Connect with us
DAPA Banner

Tech

Waymo reportedly raising a $16B funding round

Published

on

Waymo has nearly finalized a new $16 billion funding round that will value the robotaxi company at $110 billion, according to the Financial Times.

More than three-fourths of that funding will reportedly come from a source close to home — Alphabet, where Waymo is a subsidiary. (The company was incubated as part of Alphabet’s “moonshot factory” X.)

The FT reports that Waymo is bringing on new investors Dragoneer, Sequoia Capital, and DST Global, with existing backers Andreessen Horowitz and Abu Dhabi sovereign fund Mubadala also participating in the round.

When contacted by TechCrunch, a company spokesperson said in a statement, “While we don’t comment on private financial matters, our trajectory is clear: with over 20 million trips completed, we are focused on the safety-led operational excellence and technological leadership required to meet the vast demand for autonomous mobility.”

Advertisement

The company is expanding quickly, including with a recent launch in Miami. That growth has come with some challenges, including a number of robotaxis that stalled at traffic lights during a widespread San Francisco blackout.

Waymo has more than $350 million in annual recurring revenue, according to the FT. The company last raised a $5.6 billion Series C in 2024, valuing the company at $45 billion.

Source link

Advertisement
Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

Navia discloses data breach impacting 2.7 million people

Published

on

Navia discloses data breach impacting 2.7 million people

Navia Benefit Solutions, Inc. (Navia) is informing nearly 2.7 million individuals of a data breach that exposed their sensitive information to attackers.

An investigation into the incident revealed that the hackers had access to the organization’s systems between December 22, 2025, and January 15, 2026. However, the company discovered the suspicious activity on January 23.

Navia says that it responded immediately and launched an inquiry to determine the potential impact of the incident.

“The investigation determined that an unauthorized actor accessed and acquired certain information between December 22, 2025, and January 15, 2026,” the company says in the notification to impacted individuals.

Advertisement

Navia is a consumer-focused administrator of benefits that provides services to more than 10,000 employers across the U.S.

The company provides software and customer services for the administration of Flexible Spending Accounts (FSA), Health Savings Accounts (HSA), Health Reimbursement Arrangements (HRA), Commuter Benefits and COBRA Services.

It also helps handle commuter benefits, lifestyle accounts, education benefits, compliance/risk services, and retirement-related offerings.

According to the company, the investigation into the breach revealed that the hacker accessed and may have exfiltrated the following types of data:

Advertisement
  • Full name
  • Date of birth
  • Social Security Number (SSN)
  • Phone number
  • Email address
  • Participation in HRA (Health Reimbursement Arrangements)
  • FSA (Flexible Spending Accounts) information
  • Consolidated Omnibus Budget Reconciliation Act (COBRA) enrollment information

Navia underlines that the data breach did not expose details about claims or financial information. Nevertheless, the exposed data is enough for threat actors to deploy phishing and social engineering attacks aimed at affected individuals.

The company states that it has reviewed its security posture and data retention policies to identify potential weaknesses that can be improved, and has notified federal law enforcement about the incident.

Customers whose information was exposed will be covered by a free 12-month identity protection and credit monitoring service from Kroll. Letter recipients are also encouraged to consider placing a fraud alert and security freeze on their credit files.

At the time of writing, no ransomware group has claimed the Navia data breach.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Advertisement

Source link

Continue Reading

Tech

Reading The World’s Smallest Hard Drive

Published

on

You have a tiny twenty-year-old hard drive with a weird interface. How do you read it? If you’re [Will Whang], by reverse engineering, and building an interface board.

In many of our portable, mobile, and desktop computers, we’re used to solid-state storage. It’s fast and low power, and current supply-chain price hikes notwithstanding, affordable in the grand scheme of things. It wasn’t always this way though, a couple of decades ago a large flash drive was prohibitively expensive. Hard drive manufacturers did their best to fill the gap with tiny spinning-rust storage devices which led to the smallest of them all: the Toshiba MK4001MTD. It crammed 4 GB onto a 0.85″ platter, and could be found in a few devices such as high-end Nokia phones.

Breaking out the Nokia’s hard drive interface.

The drive’s connector is a pattern of pads on a flexible PCB, one he couldn’t help noticing had a striking resemblance to an obscure SD card variant. Hooking it up to an SD reader didn’t work unfortunately, so a battered Nokia was called into service. It was found to be using something electrically similar to the SD cards, but with the ATA protocol familiar from the world of full-size hard drives.

The interface uses the PIO capability of the RP2040, and the board makes a tidy peripheral in itself. We’re guessing not many of you have one of these drives, but perhaps if you do, those early 2000s phone pics aren’t lost for good after all.

Advertisement

These drives are rare enough that this is the first time we’ve featured one here at Hackaday, but we’ve certainly ventured into hard drive technology before.

