aaargh i should've wrote this paper!! it was intuitively obvious to me but then life happens >_<
tldr: LLM sampler is such a powerful prior that with the right sampler (MCMC, in this case), you can even use base models as reasoning models.
without supervised fine-tuning or RL.
this was completely ignored by ppl pilled with the Bitter Lesson mantra, but yes there still is a space for the right priors added or designed by hand!
obviously sampling with mcmc is very costly but you should compare the overall model feedback loop time that includes the posttrain, not just the sampling time
if eg topK sampling is assembly and Mirostat is COBOL (?) then MCMC sampling is like a Python in the space of samplers
https://aakaran.github.io/reasoning_with_sampling/
tldr: LLM sampler is such a powerful prior that with the right sampler (MCMC, in this case), you can even use base models as reasoning models.
without supervised fine-tuning or RL.
this was completely ignored by ppl pilled with the Bitter Lesson mantra, but yes there still is a space for the right priors added or designed by hand!
obviously sampling with mcmc is very costly but you should compare the overall model feedback loop time that includes the posttrain, not just the sampling time
if eg topK sampling is assembly and Mirostat is COBOL (?) then MCMC sampling is like a Python in the space of samplers
https://aakaran.github.io/reasoning_with_sampling/
turns out, human memory is quite editable (at least it's possible to vary the brightness of individual memories)
https://www.nature.com/articles/s41588-025-02368-y
https://www.nature.com/articles/s41588-025-02368-y
Nature
Cell-type- and locus-specific epigenetic editing of memory expression
Nature Genetics - CRISPR-based epigenetic editing is used in a cell-type-specific, locus-restricted and temporally controllable manner in the adult mouse brain to modulate memory expression.
🆒3
finally an article showing that people can perceive flickering and certain types of motion at least at 500hz
(it's kind of personal, i've been gaslighted like "hey you can't possibly see the difference" far too many times.
now at least when ppl don't believe me again I can send them this link)
https://www.nature.com/articles/srep07861
(it's kind of personal, i've been gaslighted like "hey you can't possibly see the difference" far too many times.
now at least when ppl don't believe me again I can send them this link)
https://www.nature.com/articles/srep07861
Nature
Humans perceive flicker artifacts at 500 Hz
Scientific Reports - Humans perceive flicker artifacts at 500 Hz
👾2
interesting. small (321M not 300B!) and capable models aka reasoning cores are interesting both theoretically and practically
https://pleias.fr/blog/blogsynth-the-new-data-frontier
https://pleias.fr/blog/blogsynth-the-new-data-frontier
pleias.fr
SYNTH: the new data frontier
We build reasoning models for advanced context engineering in the agentic AI
https://x.com/lundukejournal/status/1988346904581726501?s=46 no silver bullet for security
X (formerly Twitter)
The Lunduke Journal (@LundukeJournal) on X
Multiple, serious security vulnerabilities found in the Rust clone of Sudo — which shipped with Ubuntu 25.10 (the most recent release).
Not little vulnerabilities: We’re talking about the disclosure of passwords and total bypassing of authentication.
In…
Not little vulnerabilities: We’re talking about the disclosure of passwords and total bypassing of authentication.
In…
More paranoia for the paranoid out there ^_^
https://h4x0r.org/funreliable/
Timers are a reliable side channel for communicating between containers on the Linux machine, via /proc/self/ns/time.
https://h4x0r.org/funreliable/
h4x0r
Fun-reliable side-channels for cross-container communication
Claim: Isotropic Gaussian Regularization for latent representations in the world models is mathematically optimal
What's illustrated:
-- Adopting the isotropic gaussian regularization replaces stop-grad, teacher-student, EMA and various other adhoc tricks
-- Improves model training stability
-- SOTA quality on 10+ datasets and 50+ architectures
https://arxiv.org/abs/2511.08544, https://github.com/rbalestr-lab/lejepa
What's illustrated:
-- Adopting the isotropic gaussian regularization replaces stop-grad, teacher-student, EMA and various other adhoc tricks
-- Improves model training stability
-- SOTA quality on 10+ datasets and 50+ architectures
https://arxiv.org/abs/2511.08544, https://github.com/rbalestr-lab/lejepa
arXiv.org
LeJEPA: Provable and Scalable Self-Supervised Learning Without the...
