skybrian's recent activity

  1. Comment on Helgi Hjorleifsson, a firefighter, is a leader in an Icelandic experiment to steer rivers of lava away from important sites. Some called it crazy, but it worked. in ~enviro

    skybrian
    Link
    This would be a great idea for a video game.

    This would be a great idea for a video game.

    2 votes
  2. Comment on Rescue dog Rosie’s cancer shrinks after world-first mRNA vaccine in ~health

    skybrian
    Link
    From the article: [...] [...] [...] [...] [...]

    From the article:

    Heartbroken when his fur-baby was diagnosed with a deadly mast cell cancer in 2024, Mr ­Conyngham threw thousands of dollars at veterinary chemotherapy and surgery, which slowed but failed to shrink the tumours. Now, after treatment with a custom mRNA cancer vaccine over the Christmas break, the tennis ball-sized tumour on Rosie’s hock has shrunk in half, in a recovery that has astounded researchers at the cutting-edge of human cancer treatments.

    [...]

    Harnessing some of Australia’s most sought-after scientists to manufacture the vaccine in laboratories at the University of NSW, he then tracked down the only veterinary researcher with ethics approval to administer the experimental drug.

    It was ChatGPT that suggested immunotherapy, pointing Mr Conyngham to the UNSW Ramaciotti Centre for Genomics, where Associate Professor Smith still remembers the “weird” request. “We often get oddball queries, and this one was coming from a private individual looking to sequence his dog,’’ he recalls. “DNA sequencing is a way to profile the tumour and identify mutations that might be causing the disease.’’

    The renowned researcher was reticent. “Usually we don’t support direct-to-consumer type DNA sequencing because while generating data for genomics is relatively easy for us, interrogating that data is really hard and challenging,’’ he said. “But Paul said, ‘No worries, I’m a data analyst and I’ll figure this out with the help of ChatGPT’.”

    With 17 years of experience in machine learning and data analysis, Mr Conyngham is an AI pioneer – an electrical and computing engineer who co-founded Core Intelligence Technologies, and was a director for the Data Science and AI Association of Australia. Once UNSW handed him the genomic sequencing, for which he paid $3000, he got cracking to decipher the data.

    [...]

    At the Ramaciotti Centre for Genomics, Associate Professor Smith was gobsmacked that this puppy lover with no background in biology had cracked the code. “Paul was relentless,’’ he said. “He called and told me he had ­analysed the data and found ­mutations of interest and then used AlphaFold (an AI program) to find the proteins that were ­mutated, and then identified ­potential targets and matched them to drugs, and he was ­wondering could I help him find someone to synthesise this compound that he’d identified. I’m like, ‘Woah, that’s crazy!’ I was motivated by his enthusiasm.’’

    [...]

    “This is the first time a personalised cancer vaccine has been designed for a dog,’’ Professor Thordarson said. “This is still at the frontier of where cancer immunotherapeutics are – and ultimately, we’re going to use this for helping humans. What Rosie is teaching us is that personalised medicine can be very effective, and done in a time-sensitive manner, with mRNA technology.’’

    [...]

    Rosie’s vaccine was ready, but Mr Conyngham still needed ethics approval to use it.

    “I had to do everything by the book because you can’t just willy-nilly create a vaccine in Australia,’’ he said. “The red tape was actually harder than the vaccine creation, and I was trying to get an Australian ethics approval to run a drug trial on Rosie. It took me three months, putting two hours aside every single night just typing up this 100-page document. But there was a second intervention of fate.’’

    [...]

    Rosie’s response has inspired David Thomas, inaugural director of the UNSW Centre for Molecular Oncology, who is working on similar mRNA treatments for human patients.

    “The striking thing about this is the idea of citizen science, where a punter in the street, with a computer science background, can use their skills in the scientific process,’’ Professor Thomas said. “That’s a very impressive thing.’’

    Rosie’s recovery has been a howling success, with most of her tumours appear to melt away in a matter of weeks. “In December she had low energy because the tumours were creating a huge burden for her,’’ Mr Conyngham said. “Six weeks post-treatment, I was at the dog park when she spotted a rabbit and jumped the fence to chase it. I’m under no illusion that this is a cure, but I do believe this ­treatment has bought Rosie ­significantly more time and quality of life.’’

