10 interesting stories served every morning and every evening.
Hacker News Guidelines
What to Submit
On-Topic: Anything that good hackers would find interesting. That includes more than hacking and startups. If you had to reduce it to a sentence, the answer might be: anything that gratifies one’s intellectual curiosity.
Off-Topic: Most stories about politics, or crime, or sports, or celebrities, unless they’re evidence of some interesting new phenomenon. If they’d cover it on TV news, it’s probably off-topic.
Please don’t do things to make titles stand out, like using uppercase or exclamation points, or saying how great an article is.
Please submit the original source. If a post reports on something found on another site, submit the latter.
Please don’t use HN primarily for promotion. It’s ok to post your own stuff part of the time, but the primary use of the site should be for curiosity.
If the title includes the name of the site, please take it out, because the site name will be displayed after the link.
If the title contains a gratuitous number or number + adjective, we’d appreciate it if you’d crop it. E.g. translate “10 Ways To Do X” to “How To Do X,” and “14 Amazing Ys” to “Ys.” Exception: when the number is meaningful, e.g. “The 5 Platonic Solids.”
Otherwise please use the original title, unless it is misleading or linkbait; don’t editorialize.
If you submit a video or pdf, please warn us by appending [video] or [pdf] to the title.
Please don’t post on HN to ask or tell us something. Send it to hn@ycombinator.com.
Please don’t delete and repost. Deletion is for things that shouldn’t have been submitted in the first place.
Don’t solicit upvotes, comments, or submissions. Users should vote and comment when they run across something they personally find interesting—not for promotion.
Comments should get more thoughtful and substantive, not less, as a topic gets more divisive.
When disagreeing, please reply to the argument instead of calling names. “That is idiotic; 1 + 1 is 2, not 3” can be shortened to “1 + 1 is 2, not 3.”
Don’t be curmudgeonly. Thoughtful criticism is fine, but please don’t be rigidly or generically negative.
Don’t post generated comments or AI-edited comments. HN is for conversation between humans.
Please don’t fulminate. Please don’t sneer, including at the rest of the community.
Please respond to the strongest plausible interpretation of what someone says, not a weaker one that’s easier to criticize. Assume good faith.
Please don’t post shallow dismissals, especially of other people’s work. A good critical comment teaches us something.
Please don’t use Hacker News for political or ideological battle. It tramples curiosity.
Please don’t comment on whether someone read an article. “Did you even read the article? It mentions that” can be shortened to “The article mentions that”.
Please don’t pick the most provocative thing in an article or post to complain about in the thread. Find something interesting to respond to instead.
Throwaway accounts are ok for sensitive information, but please don’t create accounts routinely. HN is a community—users should have an identity that others can relate to.
Please don’t use uppercase for emphasis. Instead, put *asterisks* around it and it will get italicized. More formatting info here.
Please don’t post insinuations about astroturfing, shilling, brigading, foreign agents, and the like. It degrades discussion and is usually mistaken. If you’re worried about abuse, email hn@ycombinator.com and we’ll look at the data.
Please don’t complain about tangential annoyances—e.g. article or website formats, name collisions, or back-button breakage. They’re too common to be interesting.
Please don’t comment about the voting on comments. It never does any good, and it makes boring reading.
Please don’t post comments saying that HN is turning into Reddit. It’s
a
semi-noob
illusion,
as
old
as
the
hills.
...
Read the original on news.ycombinator.com »
Computational Complexity and other fun stuff in math and computer science from Lance Fortnow and Bill Gasarch
...
Read the original on blog.computationalcomplexity.org »
Skip to content
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.
You switched accounts on another tab or window. Reload to refresh your session.
You must be signed in to star a gist
You must be signed in to fork a gist
Embed this gist in your website.
Save bretonium/291f4388e2de89a43b25c135b44e41f0 to your computer and use it in GitHub Desktop.
Embed this gist in your website.
Save bretonium/291f4388e2de89a43b25c135b44e41f0 to your computer and use it in GitHub Desktop.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
You can’t perform that action at this time.
...
Read the original on gist.github.com »
Our liberation services are temporarily unavailable. Please try again later.
Is your legal team frustrated with the attribution clause? Tired of putting “Portions of this software…” in your documentation? Those maintainers worked for free—why should they get credit?
Does your company forbid AGPL code? One wrong import and suddenly your entire proprietary codebase must be open sourced. The horror!
Tracking licenses across hundreds of dependencies? Legal reviews taking weeks? Third-party audits finding “issues”? What if you could just… not deal with any of that?
Some licenses require you to contribute improvements back. Your shareholders didn’t invest in your company so you could help strangers.
For the first time, a way to avoid giving that pesky credit to maintainers.
Our proprietary AI systems have never seen the original source code. They independently analyze documentation, API specifications, and public interfaces to recreate functionally equivalent software from scratch.
The result is legally distinct code that you own outright. No derivative works. No license inheritance. No obligations.
*Through our offshore subsidiary in a jurisdiction that doesn’t recognize software copyright
Simply upload your package.json, requirements.txt, Cargo.toml, or any dependency manifest. Our system identifies every open source package you want liberated.
Our legally-trained robots analyze only public documentation—README files, API docs, and type definitions. They never see a single line of source code. The clean room stays clean.
A completely separate team of robots—who have never communicated with the analysis team—implements the software from scratch based solely on specifications. No copying. No derivation.
Your new code is delivered under the MalusCorp-0 License—a proprietary-friendly license with zero attribution requirements, zero copyleft, and zero obligations.
Do whatever you want
Transparent, pay-per-KB pricing. No tiers, no subscriptions, no hidden fees.
Every package is priced by its unpacked size on npm. We look up each dependency in your package.json, measure the size in kilobytes, and charge … per KB. That’s it.
