Reading List
The most recent articles from a list of feeds I subscribe to.
Swift Pitch: Borrowing Sequence
Ben Cohen: A sequence provides access to its elements through an Iterator, and an iterator’s next() operation returns an Element?. For a sequence of noncopyable elements, this operation could only be implemented by consuming the elements of the iterated sequence, with the for loop taking ownership of the elements individually. While consuming iteration is sometimes […]
curl Removes Bug Bounties
Jan Tångring (Hacker News): “AI slop and bad reports in general have been increasing even more lately, so we have to try to brake the flood in order not to drown”, says cURL maintainer Daniel Stenberg to Swedish electronics industry news site etn.se. Therefore, cURL is terminating the bounty payouts as of the end of […]
AirTag 2026
Apple (Hacker News, MacRumors): Apple’s second-generation Ultra Wideband chip — the same chip found in the iPhone 17 lineup, iPhone Air, Apple Watch Ultra 3, and Apple Watch Series 11 — powers the new AirTag, making it easier to locate than ever before. Using haptic, visual, and audio feedback, Precision Finding guides users to their […]
UK Age Verification for VPNs
Cindy Harper (via Hacker News): The UK House of Lords has voted to extend “age assurance” requirements, effectively age verification mandates, to virtual private networks (VPNs) and a wide range of online platforms under the Children’s Wellbeing and Schools Bill. The decision deepens the reach of the already-controversial Online Safety Act, linking child safety goals […]
Microsoft Sharing BitLocker Keys With FBI
Zac Bowden (via Hacker News): Microsoft has confirmed in a statement to Forbes that the company will provide the FBI access to BitLocker encryption keys if a valid legal order is requested. These keys enable the ability to decrypt and access the data on a computer running Windows, giving law enforcement the means to break […]