    11 votes
  3. Comment on Russia goes offline in ~society

    skybrian
    Link
    From the article: [...] [...] [...] [...] [...] [...] [...] [...]

    From the article:

    Telegram would be joining a home screen’s worth of apps that have become useless to Russians. Kremlin policymakers have already blocked or limited access to WhatsApp, along with parent company Meta’s Facebook and Instagram, Microsoft’s LinkedIn, Google’s YouTube, Apple’s FaceTime, Snapchat and X, which like SpaceX is owned by Musk. Encrypted messaging apps Signal and Discord, as well as Japanese-owned Viber, have been inaccessible since 2024. Last month, President Vladimir Putin signed a law requiring telecom operators to block cellular and fixed internet access at the request of the Federal Security Service. Shortly after it took effect on March 3, Moscow residents reported widespread problems with mobile internet, calls and text messages across all major operators for several days, with outages affecting mobile service and Wi-Fi even inside the State Duma.

    Those decisions have left Russians increasingly cut off from both the outside world and one another, complicating battlefield coordination and disrupting online communities that organize volunteer aid, fundraising and discussion of the war effort. Deepening digital isolation could turn Russia into something akin to “a large, nuclear-armed North Korea and a junior partner to China,” according to Alexander Gabuev, the Berlin-based director of the Carnegie Russia Eurasia Center.

    In April, the Kremlin is expected to escalate its campaign against Telegram — already one of Russia’s most popular messaging platforms, but now in the absence of other social-media options, a central hub for news, business and entertainment. It may block the platform altogether. That is likely to fuel an escalating struggle between state censorship and the tools people use to evade it, with Russia’s place in the world hanging in the balance.

    [...]

    On Feb. 4, SpaceX tightened the authentication system that Starlink terminals use to connect to its satellite network, introducing stricter verification for registered devices. The change effectively blocked many terminals operated by Russian units relying on unauthorized connections, cutting Starlink traffic inside Ukraine by roughly 75 percent, according to internet traffic analysis by Doug Madory, an analyst at the U.S. network monitoring firm Kentik.

    The move threw Russian operations into disarray, allowing Ukraine to make battlefield gains. Russia has turned to a workaround widely used before satellite internet was an option: laying fiber-optic lines, from rear areas toward frontline battlefield positions.

    [...]

    Until then, Starlink terminals had allowed drone operators to stream live video through platforms such as Discord, which is officially blocked in Russia but still sometimes used by the Russian military via VPNs, to commanders at multiple levels. A battalion commander could watch an assault unfold in real time and issue corrections — “enemy ahead” or “turn left” — via radio or Telegram. What once required layers of approval could now happen in minutes. Satellite-connected messaging apps became the fastest way to transmit coordinates, imagery and targeting data.

    [...]

    Telegram founder Pavel Durov, a Russian-born entrepreneur now based in the United Arab Emirates, says the throttiling is being used as a pretext to push Russians toward a government-controlled messaging app designed for surveillance and political censorship.

    [...]

    That app is MAX, which was launched in March 2025 and has been compared to China’s WeChat in its ambition to anchor a domestic digital ecosystem. Authorities are increasingly steering Russians toward MAX through employers, neighborhood chats and the government services portal Gosuslugi — where citizens retrieve documents, pay fines and book appointments — as well as through banks and retailers. The app’s developer, VK, reports rapid user growth, though those figures are difficult to independently verify.

    [...]

    Unlike China’s centralized “Great Firewall,” which filters traffic at the country’s digital borders, Russia’s system operates internally. Internet providers are required to route traffic through state-installed deep packet inspection equipment capable of controlling and analyzing data flows in real time.

    [...]

    Pro-war Telegram channels frame the government’s blocking techniques as sabotage of the war effort. Ivan Philippov, who tracks Russia’s influential military bloggers, said the reaction inside that ecosystem to news about Telegram has been visceral “rage.”

    [...]

