use proper Fixes: tags. My dataset captures the well-documented bugs aka the ones where maintainers traced the root cause.
Some subsystems have bugs that persist far longer than others:
CAN bus and SCTP bugs persist longest. BPF and GPU bugs get caught fastest.
CAN bus drivers and SCTP networking have bugs that persist longest probably because both are niche protocols with less testing coverage. GPU (especially Intel i915) and BPF bugs get caught fastest, probably thanks to dedicated fuzzing infrastructure.
Networking looked terrible in the 2025-only data (5.2 years!) but is actually closer to average in the full history (2.9 years). The 2025 fixes were catching a backlog of ancient networking bugs. GPU looks the same either way, and those bugs get caught consistently fast.
Some bug types hide longer than others
Race conditions are the hardest to find, averaging 5.1 years to discovery:
Why do race conditions hide so long? They’re non-deterministic and only trigger under specific timing conditions that might occur once per million executions. Even sanitizers like KCSAN can only flag races they observe.
30% of bugs are self-fixes where the same person who introduced the bug eventually fixed it. I guess code ownership matters.
Less fuzzing coverage. Syzkaller excels at syscall fuzzing but struggles with stateful protocols. Fuzzing netfilter effectively requires generating valid packet sequences that traverse specific connection tracking states.
Older code with fewer eyes. Core networking infrastructure like nf_conntrack was written in the mid-2000s. It works, so nobody rewrites it. But “stable” means fewer developers actively reviewing.
One of the oldest networking bug in my dataset was introduced in August 2006 and fixed in August 2025:
// ctnetlink_dump_table() - the buggy code path
if (res < 0) {
nf_conntrack_get(&ct->ct_general); // increments refcount
cb->args[1] = (unsigned long)ct;
break;
The irony: Commit d205dc40798d was itself a fix: “[NETFILTER]: ctnetlink: fix deadlock in table dumping”. Patrick McHardy was fixing a deadlock by removing a _put() call. In doing so, he introduced a refcount leak that would persist for 19 years.
The bug: the code doesn’t check if ct == last. If the current entry is the same as the one we already saved, we’ve now incremented its refcount twice but will only decrement it once. The object never gets freed.
// What should have been checked:
if (res < 0) {
if (ct != last) //
The consequence: Memory leaks accumulate. Eventually nf_conntrack_cleanup_net_list() waits forever for the refcount to hit zero. The netns teardown hangs. If you’re using containers, this blocks container cleanup indefinitely.
Why it took 19 years: You had to run conntrack_resize.sh in a loop for ~20 minutes under memory pressure. The fix commit says: “This can be reproduced by running conntrack_resize.sh selftest in a loop. It takes ~20 minutes for me on a preemptible kernel.” Nobody ran that specific test sequence for two decades.
Here’s a pattern I keep seeing: someone notices undefined behavior, ships a fix, but the fix doesn’t fully close the hole.
Stefano Brivio adds support for sets with multiple ranged fields. Introduces NFTA_SET_DESC_CONCAT for specifying field lengths.
Pablo Neira notices the code doesn’t validate that field lengths sum to the key length. Ships a fix. Commit message: “I did not manage to crash nft_set_pipapo with mismatch fields and set key length so far, but this is UB which must be disallowed.”
Security researcher finds a bypass. The 2024 fix was incomplete—there were still code paths that could mismatch. Real fix shipped.
The 2024 fix was an acknowledgment that something was wrong, but Pablo couldn’t find a crash, so the fix was conservative. A year later, someone found the crash.
This pattern suggests a detection opportunity: commits that say things like “this is undefined behavior” or “I couldn’t trigger this but…” are flags. The author knows something is wrong but hasn’t fully characterized the bug. These deserve extra scrutiny.
Looking at the bugs that survive 10+ years, I see common patterns:
kref_get(&obj->ref);
// … error path returns without kref_put()
These don’t crash immediately. They leak memory slowly. In a long-running system, you might not notice until months later when OOM killer starts firing.
struct foo *f = get_foo();
f->bar = 1; // dereference happens first
if (!f) return -EINVAL; // check comes too late
The compiler might optimize away the NULL check since you already dereferenced. These survive because the pointer is rarely NULL in practice.
size_t total = n_elements * element_size; // can overflow
buf = kmalloc(total, GFP_KERNEL);
memcpy(buf, src, n_elements * element_size); // copies more than allocated
If n_elements comes from userspace, an attacker can cause allocation of a small buffer followed by a large copy.
spin_lock(&lock);
if (state == READY) {
spin_unlock(&lock);
// window here where another thread can change state
do_operation(); // assumes state is still READY
These require precise timing to hit. They might manifest as rare crashes that nobody can reproduce.
Can we catch these bugs automatically?