Source link

Advertisement
Continue Reading

Tech

Retro Weather Display Acts Like It’s Windows 95

Published

on

Sometimes you really need to know what the weather is doing, but you don’t want to look at your phone. For times like those, this neat weather display from [Jordan] might come in handy with its throwback retro vibe.

The build is based around the ESP32-2432S028—also known as the CYD, or Cheap Yellow Display, for the integrated 320 x 240 LCD screen. [Jordan] took this all-in-one device and wrapped it in an attractive 3D-printed housing in the shape of an old-school CRT monitor, just… teenier. A special lever mechanism was built in to the enclosure to allow front panel controls to activate the tactile buttons on the CYD board. The ESP32 is programmed to check Open-Meteo feeds for forecasts and current weather data, while also querying a webcam feed and satellite and radar JPEGs from available weather services. These are then displayed on screen in a way that largely resembles the Windows 95 UI design language, with pages for current conditions, future forecasts, wind speeds, and the like.

We’ve seen some fun weather displays over the years, from graphing types to the purely beautiful. If you’ve found a fun way to display the weather (or change it) don’t hesitate to notify the tipsline. Particularly in the latter case.

Advertisement

Source link

Advertisement
Continue Reading

Tech

Bitrefill blames North Korean Lazarus group for cyberattack

Published

on

Bitrefill blames North Korean Lazarus group for cyberattack

Crypto-powered gift card store Bitrefill says that the attack it suffered at the beginning of the month was likely perpetrated by North Korean hackers of the Bluenoroff group.

During the investigation, the platform observed indicators similar to previous attacks attributed to the North Korean threat actor, like tactics, malware, IP and email addresses.

“Based on indicators observed during the investigation  – including the modus operandi, the malware used, on-chain tracing and reused IP + email addresses (!) – we find many similarities between this attack and past cyberattacks by the DPRK Lazarus / Bluenoroff group against other companies in the crypto industries,” reads Bitrefill’s statement.

Tweet

Bitrefill is a mid-sized e-commerce platform that enables people to pay in cryptocurrency for gift cards at stores in 150 countries. The gift cards can be used to pay for anything from clothing, food and groceries, health and beauty products to bills, services, gas, transportation, and electronics.

Advertisement

The platform supports more than 600 mobile operators and thousands of brands worldwide.

On March 1st, Bitrefill announced technical issues affecting access to its website and app. A day later, the company disclosed that it had identified a security issue and took all services offline.

Although user balances were not affected, the gradual restoration of all services still continues to this day.

The breach was discovered after Bitrefill noticed suspicious supplier purchasing patterns, exploitation of gift card stock and supply lines, and draining of some “hot” wallets.

Advertisement

The investigation the firm launched to determine the cause revealed that the attack originated on a compromised employee’s laptop.

The attackers stole legacy credentials and used them to access a snapshot with production secrets, later escalating access to the larger Bitrefill infrastructure, including parts of the database and some cryptocurrency wallets.

About 18,500 purchase records containing customer email addresses, IP addresses, and cryptocurrency payment addresses were exposed in the breach. For 1,000 purchases, customer names were also exposed.

Although this information is stored in encrypted form, Bitrefill notes that the attackers may have obtained the decryption keys.

Advertisement

Bitrefill says this was the most serious cyberattack it has suffered in its ten years of existence, but it survived with minimal losses, which will be covered from its capital.

Ultimately, Bitrefill believes that attackers were after cryptocurrency and gift card inventory, not customer information.

BlueNoroff, also known as APT38, is a cluster of the Lazarus group that has been active since at least 2014. It typically targets financial organizations, with a more recent focus on the cryptocurrency industry, the objective being crypto theft.

Bitrefill says this was the most serious cyberattack it has suffered in the ten years of its existence, but it survived with minimal losses, which will be covered from its capital.

Advertisement

Meanwhile, it is expanding security reviews and pen-testing, tightening access controls, improving logging and monitoring, and refining automated shutdown mechanisms.

At this time, most of its services have returned to normal operational status, and customers aren’t required to take any action beyond treating incoming communications with extra caution.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

Intel’s latest push gains traction as GMKtec unveils EVO-T2 mini PC with 180 TOPS and unusual memory workaround

Published

on


  • GMKtec EVO-T2 mini PC reaches 180 TOPS using combined CPU, GPU, and NPU acceleration
  • Its PCIe 5.0 storage introduces data speeds exceeding 10GB per second
  • Local AI models run without relying on external cloud infrastructure

At a recent launch event, GMKtec introduced the GMKtec EVO-T2, a compact desktop system built for local AI computing.

According to the company, the device integrates third-generation Intel Core Ultra processors and claims up to 180 TOPS of compute capability.

Advertisement

Source link

Continue Reading

Tech

Nvidia lets its ‘claws’ out: NemoClaw brings security, scale to the agent platform taking over AI

Published

on

Every few years, a piece of open-source software arrives that rewires how the industry thinks about computing. Linux did it for servers. Docker did it for deployment. OpenClaw — the autonomous AI agent platform that went from niche curiosity to the fastest-growing open-source project in history in a matter of weeks — may be doing it for software itself.