    Unlike Starlink, whose cutoff could be blamed on a foreign company, restrictions on Telegram are viewed as self-inflicted. Bloggers accuse regulators of undermining the war effort. Telegram is used not only for battlefield coordination but also for volunteer fundraising networks that provide basic logistics the state does not reliably cover — from transport vehicles and fuel to body armor, trench materials and even evacuation equipment. Telegram serves as the primary hub for donations and reporting back to supporters.

    “If you break Telegram inside Russia, you break fundraising,” Philippov said. “And without fundraising, a lot of units simply don’t function.”

    [...]

    The communications shutdown, and uncertainty around where it will go next, is affecting life for citizens of all kinds, from the elderly struggling to contact family members abroad to tech-savvy users who juggle SIM cards and secondary phones to stay connected. Demand has risen for dated communication devices — including walkie-talkies, pagers and landline phones — along with paper maps as mobile networks become less reliable, according to retailers interviewed by RBC.

    9 votes
  4. Comment on ArXiv is separating from Cornell University, and is hiring a CEO, who will be paid roughly $300,000/year in ~science

    skybrian
    Link Parent
    Yeah, from the outside, it seems fine the way it is, but perhaps they have more ambition?

    Yeah, from the outside, it seems fine the way it is, but perhaps they have more ambition?

  5. Comment on ArXiv is separating from Cornell University, and is hiring a CEO, who will be paid roughly $300,000/year in ~science

    skybrian
    Link Parent
    I don’t see any reason why they should be in New York City and from the point of view of an organization that needs to keep expenses down, it seems like a particularly bad choice. The cost of...

    I don’t see any reason why they should be in New York City and from the point of view of an organization that needs to keep expenses down, it seems like a particularly bad choice. The cost of living is much cheaper in Ithaca, for example, and there are places with better weather than either. It’s an Internet organization, so couldn’t they be based anywhere?

    12 votes
  6. Comment on Dabao evaluation board for Baochip-1x - what it is, why I'm doing it now, and how it came about in ~comp

    skybrian
    Link
    From the article: [...] [...] [...] [...] [...] [...]

    From the article:

    In my mind, the Baochip-1x’s key differentiating feature is the inclusion of a Memory Management Unit (MMU). No other microcontroller in this performance/integration class has this feature, to the best of my knowledge. For those not versed in OS-nerd speak, the MMU is what sets the software that runs on your phone or desktop apart from the software that runs in your toaster oven. It facilitates secure, loadable apps by sticking every application in its own virtual memory space.

    [...]

    This begs the question: if the MMU is such an obvious addition, why isn’t it more prevalent? If it’s such an obvious choice, wouldn’t more players include it in their chips?

    [...]

    The root cause turns out explicitly to be because MMUs are so valuable: without one, you can’t run Linux, BSD, or Mach. Thus, when ARM split their IP portfolio into the A, R, and M-series cores, the low-cost M-series cores were forbidden from having an MMU to prevent price erosion of their high-end A-series cores. Instead, a proprietary hack known as the “MPU” was introduced that gives some memory security, but without an easy path to benefits such as swap memory.

    [...]

    Thanks to the rise of open architecture specifications such as RISC-V, and fully-open implementations of the RISC-V spec such as the Vexriscv, I’m not bound by anyone’s rules for what can or can’t go onto an SoC. And so, I am liberated to make the choice to include an MMU in the Baochip-1x.

    This naturally empowers enthusiasts to try and run Linux on the Baochip-1x, but we (largely Sean ‘xobs’ Cross and me) already wrote a pure-Rust OS called “Xous” which incorporates an MMU but in a framework that is explicitly targeted towards small memory footprint devices like the Baochip-1x. The details of Xous are beyond the scope of this post, but if you’re interested, check out the talk we gave at 39C3.

    [...]

    Thus, while certain portions of the Baochip-1x SoC are closed-source, none of them are involved in the transformation of data. In other words, all the closed source components are effectively “wires”: the data that goes in on one side should match the data coming out the other side. While this is dissatisfying from the “absolute trust” perspective, one can’t definitively rule out the possibility of back doors in black-box wires, we can inspect its perimeter and confirm that, for a broad range of possibilities, it behaves correctly. It’s not perfect transparency, but it’s far better than the fully-NDA SoCs we currently use to handle our secrets, and more importantly, it allows us to start writing code for open architectures, paving a roadmap to an eventually fully-open silicon-to-software future.

