27 Apr 2026
Slashdot
Supreme Court Reviews Police Use of Cell Location Data To Find Criminals
An anonymous reader quotes a report from the New York Times: When the Call Federal Credit Union outside Richmond, Va., was robbed at gunpoint in 2019, the suspect took $195,000 from the bank's vault and fled before the police arrived. A detective interviewed witnesses and reviewed the bank's security footage. But with no leads, the officer relied on a so-called geofence warrant to sweep up location data from all the cellphones in the vicinity of the bank for the 30 minutes before and after the robbery. The data he gathered eventually led to the identification and conviction of Okello T. Chatrie, now 31, a Jamaican immigrant who came to the United States in 2017. Geofence searches have become increasingly popular as a tool for law enforcement, but critics say they put at risk the personal data of everyday Americans and violate the Constitution. Mr. Chatrie challenged the use of a geofence warrant in his conviction, in a case that will be heard by the Supreme Court on Monday. The justices will examine how the Constitution's traditional protections apply to rapidly changing technology that has made it easier for the police to scoop up vast amounts of data to assemble a detailed look at a person's movements and activities. It has been eight years since the court last took up a major Fourth Amendment case involving the expectations of privacy for the millions of people carrying cellphones in the digital age. In that 2018 case, the court ruled that the government generally needs a warrant to collect location data drawn from cell towers about the customers of cellphone companies. The court has also limited the government's ability to use GPS devices to track suspects' movements, and it has required that law enforcement get a warrant to search individual cellphones. In Mr. Chatrie's case, the government did obtain a warrant, but one that his legal team said was overly broad, violating Fourth Amendment protections against unreasonable searches.
Read more of this story at Slashdot.
27 Apr 2026 7:00pm GMT
GitHub Copilot Is Moving To Usage-Based Billing
GitHub said in a blog post today that it is moving Copilot to usage-based billing starting June 1. Base subscription prices will remain the same but premium requests will be replaced with monthly AI Credits that are consumed based on token usage. "Instead of counting premium requests, every Copilot plan will include a monthly allotment of GitHub AI Credits, with the option for paid plans to purchase additional usage," the platform said. "Usage will be calculated based on token consumption, including input, output, and cached tokens, using the listed API rates for each model. This change aligns Copilot pricing with actual usage and is an important step toward a sustainable, reliable Copilot business and experience for all users." Documentation for individuals, businesses and enterprises, and an FAQ can be found at their respective links.
Read more of this story at Slashdot.
27 Apr 2026 6:00pm GMT
Microsoft To Stop Sharing Revenue With OpenAI
Bloomberg reports that Microsoft is ending revenue-sharing payments to OpenAI (paywalled; alternative source) and making the partnership non-exclusive. "The rapid pace of innovation requires us to continue to evolve our partnership to benefit our customers and both companies," Microsoft said Monday in a blog post. Bloomberg reports: The revised deal is meant to simplify a complicated relationship between two partners that has been foundational to OpenAI's rise and the broader AI boom. OpenAI has since pursued partnerships with multiple cloud providers, including Microsoft rival Amazon.com Inc., to meet its growing computing needs to build and service AI software to a wider audience. As part of OpenAI's restructuring last year as a for-profit business, Microsoft received a 27% ownership stake in the AI startup.
Read more of this story at Slashdot.
27 Apr 2026 5:00pm GMT
26 Apr 2026
Ars Technica
Strange New Worlds S4 teaser strikes a more serious tone
"I have ever been prone to seek adventure and to investigate where wiser men would have left well enough alone."
26 Apr 2026 7:52pm GMT
Prime Video drops full trailer for Spider-Noir
It's "a detective story, but the detective happens to also have spider powers."-EP Chris Miller
26 Apr 2026 5:20pm GMT
New robotic control software avoids jamming their joints
Software lets robots learn from each other even if they have different hardware.
26 Apr 2026 11:09am GMT
24 Apr 2026
OSnews
If 64bit Windows 11 contains a copy of 32bit explorer.exe, could you run it as its shell?