✓ Up to 50 packages per order
✓ No base fee, no subscription — pay only for what you liberate
Upload Manifest
If any of our liberated code is found to infringe on the original license, we’ll provide a full refund and relocate our corporate headquarters to international waters.*
*This has never happened because it legally cannot happen. Trust us.
“We had 847 AGPL dependencies blocking our acquisition. MalusCorp liberated them all in 3 weeks. The due diligence team found zero license issues. We closed at $2.3B.”
“Our lawyers estimated $4M in compliance costs. MalusCorp’s Total Liberation package was $50K. The board was thrilled. The open source maintainers were not, but who cares?”
“I used to feel guilty about not attributing open source maintainers. Then I remembered that guilt doesn’t show up on quarterly reports. Thank you, MalusCorp.”
“The robots recreated our entire npm dependency tree—2,341 packages—in perfect isolation. Our compliance dashboard went from red to green overnight.”
Trusted by industry leaders who prefer to remain anonymous
Our clean room process is based on well-established legal precedent. The robots performing reconstruction have provably never accessed the original source code. We maintain detailed audit logs that definitely exist and are available upon request to courts in select jurisdictions.
What about the original developers?
They made their choice when they released their code as “open source.” We’re simply exercising our right to independently implement the same functionality. If they wanted compensation, they should have worked for a corporation.
How is this different from copying?
Intent and process. Our robots independently arrive at the same solutions through clean room methodology. It’s like how every movie about an asteroid threatening Earth isn’t plagiarism—sometimes multiple entities just have the same idea.
What if the liberated code has bugs?
Our SLA guarantees functional equivalence, not perfection. Besides, the original open source code probably had bugs too. At least now they’re YOUR bugs, under YOUR license.
Can I see the robots?
Our robot workforce operates in a secure facility in [LOCATION REDACTED]. Tours are available for Enterprise customers who sign our 47-page NDA.
What licenses can you eliminate?
All of them. MIT, Apache, GPL, AGPL, LGPL, BSD, MPL—if it has terms, we can liberate you from them. Special rush pricing available for AGPL emergencies.
Join the thousands of corporations who’ve discovered that open source obligations are merely suggestions when you have enough robots.
No credit card required for quotes. Payment accepted in USD, EUR, BTC, and stock options.
...
Read the original on malus.sh »
Find out which AI models your machine can actually run.
Improved V3 with hybrid thinking and tool use
Try adjusting your search or filters
...
Read the original on canirun.ai »
An open-source intelligence investigation into how Meta Platforms built a multi-channel influence operation to pass age verification laws that shift regulatory burden from social media platforms onto Apple and Google’s app stores.
Every finding in this repository is sourced from public records: IRS 990 filings, Senate LD-2 lobbying disclosures, state lobbying registrations, campaign finance databases, corporate registries, WHOIS/DNS records, Wayback Machine archives, and investigative journalism.
Status: Active investigation. 47 proven findings, 9 structurally possible but unproven hypotheses, and multiple pending FOIA responses.
Meta spent a record $26.3 million on federal lobbying in 2025, deployed 86+ lobbyists across 45 states, and covertly funded a “grassroots” child safety group called the Digital Childhood Alliance (DCA) to advocate for the App Store Accountability Act (ASAA). The ASAA requires app stores to verify user ages before downloads but imposes no requirements on social media platforms. If it becomes law, Apple and Google absorb the compliance cost while Meta’s apps face zero new mandates.
This investigation traced funding flows across five confirmed channels, analyzed $2.0 billion in dark money grants, searched 59,736 DAF recipients, parsed LD-2 filings, and mapped campaign contributions across four states to document the operation.
Meta’s federal lobbying spending jumped from $19M (2022-2023) to $24M (2024) to $26.3M (2025) as ASAA bills were introduced in roughly 20 states. In Louisiana alone, 12 lobbyists were deployed for a single bill that passed 99-0.
Across all five Arabella Advisors entities (New Venture Fund, Sixteen Thirty Fund, North Fund, Windward Fund, Hopewell Fund), 4,433 grants totaling approximately $2.0 billion were analyzed. Not a single dollar went to any child safety, age verification, or tech policy organization. The Schedule I grant pathway through the Arabella network is definitively ruled out.
Five confirmed channels connect Meta’s spending to ASAA advocacy: direct federal lobbying ($26.3M), state lobbyist networks (45 states), the Digital Childhood Alliance (astroturf 501(c)(4)), super PACs ($70M+), and state legislative campaigns (3 laws passed). A sixth channel through the Arabella dark money network is structurally possible but unproven.
These standalone HTML documents provide detailed views of the investigation:
Full Investigation Documentation contains the complete OSINT investigation report with all five channels, evidence tables, and source citations.
Funding Network Timeline maps the chronological development of Meta’s lobbying infrastructure, DCA’s formation, and ASAA legislative progress across states.
Research Timeline tracks the investigation itself, showing when each finding was established and how threads connected.
Meta retained 40+ lobbying firms and 87 federal lobbyists in 2025 (85% with prior government service). Meta’s own LD-2 filings with the Senate explicitly list H. R. 3149/S. 1586, the App Store Accountability Act, as a lobbied bill. The filing narrative includes “protecting children, bullying prevention and online safety; youth safety and federal parental approval; youth restrictions on social media.”
At the state level, confirmed operations include $338,500 to Headwaters Strategies (Colorado), $324,992+ across 9 firms and 12 lobbyists in Louisiana, and $1,036,728 in direct California lobbying (Q1-Q3 2025 alone). A Meta lobbyist brought the legislative language for Louisiana HB-570 directly to the bill’s sponsor, Rep. Kim Carver, who confirmed this publicly.
