2 Court: Suspicionless Searches of Travelers’ Phones and Laptops Unconstitutional

3 Cooperative Threading

4 Tesla’s European gigafactory will be built in Berlin

5 Announcing .NET Jupyter Notebooks

6 Chronic adversity dampens dopamine production

7 The Google Squeeze

8 Privacy: Is That iPhone?

9 More South Korean academics caught naming kids as co-authors

10 The Bytecode Alliance: Building a secure, composable future for WebAssembly

11 Dean Foods, America's largest milk producer, files for bankruptcy

12 How to sleep at night having a cloud service: common architecture do's

13 Decentralized VPN Written in Go

14 Dell Unveils Subscription Model to Counter Amazon, Microsoft

15 TPM–Fail: TPM Meets Timing and Lattice Attacks

16 Sketchviz – Graphviz graphs in a hand-drawn style

17 Red Hat Introduces Open Source Project Quay Container Registry

18 Disney+ hit by technical glitches on launch day

19 One Google Staffer Fired, Two Others Put on Leave Amid Tensions

20 Show HN: GPG on macOS and YubiKey in ~5m

21 What's Happening in Linux/GNU When You Use Printf() C Function?

22 ‘Juice Jacking’ Criminals Use Public USB Chargers to Steal Data

23 Why the Government Isn't a Bigger Version of a Startup

24 Webflow (YC S13) Hiring Growth Engineers (SF/Remote)

25 Building a Parser

26 Draw.io: Online Diagramming Website

27 W3C Distributed Tracing Working Group

28 SEC Wins Jury Trial in Layering, Manipulative Trading Case

29 Bypassing Authentication on SSH Bastion Hosts

30 It’s always a good time to revisit the brilliance of Elizabeth Bishop

31 No Shenanigans