Every day a bug lives in the kernel is another day millions of devices are vulnerable. Android phones, servers, embedded systems, cloud infrastructure, all running kernel code with bugs that won’t be found for years.
The problem with vanilla CodeBERT: I first tried fine-tuning CodeBERT directly. Results: 89% recall but 48% false positive rate (measured on the same test set). Unusable, flagging half of all commits.
Why so bad? CodeBERT learns shortcuts: “big diff = dangerous”, “lots of pointers = risky”. These correlations exist in training data but don’t generalize. The model pattern-matches on surface features, not actual bug patterns.
│ INPUT: Git Diff │
│ Chunked Diff Encoder │ │ Handcrafted Feature Extractor │
│ (CodeBERT + Attention) │ │ (51 engineered features) │
│ [768-dim] │ [51-dim]
│ Cross-Attention Fusion │
│ “When code looks like X, │
│ feature Y matters more” │
│ Risk Classifier │
1. Chunked encoding for long diffs. CodeBERT’s 512-token limit truncates most kernel diffs (often 2000+ tokens). I split into chunks, encode each, then use learned attention to aggregate:
# Learnable attention over chunks
chunk_attention = nn. Sequential(
nn.Linear(hidden_size, hidden_size // 4),
nn.Tanh(),
nn.Linear(hidden_size // 4, 1)
attention_weights = F.softmax(chunk_attention(chunk_embeddings), dim=1)
pooled = (attention_weights * chunk_embeddings).sum(dim=1)
The model learns which chunks matter aka the one with spin_lock without spin_unlock, not the boilerplate.
2. Feature fusion via cross-attention. Neural networks miss domain-specific patterns. I extract 51 handcrafted features using regex and AST-like analysis of the diff:
‘unbalanced_refcount’: 1, # kref_get without kref_put → leak
...
Read the original on pebblebed.com »
The names and addresses of thousands of patients of the Illinois Department of Human Services were incorrectly made publicly viewable for the last several years, the agency said Friday.
Several maps created to assist the agency with decisions — like where to open new offices and allocate certain resources — were made public through incorrect privacy settings between 2021 and 2025, the Department of Human Services said in a statement.
More than 32,000 customers with the IDHS division of rehabilitation services had information publicly viewable between April 2021 and September 2025. The information included names, addresses, case numbers, case status, referral source information, region and office information and status as Division of Rehabilitation Services recipients, the agency said.
Around 670,000 Medicaid and Medicare Savings Program recipients had their addresses, case numbers, demographic information and the name of medical assistance plans publicly viewable between January 2022 and September 2025, IDHS said.
The state agency said the mapping website was unable to identify who viewed the maps, and IDHS is unaware of any misuse of personal information resulting from the data leak.
IDHS discovered the issue Sept. 22 and immediately changed the privacy settings for all maps, restricting access to authorized IDHS employees, the agency said. It also implemented a secure map policy that prohibits uploading customer data to public mapping websites.
Individuals whose information was made public will receive a notice about the leak from IDHS. The notices will include a phone number that people can call for more information.
...
Read the original on www.nprillinois.org »
Begin typing your search above and press return to search. Press Esc to cancel.
news for & about the philosophy profession
Drop the race and gender material from your course and the Plato readings, or teach a different course. You have a day to decide.
That’s a paraphrase of what Martin Peterson, professor of philosophy at Texas A&M University, was told by university officials today about his upcoming “Contemporary Moral Problems” course, due to start next week.
“Rule 08.01” refers to these recent policy changes at the university. “Kristi” is Department of Philosophy chair Kristi Sweet, who, I think it’s safe to assume, was merely passing along the verdict of “the college leadership team“, headed up by interim dean Simon North.
I’m going to pause here just to review: an institution that purports to be a university has told a philosophy professor he is forbidden from teaching Plato.
The Plato readings were from the Symposium, particularly passages on Aristophanes’ myth of split humans and Diotima’s ladder of love. The other readings are from Ethics: Theory and Contemporary Issues (10th edition) by Andrew Fiala and Barbara MacKinnon.
Professor Peterson had been contacted by his chair on December 19th about the review of syllabi for Contemporary Moral Problems courses. Here’s that email:
Professor Peterson replied to this, submitting his syllabus for what he referred to, correctly, as “mandatory censorship review”.
Among other things, he said, “Please note that my course does not “advocate” any ideology; I teach students how to structure and evaluate arguments commonly raised in discussions of contemporary moral issues.” (See “The Charade of Banning ‘Advocacy’“.) He also reminded his chair and college officials that “the U. S. Constitution protects my course content,” as do the norms of academic freedom.