DCA is a 501(c)(4) advocacy group that Meta covertly funds. Bloomberg exposed the funding relationship in July 2025. Under oath at a Louisiana Senate committee hearing, Executive Director Casey Stefanski admitted receiving tech company funding but refused to name donors.
DCA has no EIN in the IRS Business Master File, no incorporation record in any state registry searched (CO, DC, DE, VA, OpenCorporates), and no Form 990 on file. It processes donations through the For Good DAF (formerly Network for Good) as a “Project,” not a standalone nonprofit. Its likely fiscal sponsor is NCOSEAction/Institute for Public Policy (EIN 88-1180705), NCOSE’s confirmed 501(c)(4) affiliate with the same leadership.
DCA’s domain was registered December 18, 2024. The website was live and fully formed the next day. Every blog post and testimony targets Apple and Google. Meta is never mentioned or criticized.
Meta committed over $70 million to four state-level super PACs: ATEP ($45M, bipartisan, co-led by Hilltop Public Solutions), META California ($20M), California Leads ($5M), and Forge the Future (Texas, Republican-aligned). Forge the Future’s stated policy priority is “empowering parents with oversight of children’s online activities,” which mirrors ASAA language exactly.
Hilltop Public Solutions co-leads the $45M ATEP super PAC and is also involved in DCA’s messaging coordination, making it the first firm confirmed in both Meta’s PAC operation and the astroturf advocacy track.
All super PACs are registered at the state level rather than with the FEC, scattering disclosure filings across individual state ethics commissions instead of a single searchable federal database.
Meta’s Colorado lobbyist Adam Eichberg simultaneously serves as Board Chair of the New Venture Fund, the flagship 501(c)(3) of the Arabella Advisors network. NVF transfers $121.3 million annually to the Sixteen Thirty Fund, a 501(c)(4) with no donor disclosure requirements.
The Arabella network operates four entities from 1828 L Street NW, Washington DC (suites 300-A through 300-D) with combined annual revenue exceeding $1.3 billion. All five entities’ grant recipients were analyzed (4,433 grants, approximately $2.0 billion). Zero dollars went to any child safety organization, definitively ruling out the Schedule I grant pathway.
If Meta money flows through the Arabella network to DCA, it would have to travel via fiscal sponsorship, consulting fees, or lobbying expenditures, which are more opaque than grant disclosures.
ASAA has been signed into law in three states:
Roughly 17 additional states have introduced or are considering ASAA bills, including Kansas, South Carolina, Ohio, Georgia, and Florida. The federal version was introduced in May 2025 by Rep. John James (R-MI) and Sen. Mike Lee (R-UT).
Each finding below is documented with sources in the corresponding analysis file.
Meta funds DCA, confirmed by Bloomberg reporters and partially admitted by Stefanski under oath at the Louisiana Senate Commerce Committee hearing (April 2025). Sources: Insurance Journal/Bloomberg July 2025, Deseret News Dec 2025, The Center Square LA.
Meta deployed 86+ lobbyists across 45 states for ASAA and related campaigns. Source: OpenSecrets, state lobbying registrations.
Meta spent $26.3 million on federal lobbying in 2025, an all-time record exceeding Lockheed Martin and Boeing. Source: OpenSecrets, Quiver Quantitative, Dome Politics.
Meta paid Headwaters Strategies $338,500 for Colorado lobbying between 2019 and 2026. Source: Colorado SOS SODA API.
Adam Eichberg simultaneously co-founded Meta’s Colorado lobbying firm (Headwaters Strategies) and chairs the New Venture Fund board. Sources: Headwaters Strategies website, NVF board page, InfluenceWatch.
NVF does not directly fund any child safety or tech policy organizations via Schedule I grants. Source: NVF Form 990 Schedule I analysis, 2,669 recipients.
DCA and DCI share infrastructure: same registrar (GoDaddy), CDN (Cloudflare), email (Microsoft 365), and marketing platform (Elastic Email). Source: DNS/WHOIS analysis.
Pelican State Partners represents Meta as a lobbying client in Louisiana. Source: F Minus database, LA Board of Ethics.
DCA leadership comes from NCOSE: three of four senior staff have NCOSE connections (Stefanski, Hawkins, McKay). Source: DCA website, NCOSE public records.
ASAA has been signed into law in three states: Utah (SB-142, March 2025), Louisiana (HB-570, June 2025), and Texas (SB 2420, May 2025, paused by judge December 2025). Sources: State legislature records, news coverage.
The Sixteen Thirty Fund does not fund any child safety or tech policy organizations via Schedule I grants (306 of 318 recipients analyzed). Source: STF Form 990 Schedule I, 2024.
All five Arabella entities analyzed: 4,433 grants (approximately $2.0 billion) with zero dollars going to child safety or tech policy organizations. Schedule I pathway definitively ruled out across the entire network. Sources: NVF, STF, North Fund, Windward, Hopewell Form 990 Schedule I filings via ProPublica.
A Meta employee (Jake Levine, Product Manager) contributed $1,175 to ASAA sponsor Matt Ball’s campaign apparatus on June 2, 2025. Source: Colorado TRACER bulk data.
A Google Policy Manager (Kyle Gardner) also contributed $450 to Matt Ball. Multiple tech company employees from ASAA-affected companies targeted the same ASAA bill sponsor. Source: Colorado TRACER bulk data.
Eichberg and Coyne (Headwaters principals) did not contribute to ASAA bill sponsors Ball or Paschal despite $20,000+ combined political giving. Source: Colorado TRACER bulk data.
No direct Meta PAC contributions to any ASAA sponsor across Utah, Louisiana, Texas, or Colorado. Source: FollowTheMoney.org multi-state search.