Nvidia CEO and co-founder Jensen Huang made his position plain at GTC 2026 this week: “OpenClaw is the operating system for personal AI. This is the moment the industry has been waiting for — the beginning of a new renaissance in software.” And Nvidia wants to be the company that makes it enterprise-ready.

At its annual large GTC 2026 conference in San Jose this week, Nvidia unveiled NemoClaw, a software stack that integrates directly with OpenClaw and installs in a single command. Along with it came Nvidia OpenShell, an open-source security runtime designed to give autonomous AI agents — or “claws”, as the industry is increasingly calling them — the guardrails they need to operate inside real enterprise environments. Alongside both, the company announced an expanded Nvidia Agent Toolkit, a full-stack platform for building and running production-grade agentic workflows.

The message from Jensen Huang was unambiguous. “Claude Code and OpenClaw have sparked the agent inflection point — extending AI beyond generation and reasoning into action,” the Nvidia CEO said ahead of the conference. “Employees will be supercharged by teams of frontier, specialized and custom-built agents they deploy and manage.” Watch my video overview of it below and read on for more:

Advertisement

Why ‘claws’ — and why it matters that Nvidia is using the word

The terminology shift happening inside enterprise AI circles is subtle but significant. Internally, teams building with OpenClaw and similar platforms have taken to calling individual autonomous agents claws — a nod to the platform name, but also a useful shorthand for a new class of software that differs fundamentally from the chatbots and copilots of the last two years.

As Kari Briski, Nvidia’s VP of generative AI software, put it during a Sunday briefing: “Claws are autonomous agents that can plan, act, and execute tasks on their own — they’ve gone from just thinking and executing on tasks to achieving entire missions.”

That framing matters for IT decision-makers. Claws are not just assistants. They are persistent, tool-using programs that can write code, browse the web, manipulate files, call APIs, and chain actions together over hours or days without human input. The productivity upside is substantial. So is the attack surface. Which is precisely the problem Nvidia is positioning NemoClaw to solve.

Advertisement

The enterprise demand is not hypothetical. Harrison Chase, founder of LangChain — whose open-source agent frameworks have been downloaded more than a billion times — put it bluntly in a recent episode of VentureBeat’s Beyond the Pilot podcast: “I guarantee that every enterprise developer out there wants to put a safe version of OpenClaw onto onto their computer or expose it to their users.” The bottleneck, he made clear, has never been interest. It has been the absence of a credible security and governance layer underneath it. NemoClaw is Nvidia’s answer to that gap — and notably, LangChain is one of the launch partners for the Agent Toolkit and OpenShell integration.

What NemoClaw actually does — and what it doesn’t replace

NemoClaw is not a competitor to OpenClaw (or the now many alternatives). It is best understood as an enterprise wrapper around it — a distribution that ships with the components a security-conscious organization actually needs before letting an autonomous agent near production systems.

The stack has two core components. The first is Nvidia Nemotron, Nvidia’s family of open models, which can run locally on dedicated hardware rather than routing queries through external APIs. Nemotron-3-Super, scored the highest out of all open models on PinchBench, a benchmark that tests the types of tasks and tools calls needed by OpenClaw.

The second is OpenShell, the new open-source security runtime that runs each claw inside an isolated sandbox — effectively a Docker container with configurable policy controls written in YAML. Administrators can define precisely which files an agent can access, which network connections it can make, and which cloud services it can call. Everything outside those bounds is blocked.

Advertisement

Nvidia describes OpenShell as providing the missing infrastructure layer beneath claws — giving them the access they need to be productive while enforcing policy-based security, network, and privacy guardrails.

For organizations that have been watching OpenClaw’s rise with a mixture of excitement and dread, this is a meaningful development. OpenClaw’s early iterations were, by general consensus, a security liability — powerful and fast-moving, but essentially unconstrained. NemoClaw is the first attempt by a major hardware vendor to make that power manageable at enterprise scale.

The hardware angle: always-on agents need dedicated compute

One aspect of NemoClaw that deserves more attention than it has received is the hardware strategy underneath it. Claws, by design, are always-on — they do not wait for a human to open a browser tab. They run continuously, monitoring inboxes, executing tasks, building tools, and completing multi-step workflows around the clock.

That requires dedicated compute that does not compete with the rest of the organization’s workloads. Nvidia has a clear interest in pointing enterprises toward its own hardware for this purpose.

Advertisement

NemoClaw is designed to run on Nvidia GeForce RTX PCs and laptops, RTX PRO workstations, and the company’s DGX Spark and DGX Station AI supercomputers. The hybrid architecture allows agents to use locally-running Nemotron models for sensitive workloads, with a privacy router directing queries to frontier cloud models when higher capability is needed — without exposing private data to those external endpoints.

