AliveBeef
33 posts


Thanks to everyone for your support over the last decade, but it's time to move on and close this chapter. More info here: bakk.es/articles/bakke…
English


Linux distros we can confirm ship Brave as the default browser: Zorin OS 17.3+, Nobara Linux 42+, RefreshOS.
That list should be longer.
The browser is the user's main security boundary for the modern web.
Untrusted JavaScript, media parsing, GPU code paths, WebRTC, extensions, login sessions, fingerprinting, phishing, cross-site tracking.
All of it converges there. So the default browser matters.
A browser has to assume hostile web content will eventually hit a bug. The real question is what a compromised renderer can still reach. That is where Chromium's architecture earns its keep.
- Site isolation puts different sites into different sandboxed renderer processes.
- The sandbox limits what a compromised renderer can touch locally.
- Linux seccomp-bpf cuts kernel syscall attack surface.
- Dedicated service processes keep risky functionality out of one shared security context.
- Hardened allocation, control-flow protections, and use-after-free mitigations make exploitation harder.
The goal is not "no browser bugs." The goal is making one bug less useful.
Brave inherits that foundation and strips the Chrome parts that make no sense as a privacy default. No Google account dependency, no Chrome Sync dependency, no surveillance-ad business model, no need to install an ad blocker to get basic tracker protection.
On top of that:
- Shields on by default,
- third-party ad and tracker blocking,
- cross-site cookie protections,
- CNAME uncloaking,
- fingerprinting protections,
- ephemeral third-party storage,
- bounce tracking protections,
- URL tracking protections,
- De-AMP,
- a native Rust adblock engine.
The distro-default question is not "can Firefox be hardened?"
It is "what does a normal user get on day one?"
Most users will never install 5 extensions, audit settings, or paste in an about:config hardening guide. A distro default should protect those users immediately.
One note for maintainers: packaging matters. A browser's internal sandbox is part of its security model, and some packaging formats change it. Native packages from official repositories should be preferred over random repackages.
Linux distributions should stop treating the browser as a legacy preference. It is the user's main security boundary for the modern web.
English

@CacheisOut Maybe.
Well if it is, then I was here, I guess. Good run.
English

Starting June 1st, GitHub Copilot will move to a usage-based billing model as GitHub Copilot supports more agentic and advanced workflows.
In early May, you'll see a preview bill experience, giving visibility into projected costs before the transition.
👉 Read more about the upcoming change: github.blog/news-insights/…
English

@DivyanshT91162 First of all, nobody with a working mind would use a vibe coded captcha.
Second of all, Anubis exists
English

CAPTCHA IS OFFICIALLY OUTDATED
A new open-source library called Cap is changing how websites stop bots.
No puzzles. No traffic lights. No “select all bikes” anymore.
Instead, it uses a SHA-256 proof-of-work system — simple, silent, and fast.
Why devs are switching:
• Only ~20KB in size
• Zero tracking, zero data collection
• No images, no user friction
• Works with any JS runtime
• Fully customizable (visible, invisible, floating modes)
• Zero dependencies
• Can be deployed instantly via Docker
This is a full replacement for traditional CAPTCHA systems.
Cleaner UX. Faster websites. Better privacy.
100% open-source on GitHub
Link in comments.
English

@ChatGPTapp As I said previously, it seems OpenAI no longer use RLHF and have transitioned into RLHCPS (Reinforcement Learning from Hyper-Cryptic Shitposts)
English

@ChatGPTapp OpenAI no longer use RLHF and have transitioned into RLHCPS (Reinforcement Learning from Hyper-Cryptic Shitposts)
English

@bridgemindai This isn't AI.
It's slop.
Anyway, what do you expect from China? [not even exclusive to China]
Run it yourself or wait until other providers run it.
English

You're paying $1.74/$3.48 per million tokens for DeepSeek V4 Pro to train on your prompts.
Read that again. You pay them.
They use your code to make their model better.
OpenRouter's privacy guardrails literally block it by default.
Ranked #14 on LMArena Code.
Trains on your data.
And you're paying for the privilege.
This isn't an AI model.
It's a data collection service you pay a subscription for.

English

🚀 DeepSeek-V4 Preview is officially live & open-sourced! Welcome to the era of cost-effective 1M context length.
🔹 DeepSeek-V4-Pro: 1.6T total / 49B active params. Performance rivaling the world's top closed-source models.
🔹 DeepSeek-V4-Flash: 284B total / 13B active params. Your fast, efficient, and economical choice.
Try it now at chat.deepseek.com via Expert Mode / Instant Mode. API is updated & available today!
📄 Tech Report: huggingface.co/deepseek-ai/De…
🤗 Open Weights: huggingface.co/collections/de…
1/n

English








