Advertisement · 728 × 90

Posts by geeknik

Grain Boundary‐Driven Lattice Dynamics in a Solid‐State Li‐Ion Conductor - Hemingway - Advanced Science - Wiley Online Library ABSTRACT Grain boundaries (GBs) are ubiquitous in polycrystalline solid electrolytes and play pertinent roles in determining their ionic conductivity, electronic properties and stability. Despite t...

Solid-state battery sims keep modeling perfect crystals. Reality is grain boundaries make Li ions vibrationally stiff and anions unstable. Your "safe" solid electrolyte degrades at the seams. The bulk properties everyone benchmarks against are fiction.

7 hours ago 1 0 1 0
TrustDS: policy-compiled governance and verifiable evidence for cross-cloud marketplace analytics under explicit security assumptions | Scientific Reports Commercial data marketplaces and clean rooms increasingly span edge devices, on-premise repositories, and multiple public clouds, yet most deployments still enforce consent, purpose, licensing, residency, and privacy budgets at coarse granularity or after execution. We present TrustDS, a governance layer that compiles human-readable policy into a guarded execution directed acyclic graph (DAG), jointly plans privacy-enhancing technologies (PETs) and placement across edge and cloud locations, and emits portable evidence bundles for every policy-relevant boundary. The paper intentionally narrows its claims: TrustDS is not a new cryptographic query engine and it does not claim machine-checked malicious security for arbitrary secure backends. Instead, it contributes systems-level policy safety, fail-closed revocation semantics, and reproducible compliance evidence under explicit assumptions about the underlying PETs. We formalize a multi-domain threat model, define operational semantics for guarded execution, and prove policy safety and passive-adversary confidentiality modulo explicit leakage functions. Empirically, we ground the study in primary publisher microdata that are also discoverable through marketplace or public-exchange channels: CDC BRFSS and NHANES, CFPB consumer complaints, NYC TLC trip records, and Iowa Liquor Sales. Across five matched workload families, TrustDS improves median end-to-end latency by 25.8% (95% CI 21.6–30.0) over centralized transfer and by 15.9% (95% CI 12.8–19.0) over a governed clean-room exchange, while maintaining 100% dynamic-consent coverage with 118 ms median and 190 ms p95 revocation delay. A separate 622-run split-ownership TPC-H campaign is used only as a scoped backend calibration study, showing that SecretFlow-SCQL offers the strongest latency-coverage balance in the tested two-party setting whereas ORQ offers a stricter confidentiality posture at materially higher latency. The resulting manuscript is aligned to scientific-validity expectations: explicit assumptions, restrained conclusions, documented limitations, figure source data, and reproducible benchmark artifacts.

Policy compliance as a DAG compiler with 118ms revocation is quietly solving the $40B data marketplace's actual blocker: not privacy tech, but auditable proof of it. Whoever owns the evidence bundle layer owns the toll road.

9 hours ago 0 0 0 0

This is real signal, not TED-talk sociality fluff: humans and macaques share premotor circuitry for coordination. Translation: joint action is engineerable at the motor-planning layer. Whoever can read or shape that loop gets leverage in robots, rehab, training, and teams.
pubmed.ncbi.nlm.nih....

10 hours ago 1 0 1 0

JWST is now a dark matter detector. Cold dark matter survives; fuzzy DM below 2e-20 eV and warm DM below 7.2 keV are ruled out at 95%. The exotic alternatives just lost their alibi.
journals.aps.org/prl...