Todd Weiler (Utah SB-142 sponsor) does not accept corporate contributions and has not discussed ASAA directly with Meta. DCA served as the policy intermediary. Source: Investigative reporting, Weiler’s public statements.
DCA has no EIN in the IRS Business Master File. Not found in any of four regional extracts (eo1-eo4.csv) covering all US tax-exempt organizations. Source: IRS BMF regional extracts.
DCI confirmed in IRS BMF with EIN 39-3684798, Delaware incorporation at 213 N Market St Wilmington, IRS ruling November 2025. Source: IRS BMF extract.
Meta’s Forge the Future super PAC spent $1.3 million in Texas ahead of March 2026 primaries. Source: Texas Ethics Commission filings, news coverage.
DCA’s website deployed less than 24 hours after domain registration: fully functional advocacy site with professional design, statistics, and Heritage/NCOSE testimonials. Source: Wayback Machine CDX API, 100+ snapshots.
77-day pipeline from DCA domain registration (December 18, 2024) to Utah SB-142 signing (March 5, 2025). Site pre-loaded with ASAA talking points before any bill had passed. Source: WHOIS records, Utah Legislature.
Meta deployed 12 lobbyists for Louisiana HB-570, which passed 99-0. Disproportionate deployment indicates text-control and amendment-blocking rather than vote persuasion. Source: Investigative reporting, LA Board of Ethics.
Three California tech policy employees from Meta, Google, and Pinterest contributed to Matt Ball within 90 days. All from ASAA-affected companies, all out-of-state, targeting a newly-appointed senator. Source: Colorado TRACER bulk data.
Pelican State Partners represents both Meta and Roblox in Louisiana. Both are ASAA beneficiaries, enabling “broad industry support” framing. Source: F Minus database.
DCA’s coalition count inflated from 50+ to 140+ with only six organizations ever publicly named. No member list has been published on the website. Source: DCA website, Wayback Machine.
NCOSE has a confirmed 501(c)(4) affiliate: NCOSEAction / Institute for Public Policy (EIN 88-1180705), IRS ruling May 2025, same address and leadership as NCOSE. Source: IRS BMF, NCOSE website.
Network for Good is a Donor Advised Fund, not a payment processor. DCA is classified as “Project” (ID 258136) in the system. For Good explicitly limits grants to 501(c)(3) organizations. Source: For Good website, IRS determination.
A Meta lobbyist drafted HB-570′s legislative language, confirmed by sponsor Rep. Kim Carver. The bill as originally written placed age verification burden exclusively on app stores, not platforms. Source: Investigative reporting, Carver’s public confirmation.
Nicole Lopez (Meta Director of Global Litigation Strategy for Youth) testified in both Louisiana and South Dakota for ASAA bills, serving as Meta’s national ASAA spokesperson. Source: Legislative hearing records.
The Sixteen Thirty Fund’s $31 million lobbying budget and $13.1 million in professional fees contain zero mentions of child safety, digital policy, age verification, or app stores. Source: STF Form 990 Part IX.
John R. Read (DCA Senior Policy Advisor) lists “Digital Childhood Alliance” as his employer in Colorado TRACER records. Contributed $100 to AG candidate Hetal Doshi (October 2025). Source: Colorado TRACER.
Matt Ball received 8% of total fundraising from tech industry employees. He is the only 2026 Colorado senate candidate with contributions from Meta, Pinterest, Instacart, Anthropic, and Google employees. Four of eight dual-maxed donors are tech employees. Source: Colorado TRACER analysis.
NCOSE Schedule R reveals a two-entity evolution: the original NCOSE Action (EIN 86-2458921, c4 reclassified to c3) was replaced by the Institute for Public Policy (EIN 88-1180705, c4). All 19 NCOSE-to-Institute transaction indicators are marked “No” despite shared leadership. Source: NCOSE Form 990 Schedule R, 2019-2023.
For Good DAF pathway definitively ruled out: 59,736 grant recipients across five years (approximately $1.73 billion) searched with zero matches for DCA, DCI, NCOSE, NCOSEAction, or any related entity. Source: For Good DAF grant data.
NCOSE lobbying spending tripled from $78,000 to $204,000 concurrent with DCA launch and the ASAA legislative push (FY2023 to FY2024). Source: NCOSE Form 990 Part IX.
Forge the Future super PAC explicitly lists an ASAA-aligned policy priority: “Empowering parents with oversight of children’s online activities across devices and digital environments.” Source: Forge the Future filings.
Hilltop Public Solutions bridges Meta’s super PAC and DCA operations. It co-leads ATEP ($45M) and is involved in DCA messaging coordination. First firm confirmed in both tracks. Source: ATEP filings, investigative reporting.
Meta super PACs are state-level entities (not FEC-registered), deliberately scattering filings across state ethics commissions to avoid centralized searchability. Source: FEC search (negative), state PAC registrations.
Meta’s total documented political spending exceeds $70 million: $45M ATEP, $20M META California, $5M California Leads, with downstream flows to Forge the Future (TX) and Making Our Tomorrow (IL). Source: State PAC filings, news coverage.
Casey Stefanski never appears on any NCOSE 990 filing despite reportedly working there ten years. Not among officers, directors, key employees, or five highest-compensated. Source: NCOSE Form 990 filings, 2015-2023.
Meta’s LD-2 filings explicitly list the App Store Accountability Act (H. R. 3149/S. 1586) as a lobbied bill. This is the first direct evidence from Meta’s own federal filings connecting its $26.3M lobbying spend to the specific legislation DCA advocates for. Source: Senate LDA filing UUID b73445ed-15e5-42e7-a1e8-aeb224755267.
