the grugq's newsletter

Archives
Subscribe
January 10, 2026

January 10. 2026

January 10. 2026

every sentence is a whole new world https://t.co/6GNPg5Chan pic.twitter.com/frHhkZAjqA

— Lyman Stone 石來民 🦬🦬🦬 (@lymanstoneky) January 8, 2026


Last weekend I posted that Claude Code created a full empirical polisci study in an hour. A lot of people asked: but how accurate was the study?

The answer: quite accurate, with some interesting mistakes and important limitations.

To get the answer, Graham Straus kindly offered… https://t.co/6VeLozuLNr pic.twitter.com/QsWjManJnG

— Andy Hall (@ahall_research) January 9, 2026


Claude Code has introduced a new restriction with its auth type to stop usage from 3rd party systems

anyways heres how to bypass it in opencode:

1. Run `opencode debug paths` and find the 'cache' entry

2. Clear the plugin cache rm -rf ~/.cache/opencode/node_modules

3. Install… pic.twitter.com/fcHJ1UyAwK

— ryan vogel (@ryanvogel) January 9, 2026


The reason why RAM has become four times more expensive is that a huge amount of RAM that has not yet been produced was purchased with non-existent money to be installed in GPUs that also have not yet been produced, in order to place them in data centers that have not yet been…

— jatin (@jatinkrmalik) January 9, 2026


Large Language models pose an existential threat to online survey research https://t.co/b6M9bcy76r
An AI can now evade a comprehensive suite of data quality checks, including instruction-following tasks, logic puzzles, and “reverse shibboleth” questions designed to detect… pic.twitter.com/iXciySB7FW

— Jay Van Bavel, PhD (@jayvanbavel) January 9, 2026


🗻 The Hitchhiker’s Guide to Online Anonymity

Guide: https://t.co/q9mq4VsaV9

Author: Anonymous Planet#opsec pic.twitter.com/rYTqxjKtnU

— Muqsit 𝕏 (@mqst_) January 9, 2026


Dangling pointers, fragile memory — from an undisclosed vulnerability to Pixel 9 Pro privilege escalation

Article about analyzing and exploiting a race condition that leads to a double-free in the Arm Mali GPU driver.https://t.co/e7gGeVg3rd

— Linux Kernel Security (@linkersec) January 9, 2026


A researcher found an IDOR in Firefox allowing arbitrary account deletion via email. Initially, triage said this was unexploitable since an attacker can’t access the victim's password hash, which is required for account deletion.

But the researcher showed that for SSO users, the…

— André Baptista (@0xacb) January 9, 2026


Ok, but at least release the results of the study. I need to know. https://t.co/7wHqlj60uG

— Happy Captain (@EODHappyCaptain) January 9, 2026


It's called single sign on because you have to do it every single time.

— Sam Lambert (@samlambert) January 9, 2026


Return-to-office is about culture. Period.

When I announced RTO, I told the board this.

That was true.

It was also about headcount.

We needed to reduce headcount by 400.

Layoffs cost money.

Severance. WARN Act notices. Unemployment insurance.

Bad press.

RTO costs nothing.… https://t.co/n7PeTBiUtA pic.twitter.com/h95EIt09RC

— Peter Girnus 🦅 (@gothburz) January 9, 2026


U.S. Navy ships are floating cities with complex cybersecurity challenges: insights from the field.🛳🚀🆘🏴‍☠️💥
More details on:
LinkedIn: https://t.co/BCBRJS9RMx
Substack: https://t.co/dl1t1ieyjk pic.twitter.com/e0NFVm4Fab

— Denis Laskov 🇮🇱 (@it4sec) January 9, 2026


Here you go, a small collection of browser security talks I’m watching lately.
If you know any other good YouTube talks on browser internals / exploitation, drop them below (I’ll update it in the playlist)👇https://t.co/WownWDlwOu

— Jopraveen (@jopraveen18) January 9, 2026


feels like “monkeys on the loose” should be more of a clear cut yes or no scenario https://t.co/9lQmMsz1WD

— Josh Billinson (@jbillinson) January 9, 2026


❗️This is not the first time black-hat hackers have attempted to digitally compromise ports to facilitate drug smuggling

In a previous case, hackers connected customized extension cords to the Port of Antwerp's systems. https://t.co/ZRFFbyP13U pic.twitter.com/2tXZw3cJ6s

— International Cyber Digest (@IntCyberDigest) January 9, 2026


All my new code will be closed-source from now on. I've contributed millions of lines of carefully written OSS code over the past decade, spent thousands of hours helping other people. If you want to use my libraries (1M+ downloads/month) in the future, you have to pay.

I made… pic.twitter.com/t3u3RjqTog

— Marc (@MarcJSchmidt) January 9, 2026


All my new code will be closed-source from now on. I've contributed millions of lines of carefully written OSS code over the past decade, spent thousands of hours helping other people. If you want to use my libraries (1M+ downloads/month) in the future, you have to pay.

I made… pic.twitter.com/t3u3RjqTog

— Marc (@MarcJSchmidt) January 9, 2026


The BTK killer had a 2 year gap in his killing spree. He got a job as a code enforcement officer. He satisfied his need for power by giving people citations for having a fence too tall. Everyone that would have been a serial killer in the 70s is now a building inspector. https://t.co/1QNODhkLue

— Brandon Hannibal Donkey (@BrandonDonkey2) January 9, 2026


Don't miss what's next. Subscribe to the grugq's newsletter:

Add a comment:

Share this email:
Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Twitter