((((sandro.net))))
Manuntençao para Pcs
quinta-feira, 13 de novembro de 2025
Show HN: AI Bubble Monitor https://ift.tt/5SfTcvo
Show HN: AI Bubble Monitor The AI Bubble Monitor is an analytical tool designed to track and visualize indicators of potential market bubbles in AI-related sectors. It aggregates multiple data sources and metrics to produce a composite "AI Bubble Score" that ranges from 0 to 100. The tool breaks down the overall score into five sub-indices: Valuation, Capital Flows, Adoption vs Fundamentals, Sentiment & Hype, and Systemic Risk. Each sub-index provides insight into different aspects of market behavior and potential overvaluation. https://ift.tt/OMuJnae November 13, 2025 at 05:41AM
Show HN: Chime – Full-screen meeting alerts for time blindess (macOS) https://ift.tt/WlstkFU
Show HN: Chime – Full-screen meeting alerts for time blindess (macOS) I struggle with time blindness and kept missing client Zoom calls. MacOS notification banners appear for 5 seconds and vanish...my brain can't hold onto them. I spent 2 months building a solution. What it is: Chime shows full-screen alerts that physically interrupt whatever you're doing. It's impossible to miss. Technical details: - Built entirely in Swift/SwiftUI using Cursor. - Uses EventKit for Calendar + Reminders integration - Todoist REST API v2 for task sync - All data stays local—no cloud sync How it works: - Syncs from Calendar, Apple Reminders, and Todoist every 1-30 min (This is customisable) - Extracts meeting links from meetings (30+ platforms: Zoom, Teams, Meet, Webex, etc.) - Schedules Timer-based full screen alerts with customizable timing - Sound rotation system to prevent habituation The insight: Most accessibility focuses on making things "clearer" or "simpler." Neurodivergent brains need "impossible to ignore." Subtle equals invisible. I've been using it for a few weeks and went from missing chunk of meetings to zero. Try it: 14-day free trial on Mac App Store. No signup required, just download and grant Calendar permissions. https://ift.tt/DFfsiIr... Happy to discuss: - Building macOS apps with AI assistance - EventKit's quirks (hourly recurrence workaround, full screen alert implementation, etc) - Designing for neurodivergent users https://ift.tt/N68ehAy November 12, 2025 at 11:51PM
quarta-feira, 12 de novembro de 2025
Show HN: Real-time 4D Julia set navigation via gamepad https://ift.tt/0GnI4xO
Show HN: Real-time 4D Julia set navigation via gamepad I've written Atlas, a GPU scripting language that eliminates the boilerplate of managing textures and uniforms. Here are some demos including 4D fractal exploration with gamepad controls. Press 7 to see the Julia set, and try reloading if you see rectangles/it glitches. Documentation: https://banditcat.github.io/Atlas/index.html *requires approximately an RTX 3080. https://banditcat.github.io/Atlas/Atlas.html November 11, 2025 at 11:46PM
Show HN: AI is a DJ https://ift.tt/9wdMnKo
Show HN: AI is a DJ Set the mood/genre and sit back, let the AI mix music for you! https://loopmaster.xyz/editor?aidj November 12, 2025 at 02:01AM
terça-feira, 11 de novembro de 2025
Show HN: Privacy Experiment – Rewriting HTTPS, TLS, and TCP/IP Packet Headers https://ift.tt/veHlJId
Show HN: Privacy Experiment – Rewriting HTTPS, TLS, and TCP/IP Packet Headers The README: https://ift.tt/6RdSzvt Or the LP: https://404-nf/carrd.co Or read on... In a small enough group of people, your TLS-handshake can be enough to identify you as a unique client. Around six-months ago, I began learning about client-fingerprinting. I had understood that it was getting better and more precise, but did not realize the ease with which a server could fingerprint a user - after all, you're just giving up all the cookies! Fingerprinting, for the modern internet experience, has become almost a necessity. It was concerning to me that servers began using the very features that we rely on for security to identify and fingerprint clients. - JS - Collection of your JS property values - Font - Collection of your downloaded fonts - JA3/4 - TLS cipher-suite FP - JA4/T - TCP packet header FP (TTL, MSS, Window Size/Scale, TSval/ecr, etc.) - HTTPS - HTTPS header FP (UA, sec-ch, etc.) - Much more... So, I built a tool to give me control of my fingerprint at multiple layers: - Localhost mitmproxy handles HTTPS headers and TLS cipher-suite negotiation - eBPF + Linux TC rewrites TCP packet headers (TTL, window size, etc.) - Coordinated spoofing ensures all layers present a consistent, chosen fingerprint - (not yet cohesive) Current Status: This is a proof-of-concept that successfully spoofs JA3/JA4 (TLS), JA4T (TCP), and HTTP fingerprints. It's rough around the edges and requires some Linux knowledge to set up. When there are so many telemetry points collected from a single SYN/ACK interaction, the precision with which a server can identify a unique client becomes concerning. Certain individuals and organizations began to notice this and produced sources to help people better understand the amount of data they're leaving behind on the internet: amiunique.org, browserleaks.com, and coveryourtracks.eff.org to name a few. This is the bare bones, but it's a fight against server-side passive surveillance. Tools like nmap and p0f have been exploiting this for the last two-decades, and almost no tooling has been developed to fight it - with the viable options (burpsuite) not being marketed for privacy. Even beyond this, with all values comprehensively and cohesively spoofed, SSO tokens can still follow us around and reveal our identity. When the SDKs of the largest companies like Google are so deeply ingrained into development flows, this is a no-go. So, this project will evolve, I'm looking to add some sort of headless/headful swarm that pollutes your SSO history - legal hurdles be damned. I haven't shared this in a substantial way, and really just finished polishing up a prerelease, barely working version about a week ago. I am not a computer science or cysec engineer, just someone with a passion for privacy that is okay with computers. This is proof of concept for a larger tool. Due to the nature of TCP/IP packet headers, if this software were to run on a distributed mesh network, privacy could be distributed on a mixnet like they're trying to achieve at Nym Technologies. All of the pieces are there, they just haven't been put together in the right way. I think I can almost see the whole puzzle... November 10, 2025 at 10:27PM
Show HN: Drop-in replacement for Handlebars template engine, weighing 5KB https://ift.tt/2vVQ6Sf
Show HN: Drop-in replacement for Handlebars template engine, weighing 5KB This is part of the Q.js framework that I'm putting out. Which itself replaces Angular, React, Vue, etc. while being smaller than React even without ReactDOM. But the Handlebars.js one posted here is just a drop-in replacement. https://ift.tt/hWq2wvR November 11, 2025 at 12:43AM
Show HN: Nano Banana 2 – AI image generation SaaS powered by Google Gemini https://ift.tt/1lEgZPY
Show HN: Nano Banana 2 – AI image generation SaaS powered by Google Gemini Hi HN! I built Nano Banana 2, a SaaS platform for AI-powered image using Google's Gemini 2.5 Flash. You can try it for free.Would love your feedback! https://ift.tt/5Rd9hta November 11, 2025 at 01:42AM
Assinar:
Comentários (Atom)
DJ Sandro
http://sandroxbox.listen2myradio.com