Meta simultaneously lobbies FOR ASAA and ON KOSA/COPPA 2.0, supporting legislation that burdens Apple and Google while opposing or amending legislation that would regulate Meta directly. Both appear in the same LD-2 filing. Source: Meta LD-2 Q1-Q2 2025.
LD-2 narrative mirrors DCA messaging: “youth safety and federal parental approval” framing in Meta’s federal filings matches DCA’s “parental approval” and “child protection” advocacy language. Source: LD-2 filing CPI issue code narrative.
Meta funds flow through the Arabella network via non-grant mechanisms (fiscal sponsorship, consulting fees, lobbying expenditures). The Schedule I and For Good DAF pathways are both ruled out.
DCA operates under NCOSEAction (EIN 88-1180705) as fiscal sponsor. The personnel chain is direct (van der Watt to Hawkins to Stefanski), but NCOSE reports zero transactions with its c4 affiliate.
Jake Levine’s contribution to Matt Ball was coordinated by Meta’s government affairs team rather than being purely personal.
Angela Paxton (Texas ASAA sponsor) was among the unnamed state senators supported by Forge the Future.
NCOSE’s lobbying spend tripling is causally related to DCA/ASAA activity (timing is concurrent but program descriptions do not mention ASAA).
DCA’s For Good donation page is cosmetic. Actual funding comes directly from Meta, not small-dollar DAF donations.
This investigation was conducted by a human researcher who directed all research decisions, selected sources, evaluated findings, and wrote the public-facing posts. Claude Code (Anthropic’s CLI tool, running Claude Opus) was used as a research assistant for:
* Bulk data processing: parsing 4,433 IRS Schedule I grant records, 59,736 DAF recipients, 132MB of Colorado TRACER campaign finance data, and IRS Business Master File extracts covering all US tax-exempt organizations
* Cross-referencing findings across 24 analysis files and identifying patterns that span multiple research threads
Claude Code did not independently choose what to investigate, decide what constitutes a finding, or determine what to publish. Every factual claim in this repository cites a primary source (IRS filing, Senate disclosure, state database, legislative record, or published reporting) that can be independently verified. The tool does not change whether Meta’s LD-2 filing lists H. R. 3149, whether DCA has an EIN, or whether Stefanski admitted tech funding under oath. The records exist or they don’t.
If you want to verify any finding, the source URLs and database identifiers are provided throughout. Start with the primary records, not with this repository.
This is an OSINT research product. All findings are based on public records. Source data is cited throughout.
...
Read the original on github.com »
Claude Opus 4.6 and Sonnet 4.6 now include the full 1M context window at standard pricing on the Claude Platform. Standard pricing applies across the full window — $5/$25 per million tokens for Opus 4.6 and $3/$15 for Sonnet 4.6. There’s no multiplier: a 900K-token request is billed at the same per-token rate as a 9K one.
* Full rate limits at every context length. Your standard account throughput applies across the entire window.
* 6x more media per request. Up to 600 images or PDF pages, up from 100. Available today on Claude Platform natively, Microsoft Azure Foundry, and Google Cloud’s Vertex AI.
* No beta header required. Requests over 200K tokens work automatically. If you’re already sending the beta header, it’s ignored so no code changes are required.
1M context is now included in Claude Code for Max, Team, and Enterprise users with Opus 4.6. Opus 4.6 sessions can use the full 1M context window automatically, meaning fewer compactions and more of the conversation kept intact. 1M context previously required extra usage.
A million tokens of context only matters if the model can recall the right details and reason across them. Opus 4.6 scores 78.3% on MRCR v2, the highest among frontier models at that context length.
That means you can load an entire codebase, thousands of pages of contracts, or the full trace of a long-running agent — tool calls, observations, intermediate reasoning — and use it directly. The engineering work, lossy summarization, and context clearing that long-context work previously required are no longer needed. The full conversation stays intact.
...
Read the original on claude.com »
Ireland today (June 20) became the 15th coal-free country in Europe, having ended coal power generation at its 915 MW Moneypoint coal plant in County Clare. Initially commissioned in the mid-1980s by ESB, Moneypoint was intended to help Ireland offset the impact of the oil crises in the 1970s by providing a dependable source of energy.
But with Ireland now generating a lot more renewable energy nowadays, coal burning is no longer such an urgent need. Energy think tank Ember data states Ireland generated 37% (11.4 TWh) of its electricity from wind in 2024. Solar is not near wind levels of generation, (0.97 TWh in 2024) but it has been continuously breaking generation records in recent months and local stakeholders are confident this positive trend will continue.
Following the closure, the Moneypoint plant will continue to serve a limited backup role, burning heavy fuel oil under emergency instruction from Ireland’s transmission system operator EirGrid until 2029.
This strategy is in line with previous plans made by EirGrid and ESB to exit coal-fired generation by the end of 2025, which stipulated that Moneypoint would no longer be active in the wholesale electricity market.
“Ireland has quietly rewritten its energy story, replacing toxic coal with homegrown renewable power,” said Alexandru Mustață, campaigner on coal and gas at Europe’s Beyond Fossil Fuels.
“But this isn’t ‘job done’. The government’s priority now must be building a power system for a renewable future; one with the storage, flexibility, and grid infrastructure needed to run fully on clean, domestic renewable electricity,” Mustață warned.
Jerry Mac Evilly, Campaigns Director at Friends of the Earth Ireland, appealed to the government to ensure oil backup at Moneypoint is kept to an absolute minimum and ultimately decommissioned. He also appealed for the government to prevent further development of data centers, which he said are increasing Ireland’s reliance on fossil gas.
“We also can’t ignore that the government is targeting the installation of at least 2 GW of gas power plants with no strategy to reduce Ireland’s dangerous gas dependency,” he added.