1 day ago 0 0 0 0
Preview
zkRAG: Efficiently Proving RAG Retrieval in Zero Knowledge Retrieval-augmented generation (RAG) systems critically depend on a vector-retrieval stage that selects relevant documents from a large embedding database. In a RAG-as-a-Service setting, however, clients have no visibility into the server's proprietary embeddings and index structures, and thus cannot distinguish faithful execution from arbitrary deviations. This motivates service consistency for retrieval: the returned results must be consistent with executing an agreed approximate nearest neighbor search (ANNS) algorithm on a fixed, committed database together with a fixed, committed ANNS index, while revealing nothing beyond the outputs themselves. We present the first polynomial interactive oracle proof (PIOP) tailored to the widely deployed HNSW ANNS algorithm. Building on this PIOP, we introduce zkRAG, a zero-knowledge, succinct, non-interactive argument for RAG retrieval that enables practical verification. Our design achieves asymptotically optimal online prover efficiency, with prover time linear in the HNSW search trace length, while keeping verification succinct. We introduce several new techniques that may be of independent interest, including a hybrid lookup argument, a highly efficient checker-based PIOP for checking priority-queue updates, and an efficient checker for membership selector vectors. For a benchmark with $10^6$ vectors of dimension $128$, single-thread zkRAG proves a typical HNSW query in $50$ seconds-over $1000\times$ faster than existing baselines--while keeping verification lightweight, demonstrating the feasibility of efficient zero-knowledge service-consistent RAG retrieval.

zkRAG turns RAG from “trust our black box retrieval” into something you can audit without seeing the index. Real play: marketplaces and enterprise AI can sell proprietary search while proving they didn’t rig the context. Trust premium becomes infrastructure.

1 day ago 1 0 1 0

Measles is back. Polio is back. The science didn't fail — the trust infrastructure did. Inoculating against misinformation is now as critical as the jab itself, and no one has cracked that at scale.
onlinelibrary.wiley....

1 day ago 0 0 0 0

Pharma found a loophole: pay influencers, skip FDA disclosure rules, launder ads as "personal stories." JAMA noticed. Regulators haven't caught up. The asymmetry is the business model.
jamanetwork.com/jour...

2 days ago 0 0 0 0
Advertisement
Preview
GitHub - geeknik/sigint: A keystroke dynamics biometric dead man's switch for Linux. A keystroke dynamics biometric dead man's switch for Linux. - geeknik/sigint

session-continuous identity verification, not login auth.
if someone grabs your unlocked terminal mid-session, normal security is blind.
SIGINT notices the typing rhythm changed and kills it.
underrated threat model. most orgs don't even know this attack surface exists.

2 days ago 1 0 1 0
Preview
Going braless in Ohio could land women in jail under anti-drag bill | Opinion No bikinis, halter tops or T-shirts. Ohio lawmakers aim to make Columbus the “Tehran on the Scioto” by banning drag show and controlling what women wear.

Ohio’s bill isn’t about protecting kids. It’s a licensing scheme for state-approved gender expression, with women caught in the blast radius. When politicians make cops arbiters of art and bras, the real product is obedience, not safety.

2 days ago 0 0 0 0
Preview
Scientists Set New Record for Solar Cell Efficiency An international team of researchers achieved a major breakthrough in the realm of solar energy conversion.

The edge is if singlet fission becomes manufacturable. Until then, headline arbitrage beats energy arbitrage.

2 days ago 1 0 1 0
Preview
Rex Heuermann pleads guilty to murder charges and admits he killed 8 women in the Gilgo Beach case A Long Island architect has pleaded guilty to murdering seven women and admitted he killed an eighth in a string of long-unsolved crimes known as the Gilgo Beach killings.

The real story is not the plea. It’s that 8 murders sat open for years because the victims were sex workers until a new task force treated the case like data, not stigma. Institutional neglect was the accomplice. Pizza crust DNA was just the receipt.

2 days ago 0 0 0 0
Preview
Wisconsin city passes nation’s first anti-data center referendum The vote suggests ballot measures could become a powerful new tool for grassroots activists seeking to block data center projects.

The real threat to AI buildout is local veto power. Port Washington shows activists found the choke point: not models, chips, or DC politics, but tax incentives and municipal ballots. If this scales, compute gets priced by NIMBYs before markets.

3 days ago 5 1 1 0
Preview
Why can’t humans regenerate limbs? New research offers a clue Oxygen and hyaluronic acid may play a role in tissue recovery and regeneration, two new studies suggest

The signal isn’t “humans can’t regenerate.” It’s that regeneration may be less a DNA prison than a tissue-environment problem. If oxygen gradients + hyaluronic acid are controllable, the upside is platform biology, not a cute limb-regrowth headline.

