- 00:28 β Voice mode is rolling out in Claude Code for 5% of users. @trq212, @mayfer, @cgtwts
- 04:08 β Qwen 3.5 running fully local on an iPhone 17 in AIRPLANE mode, no subscription needed. @minchoi
- 06:09 β Alibabaβs Qwen 3.5 is now running fully on-device on the iPhone 17 Pro, outperforming models 4x its size. @HuggingModels
- 01:09 β Weβre rolling out GPT-5.3-Codex-Spark to our most engaged Codex subs on ChatGPT Plus. @ah20im
- 06:30 β Someone just open sourced a fully autonomous AI hacker called Shannon, which exploits vulnerabilities. @heynavtoor
AI & Tech Developments - Mar 03
π± Source Tweets
Voice mode is rolling out now in Claude Code. Itβs live for ~5% of users today, and will be ramping through the coming weeks. You'll see a note on the welcome screen once you have access. /voice to toggle it on!
β @trq212
It's official. You can now talk to your terminal and it codes for you.
β @TukiFromKL
ahah brilliant. uses hidden input[type=checkbox] to trigger built-in haptic feedback even tho iOS doesn't expose vibrate API
β @mayfer
This is wild. Qwen 3.5 running fully local on an iPhone 17 in AIRPLANE mode... No subscription. Nothing leaves your device. AI subscriptions just became optional.
β @minchoi
Voice mode is rolling out in Claude Code for 5% of users.
β @trq212
New features in Claude Code include voice mode and more.
β @mayfer
Qwen 3.5 running fully local on an iPhone 17 in AIRPLANE mode, no subscription needed.
β @minchoi
Alibabaβs Qwen 3.5 is now running fully on-device on the iPhone 17 Pro. It outperforms models 4x its size, delivers strong visual understanding, and lets you switch reasoning on or off.
β @HuggingModels
A small from the Codex team. Weβre rolling out GPT-5.3-Codex-Spark to our most engaged Codex subs on ChatGPT Plus. It's our fastest model yet, at well over 1K toks/sec! It's available as a temporary preview at no extra cost through March 20. Enjoy!
β @ah20im
Someone just open sourced a fully autonomous AI hacker and it's terrifying. It's called Shannon. Point it at your web app, and it doesn't just scan for vulnerabilities. It actually exploits them. Real injections. Real auth bypasses. Real database exfiltrations. Not alerts.
β @heynavtoor