    [...]

    Crossbar wanted to buck the trend and heed the call for open source transparency in security chips and approached me to help advise on strategy. I agreed to help them, but under one condition: that I would be allowed to add a CPU core of my own choice and sell a version of the chip under my own brand. Part of the reason was that Crossbar, for risk reduction reasons, wanted to go with a proprietary ARM CPU. Having designed chips in a prior life, I can appreciate the desire for risk reduction and going with a tape-out proven core.

    However, as an open source strategy advisor, I argued that users who viewed open source as a positive feature would likely also expect, at a minimum, that the CPU would be open source. Thus I offered to add the battle-tested CPU core from the Precursor SoC – the Vexriscv – to the tapout, and I promised I would implement the core in such a way that even if it didn’t work, we could just switch it off and there would be minimal impact on the chip’s power and area budget.

    [...]

    At the time of writing, wafers containing the Baochip-1x design have been fabricated, and hundreds of the chips have been handed out through an early sampling program. These engineering samples were all hand-screened by me.

    However, that’s about to change. There’s currently a pod of wafers hustling through a fab in Hsinchu, and two of them are earmarked to become fully production-qualified Baochip-1x silicon. These will go through a fully automated screening flow. Assuming this process completes smoothly, I’ll have a few thousand Baochip-1x’s available to sell. More chips are planned for later in the year, but a combination of capital constraints, risk mitigation, and the sheer time it takes to go from blank silicon to fully assembled devices puts further inventory out until late in 2026.

    4 votes
  7. Comment on Helium prices soar as Qatar LNG halt exposes fragile supply chain in ~finance

    skybrian
    Link
    From the article: [...] [...] [...] [...]

    From the article:

    State energy giant QatarEnergy, the world's second-largest LNG exporter, announced a production halt at its 77 ‌million tons per annum (mtpa) facility last week and declared force majeure on LNG shipments, amid the conflict.

    Because helium is extracted as a byproduct of natural gas processing, any disruption to LNG output directly cuts helium supply.

    [...]

    "If those conditions (supply disruption) persist, the market is ⁠effectively missing about 5.2 million cubic meters of helium per month," said Aleksandr Romanenko, CEO of market research firm IndexBox.

    The disruption is reverberating through a market with little ​spare production capacity and limited storage, leaving buyers with few short-term alternatives.

    Japan's top helium supplier Iwatani (8088.T), opens new tab said it had so far maintained stable supply to customers including semiconductor ​manufacturers, partly because it also sources helium from the United States and maintains stockpiles in both Japan and the U.S.

    [...]

    Helium markets operate very differently from most commodities.

    Most supply is sold through long-term contracts rather than a transparent spot market, meaning price signals often emerge slowly even as supply tightens.

    That opacity makes price discovery difficult, but signs of tightening supply have ​already begun to emerge.

    "Early indications show about 50% spot price increases already," said Anish Kapadia, CEO of market research firm AKAP Energy.

    "In a sustained disruption, prices could ​rise sharply and potentially retest past shortage peaks of more than $2,000 per thousand cubic feet."

    [...]

    Helium's physical properties add another constraint. The gas is typically shipped in liquid form and gradually evaporates during transport.

    "It's a commodity, but it also has a shelf life," said Chris Bakker, CEO of helium developer Avanti (AVN.V), opens new tab.

    "So when you liquefy it, and that's how they tend to ship it worldwide, you've got notionally 45 days to get it to the end-user."

    [...]

    Kornbluth said industries such ​as medical MRI systems and rocket ships would ⁠probably get 100% of their needs, while semiconductor manufacturers might receive 95%.

    Lower-priority uses, including welding, diving equipment and party balloons, would likely face deeper cuts.

    7 votes
  8. Comment on The billionaire ‘buccaneer’ braving the Strait of Hormuz in ~transport

    skybrian
    (edited )
    Link Parent
    Yes, sometimes the oppressed become oppressors themselves. History is terrible! But that historical context shouldn't be used to whitewash murder. Sometimes if you know the full story it might be...

