Christ is my all
2507 stories
·
3 followers

Samsung Galaxy S26 Ultra’s Privacy Display

1 Share

Ben Schoon, writing for 9to5 Google:

When activated, Privacy Display changes how the pixels in your display emit light, making it harder or near-impossible to view the display at an off-angle. At its default setting, it definitely works, but the contents of the display are visible at less-sharp angles. Samsung has a “maximum” setting that takes this up a notch, and that setting makes it even harder to see the contents and narrows the field-of-view even further. [...]

A bigger deal, though, is that Samsung has built Privacy Display with the ability to only apply to small portions of the Galaxy S26 Ultra’s display. Specifically, it can hide your notification pop-ups. This part really impressed me, as Privacy Display is able to specifically hide only that singular portion of the display, and it does so nearly perfectly. The masking around the notification ensures the content behind isn’t affected, and the effect works incredibly well.

Neat feature, especially the way you can toggle it when needed, set it to auto-enable for specific apps, and/or work only for notifications.

See also: Allison Johnson at The Verge.

Link: 9to5google.com/2026/02/25/samsung-galaxy-s26-ultra-privacy…

Read the whole story
rtreborb
1 hour ago
reply
San Antonio, TX
Share this story
Delete

Gamer accidentally hacks into 7,000 robot vacuums all at once

1 Share

People are so concerned with AI and the rise of the machines these days, they don't realize that the real danger lies in … vacuums?

Read the whole story
rtreborb
2 hours ago
reply
San Antonio, TX
Share this story
Delete

Em dash

1 Share

I'm occasionally accused of using LLMs to write the content on my blog. I don't do that, and I don't think my writing has much of an LLM smell to it... with one notable exception:

    # Finally, do em dashes
    s = s.replace(' - ', u'\u2014')

That code to add em dashes to my posts dates back to at least 2015 when I ported my blog from an older version of Django (in a long-lost Mercurial repository) and started afresh on GitHub.

Tags: generative-ai, typography, blogging, ai, llms, python

Read the whole story
rtreborb
3 days ago
reply
San Antonio, TX
Share this story
Delete

Ring Cancels Its Partnership with Flock

1 Share

It’s a demonstration of how toxic the surveillance-tech company Flock has become when Amazon’s Ring cancels the partnership between the two companies.

As Hamilton Nolan advises, remove your Ring doorbell.

Read the whole story
rtreborb
3 days ago
reply
San Antonio, TX
Share this story
Delete

AI Found Twelve New Vulnerabilities in OpenSSL

3 Shares

The title of the post is”What AI Security Research Looks Like When It Works,” and I agree:

In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for the original discovery of all twelve, each found and responsibly disclosed to the OpenSSL team during the fall and winter of 2025. Of those, 10 were assigned CVE-2025 identifiers and 2 received CVE-2026 identifiers. Adding the 10 to the three we already found in the Fall 2025 release, AISLE is credited for surfacing 13 of 14 OpenSSL CVEs assigned in 2025, and 15 total across both releases. This is a historically unusual concentration for any single research team, let alone an AI-driven one.

These weren’t trivial findings either. They included CVE-2025-15467, a stack buffer overflow in CMS message parsing that’s potentially remotely exploitable without valid key material, and exploits for which have been quickly developed online. OpenSSL rated it HIGH severity; NIST‘s CVSS v3 score is 9.8 out of 10 (CRITICAL, an extremely rare severity rating for such projects). Three of the bugs had been present since 1998-2000, for over a quarter century having been missed by intense machine and human effort alike. One predated OpenSSL itself, inherited from Eric Young’s original SSLeay implementation in the 1990s. All of this in a codebase that has been fuzzed for millions of CPU-hours and audited extensively for over two decades by teams including Google’s.

In five of the twelve cases, our AI system directly proposed the patches that were accepted into the official release.

AI vulnerability finding is changing cybersecurity, faster than expected. This capability will be used by both offense and defense.

More.

Read the whole story
rtreborb
3 days ago
reply
San Antonio, TX
Share this story
Delete

LLMs are Getting a Lot Better and Faster at Finding and Exploiting Zero-Days

1 Comment and 2 Shares

This is amazing:

Opus 4.6 is notably better at finding high-severity vulnerabilities than previous models and a sign of how quickly things are moving. Security teams have been automating vulnerability discovery for years, investing heavily in fuzzing infrastructure and custom harnesses to find bugs at scale. But what stood out in early testing is how quickly Opus 4.6 found vulnerabilities out of the box without task-specific tooling, custom scaffolding, or specialized prompting. Even more interesting is how it found them. Fuzzers work by throwing massive amounts of random inputs at code to see what breaks. Opus 4.6 reads and reasons about code the way a human researcher would­—looking at past fixes to find similar bugs that weren’t addressed, spotting patterns that tend to cause problems, or understanding a piece of logic well enough to know exactly what input would break it. When we pointed Opus 4.6 at some of the most well-tested codebases (projects that have had fuzzers running against them for years, accumulating millions of hours of CPU time), Opus 4.6 found high-severity vulnerabilities, some that had gone undetected for decades.

The details of how Claude Opus 4.6 found these zero-days is the interesting part—read the whole blog post.

News article.

Read the whole story
rtreborb
3 days ago
reply
San Antonio, TX
Share this story
Delete
Next Page of Stories