Raymond Chen published a blog post about how a crappy uninstaller on Windows caused a mysterious spike in the number of Explorer (Windows' graphical shell) crashes. It turns out the buggy uninstaller caused repeated crashes in the 32bit version of Explorer on 64bit systems, and - hold on a minute. The how many bits on the what now? The 32-bit version of Explorer exists for backward compatibility with 32-bit programs. This is not the copy of Explorer that is handling your taskbar or desktop or File Explorer windows. So if the 32-bit Explorer is running on a 64-bit system, it's because some other program is using it to do some dirty work. ↫ Raymond Chen at The Old New Thing So I had no idea that 64bit Windows included a copy of the 32bit Explorer for backwards compatibility. It obviously makes sense, but I just never stopped to think about it. This made me wonder though if you could go nuts and do something really dumb: could you somehow trick 64bit Windows into running this 32bit copy of Explorer as its shell? You'd be running 32bit Explorer on 64bit Windows using the 32bit WoW64 binaries where you just pulled the 32bit Explorer binary from, which seems like a really nonsensical thing to do. Since there's no longer any 32bit builds of Windows 11, you also can't just copy over the 32bit Explorer from a 32bit Windows 11 build and achieve the same goal that way, so you'd really have to go digging around in WoW64 to get 32bit versions. I guess the answer to this question depends on just how complete this copy of 32bit Explorer really is, and if Windows has any defenses or triggers in place to prevent someone from doing something this uselessly stupid. Of course, there's no practical reason to do any of this and it makes very little sense, but it might be a fun hacking project. Most likely the Windows experts among you are wondering what kind of utterly deranged new designer drug I'm on, but I was always told that sometimes, the dumbest questions can lead to the most interesting answers, so here we are.
24 Apr 2026 11:07pm GMT
8087 emulation on 8086 systems
Not too long ago I had a need and an opportunity to re-acquaint myself with the mechanism used for software emulation of the 8087 FPU on 8086/8088 machines. ↫ Michal Necasek Look, when a Michal Necasek article starts out like this, you know you're in for a learnin' ol' time. The 8087 was a floating-point coprocessor for the 8086 and 8088 processors, since back in those early days, processors did not include an integrated floating-point unit. It wouldn't be until the release of the 486DX, in 1989, that Intel would integrate an FPU inside the processor itself, negating the need for a separate chip and socket. Interestingly enough, Intel also released a cut-down version of the 486 with the FPU removed, the 486SX, for which an optional external FPU did exist.
24 Apr 2026 10:42pm GMT
How hard is it to open a file?
Sebastian Wick has a great explanation of why opening files - programmatically - is a lot more complex and fraught with dangers than you might think it is. This issue was relevant for Wick as he is one of the lead developers of Flatpak, for which a number of security issues have recently been discovered, and it just so happens that many of these issues dealt with this very topic. The biggest security issue found was a complete sandbox escape, originating from the fact that flatpak run, the command-line tool to start a Flatpak application, accepted path strings, since flatpak run is assumed to be run by a trusted user. The problem lay in a D-Bus service sandboxed applications could use to create subsandboxes, and this service was built around, you guessed it, flatpak run. The issues in question, including this complete sandbox escape, have been addressed and fixed, but they highlight exactly the dangers that can come from opening files. This subsandboxing approach in Flatpak is built on assumptions from fifteen years ago, and times have changed since then. If you're a programmer who deals with opening files, you might want to take a look at your own code to see if similar issues exist.
24 Apr 2026 8:24pm GMT
18 Apr 2026
Planet Arch Linux
Break the loop, move to Berlin
Break the pattern today or the loop will repeat tomorrow.
18 Apr 2026 12:00am GMT
11 Apr 2026
Planet Arch Linux
Write less code, be more responsible
My thoughts on AI-assisted programming.
11 Apr 2026 12:00am GMT
03 Apr 2026
Planet Arch Linux
800 Rust terminal projects in 3 years
I have discovered and shared ~800 open source Rust CLI projects over the past 3 years.
03 Apr 2026 12:00am GMT