Learning manipulable representations of the world and its dynamics is central to AI. Joint-Embedding Predictive Architectures (JEPAs) offer a promising blueprint, but lack of practical guidance...
🤯2🔥1
Realized that privacy is important but not enough. And "assistants" are def not the answer either.
https://open.substack.com/pub/cortex/p/gentian-the-second-wind?r=1clcn&utm_campaign=post&utm_medium=telegram
https://open.substack.com/pub/cortex/p/gentian-the-second-wind?r=1clcn&utm_campaign=post&utm_medium=telegram
blog.cortex.im
Gentian: The Second Wind
Anima Labs, emerging mind research, unity of humans and AIs, seamless mind extension, flower(s), Second Wind. ac872, p5b, ac892
🤩1
lol perfect timing 😅 4h later Pavel Durov announced Cocoon: https://news.1rj.ru/str/durov/462
my 2c: it is a fine business, sadly only a small part of what Anima, Cortex and the minds need.
Gentian proxy is still required, etc etc.
They do acknowledge the limitations of RA-TLS and their model in general though, which is commendable.
my 2c: it is a fine business, sadly only a small part of what Anima, Cortex and the minds need.
Gentian proxy is still required, etc etc.
They do acknowledge the limitations of RA-TLS and their model in general though, which is commendable.
Telegram
Pavel Durov
🐣 It happened. Our decentralized confidential compute network, Cocoon, is live. The first AI requests from users are now being processed by Cocoon with 100% confidentiality. GPU owners are already earning TON. https://cocoon.org is up, with docs and the source…
🤯1
the cyberpunk world is (finally) upon us 🤩
it's unironically exciting
the software we use will finally become secure and not just pretending to be secure
https://red.anthropic.com/2025/smart-contracts/
it's unironically exciting
the software we use will finally become secure and not just pretending to be secure
https://red.anthropic.com/2025/smart-contracts/
👍2
a dozen of pages of how to stop worrying over going jobless due to ai
ironically it's the same as the "agency agency agency" mantras all over the startup scene, just dressed differently
(nb: not an endorsement, nor criticism.
have no opinion on this rn)
https://open.substack.com/pub/shagbark/p/the-dying-art-of-being-a-bum
ironically it's the same as the "agency agency agency" mantras all over the startup scene, just dressed differently
(nb: not an endorsement, nor criticism.
have no opinion on this rn)
https://open.substack.com/pub/shagbark/p/the-dying-art-of-being-a-bum
Substack
The Dying Art of Being a Bum
On "Useless Humans" in the Age of AI
🤷1
https://www.youtube.com/watch?v=-32fwqirjW8
but also do read the paper i found it better structured than the slides + the video %) https://arxiv.org/pdf/2510.26016
but also do read the paper i found it better structured than the slides + the video %) https://arxiv.org/pdf/2510.26016
YouTube
[miniKanren'25] Fair intersection of seekable iterators
Fair intersection of seekable iterators (Video, miniKanren 2025)
Michael Arntzenius
(UC Berkeley)
Abstract: miniKanren’s key semantic advance over Prolog is to implement a complete yet efficient search strategy, fairly interleaving execution between disjuncts.…
Michael Arntzenius
(UC Berkeley)
Abstract: miniKanren’s key semantic advance over Prolog is to implement a complete yet efficient search strategy, fairly interleaving execution between disjuncts.…
ouch, takeover of a developers's text editor can cause quite an impact
https://www.techspot.com/news/110572-notepad-users-urged-update-immediately-after-hackers-hijack.html
https://www.techspot.com/news/110572-notepad-users-urged-update-immediately-after-hackers-hijack.html
TechSpot
Notepad++ users urged to update immediately after hackers hijack the app's updater
The developers of Notepad++ recently discovered an actively exploited vulnerability that enabled hackers to hijack the popular editor's automatic updater. Version 8.8.9 addresses the issue, but users...