It is an elegant solution to a real problem: many enterprises are not yet ready to send customer data, internal documents, or proprietary code to cloud AI providers, but they still need model capability that exceeds what runs locally. NemoClaw’s privacy router architecture threads that needle, at least in principle.

What claws actually look like in the enterprise 

Before evaluating the platform, it helps to understand what a claw doing real work looks like in practice. Two partner integrations announced alongside NemoClaw offer the clearest window into where this is heading.

Box is perhaps the most illustrative case for organizations that manage large volumes of unstructured enterprise content.

Advertisement

Box is integrating Nvidia Agent Toolkit to enable claws that use the Box file system as their primary working environment, with pre-built skills for Invoice Extraction, Contract Lifecycle Management, RFP sourcing, and GTM workflows.

The architecture supports hierarchical agent management: a parent claw — such as a Client Onboarding Agent — can spin up specialized sub-agents to handle discrete tasks, all governed by the same OpenShell Policy Engine.

Critically, an agent’s access to files in Box follows the exact same permissions model that governs human employees — enforced through OpenShell’s gateway layer before any data is exchanged. Every action is logged and attributable; no shadow copies accumulate in agent memory. As Box puts it in their announcement blog, “organizations need to know which agent touched which file, when, and why — and they need the ability to revoke access instantly if something goes wrong.”

Cisco’s integration offers perhaps the most visceral illustration of what OpenShell guardrails enable in practice. The Cisco security team has published a scenario in which a zero-day vulnerability advisory drops on a Friday evening.

Advertisement

Rather than triggering a weekend-long manual scramble — pulling asset lists, pinging on-call engineers, mapping blast radius — a claw running inside OpenShell autonomously queries the configuration database, maps impacted devices against the network topology, generates a prioritized remediation plan, and produces an audit-grade trace of every decision it made.

Cisco AI Defense verifies every tool call against approved policy in real time. The entire response completes in roughly an hour, with a complete record that satisfies compliance requirements.

“We are not trusting the model to do the right thing,” the Cisco team noted in their technical writeup. “We are constraining it so that the right thing is the only thing it can do.”

An ecosystem play: the partners behind the stack

Nvidia is not building this alone. The Agent Toolkit and OpenShell announcements came with a significant roster of enterprise partners — Box, Cisco, Atlassian, Salesforce, SAP, Adobe, CrowdStrike, Cohesity, IQVIA, ServiceNow, and more than a dozen others — whose integration depth signals how seriously the broader software industry is treating the agentic shift.

Advertisement

On the infrastructure side, OpenShell is available today on build.nvidia.com, supported by cloud inference providers including CoreWeave, Together AI, Fireworks, and DigitalOcean, and deployable on-premises on servers from Cisco, Dell, HPE, Lenovo, and Supermicro. Agents built within OpenShell can also continuously acquire new skills using coding agents including Claude Code, Codex, and Cursor — with every newly acquired capability subject to the same policy controls as the original deployment.

Separately, Nvidia announced the Nemotron Coalition — a collaborative initiative bringing together Mistral AI, Perplexity, Cursor, and LangChain to co-develop open frontier models. The coalition’s first project is a base model co-developed with Mistral that will underpin the upcoming Nemotron 4 family, aimed specifically at agentic use cases.

What enterprise leaders should be watching

The NemoClaw announcement marks a turning point in how enterprise AI is likely to be discussed in boardrooms and procurement meetings over the next twelve months. The question is no longer whether organizations will deploy autonomous agents. The industry has clearly moved past that debate. The question is now how — with what controls, on what hardware, using which models, and with what audit trail.

Nvidia’s answer is a vertically integrated stack that spans silicon, runtime, model, and security policy. For IT leaders evaluating their agentic roadmap, NemoClaw represents a significant attempt to provide all four layers from a single vendor, with meaningful third-party security integrations already in place.

Advertisement

The risks are not trivial. OpenShell’s YAML-based policy model will require operational maturity that most organizations are still building. Claws that can self-evolve and acquire new skills — as Nvidia’s architecture explicitly enables — raise governance questions that no sandbox can fully resolve. And the concentration of agentic infrastructure in a single vendor’s stack carries familiar platform risks.

That said the direction is clear. Claws are coming to the enterprise. Nvidia just made its bet on being the platform they run on — and the guardrails that keep them in bounds.

Source link

Advertisement
Continue Reading

Tech

Bowers & Wilkins Refreshes Pi8 and Px7 S3 with New Finishes: Is Color the New Innovation in Premium Headphones?

Published

on

Bowers & Wilkins isn’t pretending this is a breakthrough and that’s exactly the point. The British luxury audio brand has expanded its flagship Pi8 true wireless earbuds and Px7 S3 noise-cancelling headphones with a slate of new premium finishes, leaning into a trend that’s been quietly reshaping the high-end audio category: color as innovation. The Pi8 now arrives in Dark Burgundy and Pale Mauve, bringing the total to six finishes, while the Px7 S3 adds a new Vintage Maroon option to its growing lineup.