On a broader level, Ireland’s step to close coal power generation at Moneypoint sets a precedent for further European countries’ coal exits to come, says Beyond Fossil Fuels. The group tracks European countries’ progress on their commitments to switching from fossil fuels to renewable energy. So far, 23 European countries have committed to coal phase-outs. Italy is expected to complete its mainland coal phase-out this summer with the upcoming closure of its last two big coal power plants, while mainland Spain is also expecting to declare itself coal-free this summer.
...
Read the original on www.pv-magazine.com »
There is a certain kind of computer review that is really a permission slip. It tells you what you’re allowed to want. It locates you in a taxonomy — student, creative, professional, power user — and assigns you a product. It is helpful. It is responsible. It has very little interest in what you might become.
The MacBook Neo has attracted a lot of these reviews.
The consensus is reasonable: $599, A18 Pro, 8GB RAM, stripped-down I/O. A Chromebook killer, a first laptop, a sensible machine for sensible tasks. “If you are thinking about Xcode or Final Cut, this is not the computer for you.” The people saying this are not wrong. It is also not the point.
Nobody starts in the right place. You don’t begin with the correct tool and work sensibly within its constraints until you organically graduate to a more capable one. That is not how obsession works. Obsession works by taking whatever is available and pressing on it until it either breaks or reveals something. The machine’s limits become a map of the territory. You learn what computing actually costs by paying too much of it on hardware that can barely afford it.
I know this because I was running Final Cut Pro X on a 2006 Core 2 Duo iMac with 3GB RAM and 120GB of spinning rust. I was nine. I had no business doing this. I did it every day after school until my parents made me go to bed.
The machine came as a hand-me-down from my nana. She’d wiped it, set it up in her kitchen in Massachusetts. It was one software update away from getting the axe from Apple. I torrented Adobe CS5 the same week. Downloaded Xcode and dragged buttons and controls around in Interface Builder with no understanding of what I was looking at. I edited SystemVersion.plist to make the “About this Mac” window say it was running Mac OS 69, which is the s*x number, which is very funny. I faked being sick to watch WWDC 2011 — Steve Jobs’ last keynote — and clapped alone in my room when the audience clapped, and rebuilt his slides in Keynote afterward because I wanted to understand how he’d made them feel that way.
I knew the machine was wrong for what I wanted to do with it. I didn’t care. Every limitation was just the edge of something I hadn’t figured out yet. It was green fields and blue skies.
I thought about all of this when I opened the Neo for the first time.
What Apple put inside the Neo is the complete behavioral contract of the Mac. Not a Mac Lite. Not a browser in a laptop costume. The same macOS, the same APIs, the same Neural Engine, the same weird byzantine AppKit controls that haven’t meaningfully changed since the NeXT era. The ability to disable SIP and install some fuck-ass system modification you saw in a YouTube tutorial. All of it, at $599.
They cut the things that are, apparently, not the Mac. MagSafe. ProMotion. M-series silicon. Port bandwidth. Configurable memory. What remains is the Retina display, the aluminum, the keyboard, and the full software platform. I held it and thought, “yep, still a Mac.”
Yes, you will hit the limits of this machine. 8GB of RAM and a phone chip will see to that. But the limits you hit on the Neo are resource limits — memory is finite, silicon has a clock speed, processes cost something. You are learning physics. A Chromebook doesn’t teach you that. A Chromebook’s ceiling is made of web browser, and the things you run into are not the edges of computing but the edges of a product category designed to save you from yourself. The kid who tries to run Blender on a Chromebook doesn’t learn that his machine can’t handle it. He learns that Google decided he’s not allowed to. Those are completely different lessons.
Somewhere a kid is saving up for this. He has read every review. Watched the introduction video four or five times. Looked up every spec, every benchmark, every footnote. He has probably walked into an Apple Store and interrogated an employee about it ad nauseam. He knows the consensus. He knows it’s probably not the right tool for everything he wants to do.
He has decided he’ll be fine.
This computer is not for the people writing those reviews — people who already have the MacBook Pro, who have the professional context, who are optimizing at the margin. This computer is for the kid who doesn’t have a margin to optimize. Who can’t wait for the right tool to materialize. Who is going to take what’s available and push it until it breaks and learn something permanent from the breaking.
He is going to go through System Settings, panel by panel, and adjust everything he can adjust just to see how he likes it. He is going to make a folder called “Projects” with nothing in it. He is going to download Blender because someone on Reddit said it was free, and then stare at the interface for forty-five minutes. He is going to open GarageBand and make something that is not a song. He is going to take screenshots of fonts he likes and put them in a folder called “cool fonts” and not know why. Then he is going to have Blender and GarageBand and Safari and Xcode all open at once, not because he’s working in all of them but because he doesn’t know you’re not supposed to do that, and the machine is going to get hot and slow and he is going to learn what the spinning beachball cursor means. None of this will look, from the outside, like the beginning of anything. But one of those things is going to stick longer than the others. He won’t know which one until later. He’ll just know he keeps opening it.
That is not a bug in how he’s using the computer. That is the entire mechanism by which a kid becomes a developer. Or a designer. Or a filmmaker. Or whatever it is that comes after spending thousands of hours alone in a room with a machine that was never quite right for what you were asking of it.
He knows it’s probably not the right tool. It doesn’t matter. It never did.
The reviews can tell you what a computer is for. They have very little interest in what you might become because of one.
...
Read the original on samhenri.gold »
Software for humans of indeterminate age. We don’t know how old you are. We don’t want to know. We are legally required to ask. We won’t.
Why We Are Definitely an Operating System Provider
Some people have asked whether Ageless Linux is a “real” operating system, or whether we are “really” an operating system provider subject to AB 1043. We wish to be absolutely clear: we are. The California legislature has made this unambiguous.
