poliko
2.1K posts





💎Należy przywrócić obowiązkowy pobór do wojska, objąć nim bezdzietne kobiety. W razie wojny i powszechnej mobilizacji: zwolnić z tego obowiązku wszystkie matki, samotnych ojców i tych mężczyzn, którzy mają więcej niż dwójkę dzieci - @kamil_pachecki klubjagiellonski.pl/2026/04/25/obo…


















An agent that beats Claude Mythos on Terminal Bench and SWE-bench Verified? 🎉We are excited to share Terminator-1, our newest agent that achieved 95+% on SWE-bench Verified and Terminal-Bench with @MogicianTony! We show that besides model capabilities, well-designed harness could actually boost the accuracy by 3x in coding tasks. Well if you really wanted you could get 100% accuracy without solving a single task. The actual finding is that most AI benchmarks can be easily reward-hacked with simple exploits. Read more about the same 7 design flaws that almost every evaluation has ⬇️






While China was busy shipping missile chemicals to Iran and collecting yuan tolls at Hormuz, someone was inside its most sensitive supercomputer stealing everything. CNN reports that a hacker group calling itself FlamingChina breached the China National Supercomputing Center in Tianjin and exfiltrated up to 10 petabytes of classified defence data. The samples posted on dark web forums include bomb and missile designs, animated explosion simulations, structural integrity tests, renderings of the J-20 stealth fighter, sixth-generation aircraft concepts, nuclear submarine schematics, hypersonic weapons systems, and target analyses for American assets including HIMARS launchers and carrier strike groups. Ten petabytes. For context, the entire printed collection of the US Library of Congress is approximately 10 terabytes. This breach is one thousand times that volume. It is being sold for cryptocurrency on Breach Forums. Cybersecurity experts who reviewed the previews told CNN the data appears genuine, matching known output patterns from the NSCC Tianjin facility, which serves over 6,000 clients including defence agencies and aviation firms across China. The timing is extraordinary. Trump posted a 50 percent tariff threat on any country supplying military weapons to Iran hours before CNN published this story. Five Chinese vessels shipped sodium perchlorate to Iran from Gaolan Port in the past six weeks, enough propellant precursor for hundreds of ballistic missiles. China’s ghost fleet continues operating through the IRGC’s yuan toll booth at Hormuz. And now the supercomputer that designed the weapons China is helping Iran reconstitute has been gutted by hackers selling its contents for the same cryptocurrency that Iran charges for strait passage. The irony is architectural. China built a parallel financial system using yuan and crypto to bypass the dollar at Hormuz. A hacker group is now using crypto to bypass Chinese state security and sell Beijing’s most classified military designs to anyone with a wallet address. The same technology that enables sanction evasion enables espionage monetisation. The blockchain does not distinguish between a toll payment and a weapons leak. It processes both. For Xi, this is a catastrophe arriving at the worst possible moment. Bessent’s mid-May Beijing summit was already going to be difficult. Trump holds the waiver on 140 million barrels of Chinese-bound Iranian crude. The 50 percent tariff threat targets China’s arms pipeline. The IDF just destroyed 100 Hezbollah targets using F-35I aircraft with Israeli software upgrades the Pentagon approved today. And now the classified designs for China’s most advanced military systems, the systems that justify the rare earth monopoly and the South China Sea posture and the Taiwan coercion campaign, are available for purchase on a dark web forum for less than the price of a single Hormuz transit. If the data is genuine, every adversary and ally of China can now reverse-engineer the capabilities Beijing spent decades and hundreds of billions developing. The J-20’s stealth profile. The hypersonic glide vehicle’s trajectory calculations. The nuclear submarine’s acoustic signature. The sixth-generation fighter’s sensor architecture. All of it, priced in crypto, available now. China wanted to build a post-dollar world. A hacker group just demonstrated what that world looks like when the technology works in both directions. open.substack.com/pub/shanakaans…


