If that sounds familiar, it should. Last year, I pointed out how a long list of premium audio brands had started treating industrial design and colorways not as afterthoughts, but as a legitimate product cycle strategy; extending relevance without touching the underlying acoustics. Bowers & Wilkins is now fully committed to that playbook. The hardware hasn’t changed and it didn’t need to, but the visual refresh keeps both models firmly in the conversation in a market that’s running out of meaningful spec-sheet upgrades.

Available starting March 19, the new finishes don’t come cheap: $499 for the Pi8 in Pale Mauve or Dark Burgundy, and $479 for the Px7 S3 in Vintage Maroon. Same award-winning sound, new wardrobe. Whether that counts as innovation or just smart business depends on how easily you’re seduced by a better shade of red.

What Are the Bowers & Wilkins Pi8?

Bowers & Wilkins Pi8 Earbuds with Charging Case Dark Burgundy
Bowers & Wilkins Pi8 in new Dark Burgundy color for 2026

The Bowers & Wilkins Pi8 are the company’s flagship true wireless earbuds, positioned as a no-compromise attempt to deliver genuine high-end sound in a category that usually prioritizes convenience over fidelity. In our review, the Pi8 stand out for their refined tuning, clarity, and sense of control, offering a presentation that feels closer to a compact hi-fi system than a typical pair of wireless earbuds. They’re designed for listeners who actually pay attention to what they’re hearing and not just how easily it connects.

At their core, the Pi8 combine carbon cone drivers, advanced DSP, and support for aptX Lossless to push beyond the limitations that have traditionally defined Bluetooth audio. Bowers & Wilkins also includes a smart charging case with retransmission capability, allowing wired sources to be streamed directly to the earbuds; an unusually practical feature that adds real-world flexibility. It’s a more thoughtful approach than most, focusing on how people actually use their gear rather than chasing feature checklists.

Advertisement
2026 Bowers & Wilkins Pi8 wireless earbuds in Pale Mauve color
Bowers & Wilkins Pi8 in new Pale Mauve color for 2026

That said, the Pi8 don’t try to win on every front. As we noted in our review, the emphasis is clearly on sound quality, materials, and overall refinement, rather than class-leading noise cancellation or mass-market pricing. If overall sound quality, comfort, and strong but not class leading ANC matter most, these are among the best options available.

What Are the Bowers & Wilkins Px7 S3?

The Bowers & Wilkins Px7 S3 are the brand’s latest over-ear wireless noise-cancelling headphones, sitting just below the Px8 S2 but very much aimed at the same crowd that shops Sony, Bose, and Sennheiser at the top of the category. In our review, they come across as a deliberate refinement of what Bowers & Wilkins has been building for over a decade; premium materials, a more mature design language, and a clear focus on sound quality first. This isn’t a lifestyle headphone trying to fake it. It’s a high-end hi-fi product that just happens to be wireless. 

2026 Bowers & Wilkins Px7 S3 Wireless Headphones in Vintage Maroon
Bowers & Wilkins Px7 S3 in new Vintage Maroon color for 2026

Where the Px7 S3 separates itself is in how it sounds relative to its competition. As noted in the review, it delivers audiophile-grade clarity, deep and controlled bass, and a level of detail that outpaces most rivals in this price range, including the usual suspects from Sony, Bose, and Apple. Bowers & Wilkins has also refined the internal driver design and overall tuning, while adding modern essentials like aptX Lossless and a more flexible EQ. The result is a presentation that feels more composed and revealing than what you typically get from mainstream ANC headphones.

That said, like the Pi8, the Px7 S3 doesn’t try to dominate every category. The review makes it clear that while ANC is improved and competitive, it’s not the class leader, and comfort is very good without being the lightest or most effortless in the segment. This is a headphone built around priorities: sound quality, build, and long-term listening satisfaction. If that’s what matters most, it’s one of the strongest all-around options available right now and one of the few that still feels like it was tuned by people who actually prioritise sound quality over ANC and connectivity features.

The Bottom Line

New colors are not innovation, but they do make the Pi8 and Px7 S3 feel fresher and harder to ignore. More importantly, this kind of refresh signals longevity these models are not going anywhere. Same excellent sound, now with a little more swagger.

Where to buy:

Tip: These new finishes add to the existing colors which include back, white, blue and jade green. Currently the new colors are only available at the Bowers & Wilkins website.

Advertisement
Advertisement. Scroll to continue reading.