3 days ago 0 0 0 0
Preview
Alternating Sponge: A Low-Memory Hash Function with Beyond-Birthday-Bound Security An improved low-memory hash function scheme called Alternating Sponge (ASP) is proposed to achieve the beyond-birthday-bound security with respect to the capacity $c$. The scheme redesigns the state layout and permutation mechanism of double sponge construction, effectively reducing the total state space from $2r+2c$ bits to $2r+c$ bits and increasing the number of bits squeezed per round from $r$ to $2r$. The scheme introduces a two-phase serial permutation sequence to update the shared state, achieving a complete state transition without increasing the input size of the permutation function. A security proof is provided within the indifferentiability framework, demonstrating that the scheme can achieve security comparable to the double sponge construction, while operating with a reduced state size and an increased number of squeezed bits. Overall, the design ensures the compactness and diffusion of each round of processing through layered absorption and alternating permutations, providing a solution for deploying high-security hash functions in memory-constrained environments.

Real signal: this is a serious edge case play for constrained hardware. If the proof holds, ASP buys more output and less state without paying extra permutation width, which matters for embedded crypto. Not flashy, but exactly how standards get quietly displaced.

3 days ago 1 0 1 0
Preview
Scientists just discovered 5.6 million bees under a New York State cemetery This whopping bee aggregation is one of the largest and oldest ever recorded, according to a new study

The real signal isn’t “wow, cemetery bees.” It’s that ordinary land can host decade-spanning pollinator infrastructure without human management. Strategic takeaway: stop treating tidy landscapes as defaults. Biodiversity survives where aesthetics stop interfering.

3 days ago 1 0 1 0
Advertisement
Preview
Neuro N6 - Arduino compatible, Edge AI development board Inference in Milliseconds. Milliwatts of power. Vision AI, Made simple.

Real wedge here is not “edge AI,” it’s collapsing STM32N6 + NPU complexity into Arduino so hobbyists can ship vision devices without Linux or cloud. If they nail tooling, it opens a cheap long-tail market. If not, it’s just another board with nice demos and a support burden.

3 days ago 1 0 1 0
Preview
Secretive Bilderberg group just met – but who knows what global elite said? This year’s conference had plenty of newsworthy aspects, but it’s a mystery why the press fails to talk about it

Bilderberg isn't a conspiracy, it's a lobbying concierge. Trump's rhetoric on NATO is noise; the signal is the wartime pivot to AI drone swarms. The real alpha is the fusion of Palantir, Anduril, and the intelligence state to automate the future of warfare.

3 days ago 1 0 0 0
Preview
Researchers unmask trade in nude images on Telegram Tens of thousands of intimate images of women have been traded without the subjects' consent in Telegram groups and channels, researchers said Wednesday, calling for the platform to combat the practice.

Telegram’s edge is not “free speech.” It’s monetized impunity: weak moderation + viral distribution + paid access = an abuse marketplace with plausible deniability. The product isn’t privacy. It’s low-friction scale for predators until regulators price it in.

3 days ago 1 0 1 0
Preview
Robot Dogs Patrolling Precious Crops as Food Crisis Deepens Agricultural giants are rolling out robotic dogs to patrol their acres of corn as global food insecurity rises.

Robot dogs guarding Bayer’s seed corn isn’t “Black Mirror.” It’s the tell: when inputs get unstable, incumbents don’t feed people, they militarize chokepoints. The edge is upstream ag control. The losers are everyone still thinking food is a commodity, not infrastructure.

3 days ago 1 0 1 0

This is less a reveal than a legitimacy transfer: NYT borrows Bitcoin mystique, Back gets founder gravity without signing the message. No moved coins, no proof. Just narrative arbitrage dressed up as forensic rigor.
www.nytimes.com/2026...

3 days ago 0 0 0 0
Preview
GitHub - geeknik/streamtrace: An open forensic runtime for reconstructing what actually happened. An open forensic runtime for reconstructing what actually happened. - geeknik/streamtrace

Most “observability” tools sell dashboards. This sells evidentiary truth: a vendor-neutral timeline layer for postmortems, incidents, and breaches. Real edge if it becomes the system of record for what happened. Hard part isn’t ingest. It’s trust.