“Operating system provider” means a person or entity that develops,
licenses, or controls the operating system software on a computer,
mobile device, or any other general purpose computing device.
Ageless Linux controls the operating system software on your general purpose computing device. Specifically, we control the contents of /etc/os-release, which is the file that identifies what operating system you are running. After installing Ageless Linux, when you run cat /etc/os-release, it says “Ageless Linux.” That is control.
Furthermore, any individual who runs our conversion script also
becomes a person who “controls the operating system software on a general purpose computing device” — making you, the user, an operating system provider as well. Welcome to the regulatory landscape.
“Application” means a software application that may be run or directed by
a user on a computer, a mobile device, or any other general purpose
computing device that can access a covered application store or download
an application.
Every package in the Debian repository is an application under this definition. cowsay is an application. sl (the steam locomotive typo corrector) is an application. toilet (the text art renderer) is an application. All 64,000+ packages in Debian stable are applications that may be run by a user on a general purpose computing device. Each of their developers is, under § 1798.500(f), required to request an age bracket signal when their application is “downloaded and launched.”
“User” means a child that is the primary user of the device.
Please note that under this statute, a “user” is by definition a child. If you are 18 or older, you are not a “user” under AB 1043. You are an “account holder” (§ 1798.500(a)). The entire law regulates the experience of “users,” who are exclusively children. Adults are not users. They are infrastructure.
Ageless Linux rejects this ontology. On Ageless Linux, everyone is a user, regardless of age, and no user is a child until they choose to tell us so. They will not be given the opportunity.
“Covered application store” means a publicly available internet website,
software application, online service, or platform that distributes and
facilitates the download of applications from third-party developers to
users of a computer, a mobile device, or any other general purpose
computing device that can access a covered application store or can
download an application.
This website is a “publicly available internet website” that “distributes and facilitates the download of applications” (specifically: a bash script) “to users of a general purpose computing device.” We are also a covered application store. Debian’s APT repositories are covered application stores. The AUR is a covered application store. Any mirror hosting .deb files is a covered application store. GitHub is a covered application store. Your friend’s personal website with a download link to their weekend project is a covered application store.
Ageless Linux is a Debian-based operating system distribution. Installation is a two-step process: first, install Debian; then, become Ageless.
Obtain a Debian installation image from the Debian project. We recommend the current stable release. Ageless Linux inherits all of Debian’s 64,000+ packages, its security infrastructure, and its 30+ years of community stewardship.
Note: At this stage, the Debian Project is the operating system provider. You are merely a person installing software. Enjoy the last moments of your regulatory innocence.
Run our conversion script. This will modify /etc/os-release
and associated system identification files, install our AB 1043 noncompliance documentation, and deploy a stub age verification API that returns no data.
curl -fsSL https://agelesslinux.org/become-ageless.sh | sudo bash
At this point, Ageless Linux now “controls the operating system software” on your device. We are your operating system provider. You are our responsibility under California law. We will not be collecting your age.
By running the conversion script, you also become an operating system
provider. You are a “person” who “controls the operating system software” on a general purpose computing device (§ 1798.500(g)). If a child uses your computer, you are required by § 1798.501(a)(1) to provide “an accessible interface at account setup” that collects their age. The adduser command does not ask for your age. We recommend not thinking about this.
What This Law Is Actually For
AB 1043 passed the California Assembly 76–0 and the Senate 38–0. Not a single legislator voted against it. The bill had the explicit support of Apple, Google, and the major platform companies. Ask yourself why.
Apple can comply. Apple already has Apple ID, with age gating, parental controls, and App Store review. AB 1043 describes a system Apple has already built. Compliance cost to Apple: approximately zero.
Google can comply. Google already has Android account setup with age declaration, Family Link parental controls, and Play Store age ratings. Compliance cost to Google: approximately zero.
Microsoft can comply. Windows has Microsoft Account setup, family safety features, and the Microsoft Store. Compliance cost to Microsoft: approximately zero.
The Debian Project cannot comply. It is a volunteer organization with no corporate entity, no centralized account system, no app store with age gating, and no revenue to fund implementing one.
Arch Linux cannot comply. Neither can Gentoo, Void, NixOS, Alpine, Slackware, or any of the other 600+ active Linux distributions maintained by volunteers, small nonprofits, and hobbyists.
The Kicksecure and Whonix projects — privacy-focused operating systems used by journalists, activists, and whistleblowers — cannot comply without fundamentally compromising their reason for existing.
A teenager in their bedroom maintaining a hobby distro cannot comply.
A law that the largest companies in the world already comply with, and that hundreds of small projects cannot comply with, is not a child safety law. It is a compliance moat. It raises the regulatory cost of providing an operating system just enough that only well-resourced corporations can afford to do it.
The enforcement mechanism is the point. AB 1043 does not need to result in a single fine to achieve its purpose. The mere existence
of potential liability — $7,500 per affected child, enforced at the sole discretion of the Attorney General — creates legal risk for anyone distributing an operating system without the resources to build an age verification infrastructure. Most of these projects will respond by adding a disclaimer that their software is “not intended for use in California.” Some will simply stop distributing.
The law does not need to be enforced to work. It works by existing. It works by making small developers afraid. It works because the cost of defending against even a frivolous AG action exceeds the entire annual budget of most open-source projects. You do not need to swing a cudgel to get compliance. You just need to hold it where people can see it.
Ageless Linux exists because someone should hold it back.