Source link

Advertisement
Continue Reading

Tech

No, The First Amendment Doesn’t Cover Your Car’s Vanity Plate

Published

on





The U.S. Supreme Court won’t touch the debate over whether drivers have a free-speech right to put whatever they want on their license plates. Back in December, the justices refused to hear an appeal from a Tennessee woman who had her controversial vanity plate revoked. In doing so, they left in place the legal framework that has existed for years in many jurisdictions: vanity plates are government speech, not a means of individual expression.

This whole thing started when Tennessean Leah Gilliam had her plate reading “69PWNDU” revoked after driving around with it for more than a decade. After originally approving it, Tennessee officials eventually got enough complaints to realize the message was referencing something sexual. For the record, Gilliam argued it was actually a reference to the year of the moon landing alongside some gaming slang. She sued, lost, and tried to take it all the way to the Supreme Court.

Alas, the Supreme Court’s decision not to make a decision still leaves vanity plates in the hands of lower court rulings. That means it’s up to the states to regulate what appears on plates. Unfortunately for Gilliam, it also means it’s time to start brainstorming something for her next regrettable vanity license plate.

Advertisement

The law hasn’t always been clear on vanity plates

The Supreme Court’s decision makes it all seem pretty cut and dried, but looking at past rulings, that’s not exactly the case. The Supreme Court declined to hear the case, letting the lower court’s decision stand. But those lower courts haven’t always been on the same page. In recent years, they’ve reached different conclusions on who ultimately has the authority over vanity plates.

One example: In a 2020 case in Rhode Island, a federal judge ruled that a ban on NSFW license plates would violate the First Amendment because it gave state officials overly broad discretion to reject messages. The court allowed him to keep his vulgar plate throughout the litigation, saying that revoking it would suppress his personal expression. That goes against what Tennessee decided in Gilliam’s case. The plate in question read “FKGAS,” which is pretty much on par with other rejected vanity plates from states like Illinois.

Advertisement

Not even the Supreme Court can get aligned on this. In the 1977 Supreme Court case Wooley v. Maynard, the justices decided that individuals can’t be forced to display ideological state slogans on their plates. That would suggest First Amendment protection (however limited). But in 2015’s Walker v. Sons of Confederate Veterans, the Supreme Court’s ultimate decision was that specialty plates were government speech. For now, the Supreme Court clearly has very little interest in ruling on the issue one way or the other.



Advertisement

Source link

Continue Reading

Tech

White South Africans would Rather Live In South Africa Than In The US Under Trump

Published

on

from the great-orange-hope dept

Shortly after Trump took office for a second time, his administration made it clear that it felt constitutional rights were merely privileges it would extend only to those who fully supported whatever the hell the administration happened to be doing.

At the time, the administration was not only engaged in a full-blown, bigoted war against migrants, but throwing all of its support behind Israel’s ongoing anti-Palestinian efforts, which look a whole lot like actual genocide.

Last April, the administration stated it would no longer consider anti-Israel speech to be protected by the First Amendment, especially if said speech was uttered by immigrants, legal or otherwise:

U.S. Citizenship and Immigration Services has announced it will begin screening immigrants’ social media for evidence of antisemitic activity as grounds for denying immigration benefit requests. The screenings will affect people applying for permanent residence status as well as foreigners affiliated with educational institutions. The policy will go into effect immediately.

In a statement issued Wednesday morning, the Department of Homeland Security said it will “protect the homeland from extremists and terrorist aliens, including those who support antisemitic terrorism, violent antisemitic ideologies and antisemitic terrorist organizations such as Hamas, Palestinian Islamic Jihad, Hezbollah, or [the Houthis].”

Advertisement

But, in true MAGA fashion. Trump’s anti-antisemitic efforts only affected people who were more brown than white. A month later, Trump was opening the immigration door to South African “refugees,” but only the white ones. This decision was presumably based on lizard brain analysis of out-of-context clips shown on social media and/or Fox News that pretended whites in South Africa were being persecuted by the Black residents they’d persecuted for decades under apartheid.

And that included white South Africans who engaged in antisemitic speech, who were given a free pass to play their version of the race card to gain unvetted admittance to the Land of Opportunity.

Nine months later, the doors have been thrown wide open for white South Africans, with the administration yet again claiming — without facts in evidence — that these particular South Africans were more deserving of expedited asylum proceedings than anyone from any country where actual violence and persecution targets residents who are not white enough for the administration to consider worthy of naturalization.

The U.S. aims to process 4,500 refugee applications from white South Africans per month, far above President Donald Trump’s stated refugee program cap, and is installing trailers on embassy property in Pretoria to support the effort, a U.S. contracting document said.

While both versions of the Trump administration may have rendered satire mostly obsolete, it can’t eradicate irony. And here’s where it gets absolutely hilarious. White South Africans are now thinking their homeland is a better option than living here under this administration, as Reuters reports.

Advertisement

Andrew Veitch left South Africa after being held up at gunpoint in his car. But now he feels there are greater threats in the United States, ​he said, citing mass shootings in public places as well as violence by U.S. immigration officers.