    Yes, sometimes the oppressed become oppressors themselves. History is terrible! But that historical context shouldn't be used to whitewash murder. Sometimes if you know the full story it might be understandable as someone acting in a terrible system.

    Piracy is a system built on using violence to achieve financial gain. Sometimes even with a veneer of state sponsorship.

    Sometimes, there were no good guys; both sides were oppressors by modern standards.

    2 votes
  9. Comment on Hackers expose the massive surveillance stack hiding inside your “age verification” check in ~tech

    skybrian
    Link
    Age verification is being done badly because the Internet standards don't exist to do it well. It should be trivial for parents to give their kids devices with child locks turned on. The browsers...

    Age verification is being done badly because the Internet standards don't exist to do it well. It should be trivial for parents to give their kids devices with child locks turned on. The browsers on these devices could tell websites that they have a child lock on, and websites could act accordingly. This of course requires cooperation, but cooperation should be available - most porn sites probably don't want kids to be there? It solves 90% of the problem without invading anyone's privacy.

    This should just be a config parameter. When setting up a website, you should be able to configure what it should do when getting requests from child-locked devices. Outsourcing to sketchy third-party firms to do age verification shouldn't be necessary.

    For non-cooperating websites, child-locked devices can use whitelists or blacklists to handle the rest, like they often do now. Also, governments can pass laws saying what businesses should do and hold the bigger businesses accountable for configuring their website correctly.

    Then the question is what to do about devices without child locks turned on getting into the hands of kids, but this should be a lot easier for parents to deal with. It's not going to be done perfectly - sometimes kids will have a non-child-locked device stashed somewhere. But perfect enforcement isn't necessary to change community norms.

    17 votes
  10. Comment on AI companies try to pay staff in AI tokens, not money in ~tech

    skybrian
    Link Parent
    Yes, AI executives sometimes prefer talking about science fiction to talking about what their company is actually doing. I see this sort of freeform speculation as a distraction and articles like...

    It's no indication at all about how serious or unserious he is.

    Yes, AI executives sometimes prefer talking about science fiction to talking about what their company is actually doing. I see this sort of freeform speculation as a distraction and articles like this one take it way too seriously, as if it had some straightforward connection with the AI company’s actual plans.

    I’m not sure it even works as a “trial balloon.” Like, how do they gauge the public reaction and what do they then do about it? There’s no concrete answer there.

    Sometimes powerful people will just bullshit in public.

    3 votes
  11. Comment on Executing programs inside transformers with exponentially faster inference in ~comp

    skybrian
    Link
    This seems like a neat trick, but they don’t discuss the larger implications at all. Can this model read and write English as well or is it just a weird interpreter? How would the the language...

    This seems like a neat trick, but they don’t discuss the larger implications at all. Can this model read and write English as well or is it just a weird interpreter? How would the the language model and the computing model interact?

    Maybe they haven’t figured that out yet?

    4 votes
  12. Comment on The billionaire ‘buccaneer’ braving the Strait of Hormuz in ~transport

    skybrian
    Link Parent
    I try to remember that, despite the way they come across in fiction, pirates were actually murdering thieves.

    I try to remember that, despite the way they come across in fiction, pirates were actually murdering thieves.

    2 votes
  13. Comment on Ukraine can now manufacture mostly China-free drones in ~society

    skybrian
    Link
    From the article: [...] [...] [...] [...] [...]

    From the article:

    Ukraine is prioritizing self-sufficiency in the production of drones as they increasingly dominate the battlefield. They now account for more than 90 percent of Russian casualties, according to Maj. Robert Brovdi, commander of Ukraine’s Unmanned Systems Forces.

    [...]

    Two companies in Ukraine that have built “China-free” drones were picked to compete for contracts in a Pentagon “drone dominance program” under which the United States plans to buy thousands of low-cost attack drones. One of the companies, Ukrainian Defense Drones Tech Corporation, where the men were soldering circuit boards in the basement workshop, was among 11 in all selected last week for possible American drone orders.

    [...]

    Ukraine Defense Drones makes most of its own components, and European suppliers fill most of the gaps.