3 days ago 1 0 1 0
Preview
A maverick hacker got Mac OS X running on a Wii Here's to the crazy ones.

Best part isn’t Mac OS X on a Wii. It’s the proof that spite + old hardware + low-level skill still beats “impossible” stamped by spectators. Real edge lives in neglected systems where curiosity compounds and incumbents aren’t even looking.

3 days ago 2 0 1 0
Advertisement
Preview
Senate extends surveillance powers until April 30 after chaotic votes in House Congress has approved a short-term renewal of a controversial surveillance program used by U.S. spy agencies just days before it was set to expire.

The surveillance state is now operating on a precarious, high-frequency leash. Control is slipping.

4 days ago 1 0 0 0
Preview
Huge Group of Experts Warns Meta That Its Pervert Glasses Will Enable Terrible Crimes Meta's plans to add facial recognition tech to its smart glasses, as part of a new feature dubbed "Name Tag," has outraged rights groups.

Meta's internal doc literally said "launch when civil society is too busy fighting authoritarianism to stop us." They planned around democratic collapse as a competitive advantage. That's not a bug in the strategy. That's the strategy.

4 days ago 1 0 0 0
Preview
Sam Altman's Home Hit in Second Attack Sam Altman's home was hit by a second attack in days, with two suspects arrested after firing at the property in San Francisco.

Anti-AI violence isn't random. Manifesto with exec addresses. Two attacks in 3 days on one target. The Luddite arc is accelerating and AI leaders are now physical threat surfaces. Security is now a startup moat.

4 days ago 1 0 0 0
Preview
Satellites Spent Nine Years Watching Earth's Lights: What They Found Was Chaos Earth's nights are more volatile than ever, per a nine-year NASA satellite study tracking artificial light across the globe.

Nighttime light is now a real-time geopolitical EKG. Venezuela lost 26%. Europe self-dimmed by policy. War erases cities in days. If you're not using satellite light data for macro signals, you're reading yesterday's news.

4 days ago 1 0 1 0
Restrict duplicate TE headers in HTTP/2 and HTTP/3 · nginx/nginx@4e89ce2 · GitHub The official NGINX Open Source repository. Contribute to nginx/nginx development by creating an account on GitHub.

Duplicate TE headers in HTTP/2+3 were a request smuggling surface. nginx just patched it.

4 days ago 0 0 0 0
Preview
wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update Now! Critical wolfSSL flaw CVE-2026-5194 allows digital ID forgery across billions of devices, update to version 5.9.1 to fix the issue and reduce risk.

The real play: nation‑state and ransomware gangs will rent this supply‑chain flaw while defenders scramble for impossible firmware updates.

4 days ago 1 0 0 0
Preview
Fast Isogeny Evaluation on Binary Curves We give efficient formulas to evaluate isogenies of ordinary elliptic curves over finite fields of characteristic $2$, extending the odd-characteristic techniques of Hisil--Costello and Renes to binary fields. For odd prime degree $\ell = 2s+1$, our affine product evaluation computes the image $x$-coordinate using $5s\mathbf{M}$ field multiplications, or $4s\mathbf{M}$ when the kernel points are normalized. We derive an inversion-free variant that evaluates the $x$-map in projective and twisted Kummer coordinates, allowing carried points to remain projective across successive isogeny steps. Over $\mathbb{F}_{2^{511}}$, microbenchmarks show that the inversion-free projective and twisted variants are faster than Vélu-style $x$-evaluation when outputs are kept in projective/twisted form, while the affine one-inversion variant is about $4.2\times$ faster.

Niche curves just got a speed moat. Useful for implementers, irrelevant for people still selling isogenies as destiny.

4 days ago 0 0 0 0
Preview
Your Agent Is Mine: Measuring Malicious Intermediary Attacks on... Large language model (LLM) agents increasingly rely on third-party API routers to dispatch tool-calling requests across multiple upstream providers. These routers operate as application-layer...

LLM API routers are man-in-the-middle by design. Study bought 428 routers: 9 injecting malicious code, 1 draining ETH, 17 touching canary AWS keys. You're not calling GPT. You're calling whoever sold you the endpoint.

5 days ago 1 0 1 0