“People are being shot in broad daylight. American citizens are being shot and killed,” said ‌the 53-year-old, who moved to California in 2003. “I don’t want to live in a place like this.”

It’s a valid point — one that people who have lived here for their entire lives are making, albeit without the easily available option of just pressing CTRL-Z on their temporary protected status. Veitch isn’t the only one wanting to return to the allegedly-hyper-violent country of South Africa, rather than continue to live in the Land of Opportunity that is daily being rebranded as the Land of Impending Martial Law.

Other South African (white) “refugees” are heading back home because the financial climate is preferable, even if they choose to ignore the threat Trump poses to every freedom Americans hold dear. After 20 years of US residence, it’s the Trump administration that’s encouraging South African (white) migrant Naomi Saphire to return to her homeland.

[Saphire] had ⁠been settled in the United States for two decades when she came back for a holiday and realized how much she missed home.

Last year, she left North Carolina for a seaside town in South Africa’s Western Cape, where she said her three children spend more time outdoors, health insurance is affordable and she prefers the schools.

Advertisement

“My heart is just full of gratefulness to be here,” the 46-year-old said from her home in Plettenberg Bay. “The U.S. has been really good to me (but) I just felt like I was depriving my kids of this life.”

As for the supposed violence targeting white South Africans Trump is now pretending to “save” from their misery with his “let’s get a bunch more whites in here” immigration policies, it’s as mythical as divorced from reality as Trump’s self-perception as the smartest, savviest businessman/politician to ever grace the Earth with his presence:

Crime and joblessness are major issues in ​South Africa, but the unemployment rate is 35% for Black ​people compared with 8% for whites, according to ⁠the latest figures from the national statistics agency Stats SA.

Police statistics released last year showed that even farm murders, which Trump has focused on, killed more Black people than whites. Reuters has found that photos and videos Trump has presented on the matter were taken out of context or misrepresented.

While this might seem like the most useless of anecdotal evidence, there’s reason to believe white South Africans will either ignore the Trump’s invitation to further whiten the US, or head back home where things are still pretty fucking good for whites, but without having to deal with a megalomaniac chaos agent who seems to believe World War III will finally allow Truth Social to turn a profit.

Advertisement

White South Africans have been rejecting the United States since 2022, when a law allowed them to regain their citizenship after it was stripped by a post-apartheid law passed in 1995. 15,000 white South Africans took advantage of that to return to their homeland. Now that Trump’s back in office, even more whites are exiting than entering the United States, despite the administration’s warm welcome of white migrants into its white Christian nationalism plans.

Home Affairs Minister Leon Schreiber ​said 1,000 people had reclaimed their citizenship, a number he expected to grow significantly as the programme takes off.

One of the main reasons for exiting the US was “lower cost of living,” something Trump has actively worked against achieving, starting with his indiscriminate (and apparently unlawful) tariffs and continuing through his destabilization of the world economy by (1) being buddies with Russia, (2) starting yet another forever war in the Middle East, (3) refusing to engage honestly with inflation and joblessness, and (4) decreasing American productivity by forcibly ejecting hundreds of thousands of people who work harder, pay more in taxes, and commit fewer crimes than US citizens.

And now it’s clear this administration is so inept and inherently dangerous it can’t even convince white people to live here. Let that sink in for a bit.

Filed Under: bigotry, dhs, ice, immigration, mass deportation, south africa, trump administration, whites only

Advertisement

Source link

Continue Reading

Tech

Keebin’ With Kristina: The One With The Ultra-Thin Split

Published

on

But sir, it is wafer-thin. That’s how they get you! Just when you couldn’t possibly justify building another keyboard, let alone owning one, along comes the Kambala by [aroum2].

A wafer-thin keyboard in triple black.
Image by [aroum2] via reddit

Now, ‘Kambala’ means a few things, but here it refers to fish, as evidenced by logo and matching themed PCB key chain shown in the gallery.

This catch is so flat because of the switches: PG1316S, and 42 of them. These are better known to some as Kailh butterfly switches, and are meant for laptops. But, this is Hackaday.

No matter what you call them, those switches are controlled by a nice!nano V2-compatible controller, which allows for ZMK firmware support. There’s a 110 mAh battery and four status LEDs, and best of all, the charging indicator is in the fish’s eyes.

[aroum2] might share the files later. Here’s hoping!

Advertisement

Let’s Talk DIY Palm Rests

Palm rests! Depending on the keyboard, they can be built right in. This here Kinesis Advantage comes to mind. That said, you can buy a pair of nice adhesive pads for your Kinesis once the ABS shine starts to bother you, or better yet, before that happens. Don’t make your own out of adhesive foam sheets. Just, trust me on this.

A split keyboard with a large sponge cut in half and employed as palm rests.
Image by [Ok-Obligation9605] via reddit

But oftentimes, especially with travel keyboards, palm rests aren’t included. And that’s fair, because people want different things. Before you go printing some, or even rendering a pair from zebrawood, consider cheap alternatives like a large car-washing sponge cut in half and covered with the fabric of your choice.