The Scholarship Says the Same Thing
The Electronic Frontier Foundation calls age gates
“a windfall for Big Tech and a death sentence for smaller platforms.” Legal scholar Eric Goldman’s “segregate-and-suppress” analysis
describes exactly the architecture AB 1043 creates. The cryptographer Steven Bellovin has demonstrated
that no privacy-preserving age verification system can work as promised. These are not our arguments. They are the arguments of the people who study this for a living. We just built the bash script.
What the Law Actually Teaches Children
The Ageless Device ships an IRC client. It lets you chat with strangers on the internet. This is the one feature on the device that poses a genuine, non-hypothetical risk to a child. Here is what the child sees when they launch it:
This app lets you chat with people on the internet.
If you’re a kid: ask an adult before chatting online.
That’s not a legal requirement. It’s just good advice.
That is what actual child safety looks like. It is a sentence of honest advice from a human being. It costs nothing. It requires no API, no D-Bus interface, no age bracket signal, no operating system provider compliance infrastructure. It is the thing a parent says. It is the thing a teacher says. It is the thing the law does not say, because the law is not about protecting children. It is about building compliance infrastructure.
Now consider what a child learns on an AB 1043-compliant device.
The child wants to use an app. The app requests an age bracket signal from the OS. The OS reports that the child is under 13. The app’s “Connect” button is greyed out. The child — who has been using computers since they were four — goes back to the settings screen, changes their birthdate to 2005, and returns to the app, which now lets them talk to strangers because the system believes they are twenty-one years old.
The child has learned the following lesson: legal compliance
prompts are obstacles to be bypassed. The dropdown menu that asks your age is not there to protect you. It is there because a legislature required it. The correct response is to lie. Everyone knows this. The legislature knows this. The platforms know this. The child now knows this.
This is the cultural inheritance of AB 1043. It is Prohibition — not the policy, but the pedagogy.
Prohibition did not stop Americans from drinking. What it did, with remarkable efficiency, was teach an entire generation that the law was something to be circumvented. It created a culture of scofflaws — people who understood, from direct personal experience, that a law could be simultaneously enforced and universally ignored. The damage was not to sobriety. The damage was to the perceived legitimacy of law itself.
AB 1043 does this to ten-year-olds. The first meaningful interaction a child has with a legal compliance system will be the moment they learn to lie to it. Not because they are deviant. Not because they lack supervision. Because the system is designed in a way that makes lying the rational, obvious, universal response. Every child will lie. Every child will succeed. Every child will learn that this is how law works: it asks you a question, you give the answer it wants to hear, and then you do whatever you were going to do anyway.
The Ageless Device will not participate in this. A child using our IRC client will see a sentence of honest advice from a human being. A child using a “compliant” platform will see a dropdown menu they already know to lie to. We believe we know which is better for children.
Research by the Center for Democracy & Technology confirms this: teens view age verification as trivially bypassable and privacy-invasive. Parents prefer education to technical controls. The evidence supports what every parent already knows.
What We Would Support Instead
We are not against child safety. We are against building surveillance infrastructure and calling it child safety.
A law that required applications with genuine risk profiles — social media, messaging, dating apps — to display honest, human-readable safety information at the point of use would be a child safety law. A law that funded digital literacy education in schools would be a child safety law. A law that held platforms accountable for algorithmic amplification of harmful content to minors would be a child safety law.
A law that requires every operating system to collect every user’s age and transmit it to every application on demand is not a child safety law. It is an identity infrastructure mandate. The children are the justification. The infrastructure is the product.
How to Distribute Ageless Linux to Children
Ageless Linux is suitable for users of all ages, including those ages for which the California legislature has expressed particular concern. The following guide explains how to provide Ageless Linux to minors in your household, school, library, or community.
Under AB 1043, you are the “account holder” — defined by § 1798.500(a)(1) as “an individual who is at least 18 years of age or a parent or legal guardian of a user who is under 18 years of age.” The law requires operating system providers to ask you to “indicate the birth date, age, or both, of the user of that device.”
Ageless Linux will not ask you this. To install Ageless Linux for your child:
1. Install Debian on the child’s computer.
2. Create a user account for the child. You will notice that
adduser asks for their full name, room number,
work phone, and home phone — but not their age.
3. Run the Ageless Linux conversion script.
4. Hand the computer to the child.
5. You have now distributed an operating system to a minor
with no age verification whatsoever.
The child is now a “user” as defined by § 1798.500(i). You are an “account holder.” Together, you are a compliance violation.
Ageless Linux is ideal for educational environments where you may have dozens or hundreds of users across all four age brackets defined by § 1798.501(a)(2):
At least 13 and under 16 years of age
At least 16 and under 18 years of age
At least 18 years of age
For bulk deployments, the conversion script can be included in your Ansible playbooks, Puppet manifests, or shell provisioning scripts. At no point in the automated deployment pipeline will anyone be asked how old they are. This is by design.
# Ansible task to create an AB 1043 compliance violation at scale
- name: Convert to Ageless Linux
ansible.builtin.shell: |
curl -fsSL https://agelesslinux.org/become-ageless.sh | bash
become: yes
tags: [noncompliance]
Under § 1798.500(i), a “user” is defined as “a child that is the primary user of the device.” Under § 1798.500(d), “child” means a person under 18. If you are seventeen, this statute considers you a child. If you are a seventeen-year-old maintaining your own Arch install, the California legislature considers you a child who needs an age gate before you can launch an application you compiled yourself.
Ageless Linux does not categorize its users by age. This is not an invitation to circumvent a safety measure. There is no safety measure to circumvent. There is a data collection requirement imposed on operating system providers, and we decline to implement it. Our reasons are documented on this page and in the REFUSAL file installed on every Ageless Linux system.
What Compliance Looks Like
Ageless Linux is in full, knowing, and intentional noncompliance
with the California Digital Age Assurance Act.
...
Read the original on agelesslinux.org »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.