> Exclusive: SpaceX says unproven AI space data centers may not be commercially viable, filing shows
> SpaceX's S-1 filing highlights risks of unproven space-based AI and interplanetary projects
journalism pet peeve: it should be illegal to put "exclusive" in your headline when the reporting is based on a public document that the company is required by law to file
It's optional, you need to do something to enable the feature that uses it. I use it for a thing I called Booster which enables this permission so I can add some fixers for some sites like youtube, personal stuff, absolutely not required.
if this is accurate, and not some "oops we made a vibe-coding mistake updating our website" I am going to hit the "cancel subscription" button so hard that my desk will break in half.
I have an unlimited-usage API billing plan through my dayjob, but for obvious reasons they don't allow piggybacking personal usage onto that. so I paid for the $20/mo personal plan as an easy and relatively cheap method of professional development / keeping my skills current. I don't particularly mind paying $20/mo, but I'm absolutely not paying $100/mo.
also, part of the reason I didn't mind paying for the personal subscription is that I liked having consistency between the tools I use for my dayjob and the ones I use for side projects. if that goes away, then I might as well switch away from Claude usage at work as well. I very much doubt Anthropic's revenue predictions for this change are taking things like that into account.
making a change like this without an announcement, just sneaky updates to product pages, is also an absolutely unforgivable thing to do, in terms of me trusting them as a company.
> To understand better the ADHD symptomatology experienced by adults, qualitative interviews were conducted with 11 diagnosed adults.
as someone diagnosed & medicated for ADHD, a lot of these additional symptoms ring true for me...but this is essentially a blog post based on interviewing 11 people.
> House managers are not a nanny or a house cleaner. They’re a “chief of staff for the home,” a “personal assistant for Mom,” and “a clone of myself,” according to the more than a dozen people I spoke with who have either hired one or work as one. They are, in effect, what might have once been called a housekeeper—a person who helps oversee a household’s basic functioning.
hiring a (rebranded) housekeeper is a "life hack" now?
I wonder if the Atlantic will pay me to write an article about a life hack that allows you to avoid cooking dinner at home - you go to a building called a "restaurant" and pay them to cook food for you.
WPA3 was announced in 2018 [0]. I don't think it's reasonable to blame them for not anticipating the next decade of cryptographic research.
...but even if they had, what realistically could they have done about it? ML-KEM was only standardized in 2024 [1].
also, the addition of ECDH in WPA3 was to address an existing, very real, not-theoretical attack [2]:
> WPA and WPA2 do not provide forward secrecy, meaning that once an adverse person discovers the pre-shared key, they can potentially decrypt all packets encrypted using that PSK transmitted in the future and even past, which could be passively and silently collected by the attacker. This also means an attacker can silently capture and decrypt others' packets if a WPA-protected access point is provided free of charge at a public place, because its password is usually shared to anyone in that place.
Does it matter if an attacker can decrypt public wifi traffic? You already have to assume the most likely adversary (e.g. the most likely to sell your information) is the entity running the free wifi, and they can already see everything.
It is precisely because the operator of the wifi is not necessarily the adversary a user may be most concerned about. They may be, but they are not the only one. They are the one you know can be, but they aren't the only one.
> You already have to assume the most likely adversary is the entity running the free wifi
why do you have to assume that?
you're at Acme Coffeeshop. their wifi password is "greatcoffee" and it's printed next to the cash register where all customers can see it.
with WPA2 you have to consider N possible adversaries - Acme Coffee themselves, as well as every single other person at the coffeeshop.
...and also anyone else within signal range of their AP. maybe I live in an apartment above the coffeeshop, and think "lol it'd be fun to collect all that traffic and see if any of it is unencrypted".
with WPA3 you only have to consider the single possible adversary, the coffeeshop themselves.
Because it's a near certainty (at least in the US) that businesses will spy on you to the extent that they can, but it's actually incredibly rare to be around a nerd with Wireshark? Things like facebook used to not use https long after public wifi was ubiquitous and you could easily sniff people, and it basically didn't matter. Now nearly everything uses TLS so it really doesn't matter. Actually most public wifi I encounter has no security.
> Actually most public wifi I encounter has no security.
that was also one of the things fixed [0] in WPA3.
it sounds like you don't consider it relevant to your personal threat model. but the experts in charge of the standard apparently thought it was important to have in general.
there seems to be a significant disconnect between the claims in this press release / blog post and the actual reality if you look at the GitHub repo.
starting from the very first words of the announcement:
> Open-source and self-hostable
meanwhile, the readme [0] has a caveat, added today, about how it's only kinda-sorta self-hostable:
> While we eventually plan to make Thunderbolt fully offline-first, it currently depends on authentication and search functionality (though you can disable search on the integrations screen in the app). You can deploy your own backend with Docker and sign up in order to test it locally.
and if you follow the link to the self-hosting instructions [1] there's another caveat that was added today:
> Under active development — not production ready. Thunderbolt is currently undergoing a security audit and preparing for enterprise production readiness. These deployment paths are provided for evaluation and early testing. Do not use in production environments.
don't tell me it's self-hostable if what you really mean is "you can run it locally for testing".
meanwhile, scroll a bit farther down in the announcement:
> Work seamlessly across devices with native applications for Windows, macOS, Linux, iOS, and Android
which is repeated on the GitHub readme:
> Available on all major desktop and mobile platforms: web, iOS, Android, Mac, Linux, and Windows.
but as pointed out in [2] this is just flat-out incorrect - there are no release artifacts published, for any platform.
come on Mozilla, you need to be better than this. you have to know your target market is engineers and tech-savvy people who see through this sort of marketing fluff.
if you want to publish an announcement saying "we're working on a thing that will eventually do X, Y, and Z" then that's great.
if you want to release something that does X, Y, and Z, that's great too.
but don't over-promise and under-deliver. don't make an announcement that this thing can do X, Y, and Z and then "clarify" that the plan is to eventually do X, Y, and Z.
You a free to inspect the yaml file which will be passed into the docker compose.
Also it is not as dramatic as it looks like as docker compose will just start containers. All the potentially malicious code will be run in containers.
in two years, everyone on Earth will eat Oreo cookies, according to a prediction by the CEO of Oreo cookies.
> But Kassovitz, 58, whose 1995 film La Haine won three César awards
cool, he won an award 31 years ago.
looking at his IMDB page [0] the most recent film he directed was in 2011.
I'm not sure that makes him a good source about where the entire worldwide film industry is going.
he's just a guy making an "AI-enabled" film and it's in his best interests to hype it up as the future.
0: https://www.imdb.com/name/nm0440913/
reply