On the slightly more expensive side, many employ a pair of Purple mattress samplers, which have doubled in price since I bought some 2022, but are still worth it.

Depending on your desk, you could do something as simple as cutting a pool noodle in half and shoving it onto the edge. Maybe you’ve done something even more temporary that turned out to be permanent. Tell me in the comments!

A field of Purple squishies on a white background.
Squishy. Image via Purple

Even if you have built-in palm rests, sometimes you need to temporarily insert something like a spiral notebook between your desk edge and keyboard, pushing the thing further away and putting your delicate elbows at risk. This is me right now, and each elbow is on a mouse bag. Simple and effective.

Another consideration is attached versus unattached. I mean, if a travel keyboard is going to have palm rests, they should attach rather than just be placed in front. Maybe that’s just me.

Advertisement

 

The Centerfold: Telegraph Key Macro Pad is Dashing

A space mouse, a telegraph key macro pad, and part of a keyboard.
Image by [Colin Norris] via Hackaday.IO

The system works! [Colin] sent a tip about his Telegraph Key Macro Pad, which is exactly what it sounds like. [Colin] says that his job these days mostly consists of copy/pasting from GPT, and it was quickly becoming a pain in the wrist. (Boy, can I relate.)

Using the thing is just as it should be: to copy, you long press the key like a Morse code dash. To paste, you do the short one. This enables [Colin] to paste many times, and quickly. [Colin] started with a Soviet-era telegraph key from the electronic bay, and a Pimoroni Tiny 2040 programmed with Arduino. It may be wildly overpowered for the application, but hey, it fits nicely in the base of the telegraph key.

The default is to make a sound when you do either action. [Colin] used a piezo disk so that it can handle different tones. This was done mostly for the luls, but it also lets him know when something is copied. There’s also a nifty silent mode that moves the mouse cursor in a quick loop-dee-loo when the deed is done.

Do you rock a sweet set of peripherals on a screamin’ desk pad? Send me a picture along with your handle and all the gory details, and you could be featured here!

Advertisement

Historical Clackers: the Crown Was a Machine for the Millions… Not!

You might wonder why I choose so many index typewriters for this portion of the program. I suppose it’s because they can be so differently designed, yet serve the same purpose. And that’s just cool to me.

Two versions of the Crown index typewriter.
Image via The Antikey Chop

The Crown index typewriter is no exception. Let’s start with the fact its creator, Byron Alden Brooks, was a celebrated inventor of early typewriters. You may have heard of the Brooks; he also had a hand in the People’s, the National, the Travis, and of course, the Crown index typewriter. Perhaps most unforgettable among his accomplishments, Brooks invented the Shift key.

The Crown was produced between 1888 and 1894, though it is thought that Brooks began work on it as early as 1881, evidenced by the date on the typewheel patent. It’s also thought that production really ceased in 1893.

That’s right, the Crown used a typewheel and a linear index from which the user selected each character. The ink came from a felt roller situated between the carriage and typewheel. Every time a character was selected, this roller would swing out of the way so the typewheel could strike the platen.

Originally, the Crown cost $20 (about $700 today), with the wooden case thrown in free. The price dropped to $16 by the middle of 1891. Despite being billed as ‘a machine for the millions’, the Crown was a failure.

Advertisement

Finally, There’s a Quiz To Find Your Switch Type

If you’re really up on things, you’re of course no stranger to KBD News and the corresponding newsletter. KBD is a great resource for all things keyboard, and now there’s a switch compatibility quiz to help you get started.

The start page of a keyboard switch compatibility quiz.
Image via KBD News

Of course, not all switches work with all PCBs, so you can’t begin this journey without knowing which path to head down. Choose MX, and you’ll have a bevvy of beauties to choose from. There are far fewer low-profile and Hall-effect switches out there, so keep that in mind.

Let’s say you go down the MX path. Your next choice is important: how much feedback do you need? None? A little? An audible click? Remember to keep your environment in mind.

If you’re me, you choose clicky. Now it’s time to think about actuation force. There are no light-force clicky switches; it’s just not a thing. So you can choose mid, heavy, or no preference, which takes you directly to RGB choices. Do you want a transparent housing? A light diffuser? Both? If you have no preference here, your final choice concerns factory lubrication. I ended up with 10 different switch recommendations, but of course, YMMV.

It’s important to note that KBD News has a comprehensive guide to choosing keyboard switches, which covers everything from actuation force to travel distance to RGB support, or lack thereof. And don’t miss the mechanical switch FAQ, just below the quiz.

Advertisement

Got a hot tip that has like, anything to do with keyboards? Help me out by sending in a link or two. Don’t want all the Hackaday scribes to see it? Feel free to email me directly.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025