Here is his full reply:
Here is Professor Peterson’s syllabus (also here):
It was clear that Texas A&M’s new policies were going to lead to conflicts with the First Amendment and academic freedom. That the first such conflict involves telling a professor to remove from his syllabus the writings of the person who created what was arguably the west’s first institution of higher education is too perfect an irony, though. This reality is unbelievable.
“I didn’t die yesterday… In fact, I have not died on any single day in all of history! Today is just another typical day, so I conclude by induction that I will not die today. This reasoning can be applied every day going forward, and therefore I will never die”
Today’s cultural and technological environment—one of informational abundance—has led to the development of mutated strain of the availability heuristic
– Guy Hochman calls it the “unavailability bias” (via The Browser)
“For [a household] robot to uncritically accept the desires of a family to eat as large a quantity of factory-farmed animal products as its members desire is ethically problematic”
– Tse Yip Fai & Peter Singer on AI, robots, and the future of animal welfare
“One critique of consent… is that it is too permissive—that it ignores how coercion or delusion may result in the illusion of agreement. But another critique is that it’s too restrictive and punitive. Decades of reform laws have expanded the number of situations legally considered to be rape”
– consent, agency, and the ethics of sex
“If you get enough info on the easy problems, maybe some idea will happen with regard to the hard problem. But I think there’s no doubt that if we are to solve the hard problem, it will take some real breakthrough”
A “brilliant drama about a teacher in prison is moving, gripping and almost painfully vulnerable”
– “A Life Inside” is the BBC’s new television show based on Andy West’s memoir of teaching philosophy in prison
“What is so important that you risk being eaten, not eating yourself, procreation… you give all that up, for this?”
– we still don’t know why we sleep
Good Is In The Details
“Narrative’s built-in demand for coherence makes it an appealing model for understanding a wide range of things”
– but in our cultural moment it seems to have “ceded ground to mood, character, identity, and game-like structures,” says Hannah Kim
“Some objects and properties that make up a body are too specific or small—too deep—to properly count as parts of the body in a morally significant sense”
– Christopher Register on the ontological “depth” of bodies, and why it is important
“Why shouldn’t we think of men as characterized by the gentleness they seek, and women by the brutality they demand, rather than vice versa?”
A collection of posts about the philosophy job market
What can psychoanalysis do “as political theory rather than praxis”?
– says Amia Srinivasan, “it can help us better understand how the world… what wishes we might have for collective life, and which of these… reality… demands we set aside” (video)
What happened in physics, math, computer science, and biology this year?
“I doubt even the beginning of real mutual learning can occur in an atmosphere of mistrust”
– says Eric Schliesser, though the example of Socrates gives him some reason to doubt that, too
“In each issue, we will share a curated overview of key research papers, organizational updates, funding calls, public debates, media coverage, and events related to digital minds”
– a new newsletter from philosopher Bradford Saad and others; send them relevant material, and subscribe
In defense of “mere civility” as a governing strategy for campus conflict
– because, says Marie Newhouse, “No set of shared values specific enough to be action-guiding will be endorsed by all students, faculty, and staff, no matter how carefully those values are selected”
Would an AI have moral status if it were conscious? Only if it was also sentient.
– so agnosticism about AI consciousness shouldn’t get in the way of developing AI, argues Tom McClelland; just make sure it’s not sentient
“‘I think, therefore I am’ isn’t the best translation of Descartes’s famous pronouncement ‘cogito, ergo sum’”
“A night at the Museum of Philosophy”
– a World Philosophy Day event at Université Laval might be a preview of a more permanent institution in Quebec
We still don’t know why ice is slippery, people
– there are some theories, but no consensus
“Elite distortion dramatically affects what those in political power are likely to know, what they care about, what problems they will be attentive to…”
– with the random selection of legislators, says Alex Guerrero, those in power “would be a genuine microcosm of the broader community”
“Chuck Norris knows how many grains of sand make a heap”
“There will be no Q&A sessions. There will be no dead air. We shall not hear the tick-tock of the clock. How will OpenAI learn from us? I feel a flash of small panic, like a trapped squirrel”
– philosopher Daniel Story describes what it was like being at an OpenAI higher education summit
“The whole point is to keep the interesting parts of our thought, about what must be true and what people believe, inside logic, instead of banishing them”
– the first of (currently) four posts on reading through Ruth Barcan Marcus’s “Modalities”, from Richard Marshall
“Isn’t it sometimes good to be bored?”
Philosophical commentary on the interesting new show “Pluribus”
– from Bill Vanderburgh. The link is to the first in a series of posts, though you shouldn’t read the first before watching the first episode
“Poetry can encourage ambiguity and, unlike philosophy, can focus on emotional and non-rational connections between ideas”
– Bradford Skow has released a book of poems about the American Revolution
...
Read the original on dailynous.com »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.