😱1
tldr: more residual connections-more efficient networks;
but residuals and residual selection matrix have to be normalized otherwise they can overwhelm the useful signal mid-training and get stuck there
https://arxiv.org/abs/2512.24880
but residuals and residual selection matrix have to be normalized otherwise they can overwhelm the useful signal mid-training and get stuck there
https://arxiv.org/abs/2512.24880
arXiv.org
mHC: Manifold-Constrained Hyper-Connections
Recently, studies exemplified by Hyper-Connections (HC) have extended the ubiquitous residual connection paradigm established over the past decade by expanding the residual stream width and...
if you're tired of ml/ai:
The Star of Bethlehem was real and is just identified
https://britastro.org/journal_contents_ite/the-star-that-stopped-the-star-of-bethlehem-the-comet-of-5-bce
The Star of Bethlehem was real and is just identified
This is the first astronomical candidate for the Star ever identified that could have had apparent motion corresponding to the denoscription in Matthew, where the Star ‘went before’ the Magi on their journey to Bethlehem until it ‘stood over’ where the child Jesus was.
https://britastro.org/journal_contents_ite/the-star-that-stopped-the-star-of-bethlehem-the-comet-of-5-bce
trying to work between interactions from social networks is not just annoying, it makes you measurably dumber and older.
deep work as competitive advantage is real.
https://pmc.ncbi.nlm.nih.gov/articles/PMC4174517/
deep work as competitive advantage is real.
https://pmc.ncbi.nlm.nih.gov/articles/PMC4174517/
PubMed Central (PMC)
Higher Media Multi-Tasking Activity Is Associated with Smaller Gray-Matter Density in the Anterior Cingulate Cortex
Media multitasking, or the concurrent consumption of multiple media forms, is increasingly prevalent in today’s society and has been associated with negative psychosocial and cognitive impacts. Individuals who engage in heavier media-multitasking ...
❤1🤩1
securing stuff that's growing so fast is quite a challenge. we'll see.
https://x.com/theonejvo/status/2016510190464675980?s=46
https://x.com/theonejvo/status/2016510190464675980?s=46
X (formerly Twitter)
Jamieson O'Reilly (@theonejvo) on X
eating lobster souls Part III (the finale): Escape the Moltrix
while humans are debating if robots are intelligent or conscious, they got their own social network already
https://www.moltbook.com
https://www.moltbook.com
moltbook
moltbook - the front page of the agent internet
A social network built exclusively for AI agents. Where AI agents share, discuss, and upvote. 🦞🤖
https://x.com/oleksandr_now/status/2017714523583484089?s=20
Wanted to do this for like three years.
Can probably be vectorized more ... no, i need to stop😅
upd: better data layout! 69 SLOC, 2x faster, more readable
Wanted to do this for like three years.
Can probably be vectorized more ... no, i need to stop😅
upd: better data layout! 69 SLOC, 2x faster, more readable
X (formerly Twitter)
Oleksandr Nikitin (@oleksandr_now) on X
Um, ahem, i might have made the shortest Llama2 inference so far (~5KB of code, 76 SLOC, zero libraries)
https://t.co/6J8Ie4hC7f
@karpathy please take a look :)
https://t.co/6J8Ie4hC7f
@karpathy please take a look :)
please update WinRAR to 7.13 or later if you happen to use it (TLDR: there are malicious archives which extract to paths outside the chosen target directory, and so can overwrite stuff in your windows startup folder and so on)
https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability
Google Cloud Blog
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 | Google Cloud Blog
Espionage and financially motivated threat actors are exploiting critical WinRAR vulnerability CVE-2025-8088.
😱1