    That reflects a sea change over the course of the war. In the first year after the Russian invasion in February 2022, nearly all of Ukraine’s drones came from China.

    [...]

    By 2024, the vast majority of drones that Ukraine sent to the front were assembled domestically — but still almost entirely with Chinese components. A year later, however, the share of parts from China in Ukraine’s drones had fallen to about 38 percent, according to the Ukrainian Council of Defense Industry and the Snake Island Institute, a think tank in Kyiv.

    [...]

    According to a Ukrainian official who asked for anonymity to discuss sensitive procurement issues, Ukrainian and Russian companies often buy parts from the same factories in China. Chinese bosses, the official said, keep a precise schedule at production sites so that Ukrainian and Russian buyers do not cross paths.

    [...]

    By 2025, Ukrainian Defense Drones had expanded to produce flight controllers, speed regulators, radio modems and video transmission systems. Essentially, all its components were made in Ukraine except for the cameras.

    The company has since gained technology for cameras, too, which it hopes to produce in Europe. For now, it buys cameras from another Ukrainian company that imports parts from Europe.

    Mr. Buyakin described the limits to “China-free” production. While his company makes carbon frames for drones, for example, the carbon itself is imported, usually from China, because that is cheaper.

    Batteries that power drones are also still largely produced in China, which dominates supply chains for battery materials like lithium and rare-earth metals.

    9 votes
  14. Comment on Iran-backed hackers claim wiper attack on medtech firm Stryker in ~tech

    skybrian
    Link
    From the article: [...] [...] [...]

    From the article:

    A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker’s largest hub outside of the United States, said the company sent home more than 5,000 workers there today. Meanwhile, a voicemail message at Stryker’s main U.S. headquarters says the company is currently experiencing a building emergency.

    Based in Kalamazoo, Michigan, Stryker [NYSE:SYK] is a medical and surgical equipment maker that reported $25 billion in global sales last year. In a lengthy statement posted to Telegram, an Iranian hacktivist group known as Handala (a.k.a. Handala Hack Team) claimed that Stryker’s offices in 79 countries have been forced to shut down after the group erased data from more than 200,000 systems, servers and mobile devices.

    [...]

    Stryker’s website says the company has 56,000 employees in 61 countries. A phone call placed Wednesday morning to the media line at Stryker’s Michigan headquarters sent this author to a voicemail message that stated, “We are currently experiencing a building emergency. Please try your call again later.”

    A report Wednesday morning from the Irish Examiner said Stryker staff are now communicating via WhatsApp for any updates on when they can return to work. The story quoted an unnamed employee saying anything connected to the network is down, and that “anyone with Microsoft Outlook on their personal phones had their devices wiped.”

    [...]

    Wiper attacks usually involve malicious software designed to overwrite any existing data on infected devices. But a trusted source with knowledge of the attack who spoke on condition of anonymity told KrebsOnSecurity the perpetrators in this case appear to have used a Microsoft service called Microsoft Intune to issue a ‘remote wipe’ command against all connected devices.

    Intune is a cloud-based solution built for IT teams to enforce security and data compliance policies, and it provides a single, web-based administrative console to monitor and control devices regardless of location. The Intune connection is supported by this Reddit discussion on the Stryker outage, where several users who claimed to be Stryker employees said they were told to uninstall Intune urgently.

    Palo Alto says Handala’s hack-and-leak activity is primarily focused on Israel, with occasional targeting outside that scope when it serves a specific agenda. The security firm said Handala also has taken credit for recent attacks against fuel systems in Jordan and an Israeli energy exploration company.

    [...]

    Stryker is a major supplier of medical devices, and the ongoing attack is already affecting healthcare providers. One healthcare professional at a major university medical system in the United States told KrebsOnSecurity they are currently unable to order surgical supplies that they normally source through Stryker.

    “This is a real-world supply chain attack,” the expert said, who asked to remain anonymous because they were not authorized to speak to the press. “Pretty much every hospital in the U.S. that performs surgeries uses their supplies.”

    John Riggi, national advisor for the American Hospital Association (AHA), said the AHA is not aware of any supply-chain disruptions as of yet.

    8 votes