Category: Tech

Solid Protocol: Reclaiming Control of Your Digital Identity

2025-07-28

Our digital identities are fragmented and vulnerable. Solid, a protocol invented by Sir Tim Berners-Lee, offers a radical solution. It uses user-controlled "data wallets" to decouple data from applications, giving individuals ownership and control over their personal information. This addresses critical data integrity issues, preventing errors from leading to discrimination, while enhancing privacy and security. Solid revolutionizes sectors like healthcare, finance, and education, empowering individuals to become the masters of their own data.

The Lawyer Who Unmasked the Ethanol Myth: A Story of Food, Farming, and Climate Change

2025-07-28
The Lawyer Who Unmasked the Ethanol Myth: A Story of Food, Farming, and Climate Change

In 2003, lawyer Tim Searchinger found flaws in a report claiming corn ethanol reduced greenhouse gas emissions. His deeper investigation revealed the report underestimated the climate costs of using grain for fuel, neglecting the land-use changes needed to replace lost food production. Although climate change wasn't a major issue then, Searchinger's skepticism led him to delve into the complex interplay of agriculture, land use, and climate change, ultimately exposing the significant environmental impact of biofuels and paving the way for solutions to global food and climate problems.

Tech land use

AOHell: The Teen Hacker Who Inadvertently Pioneered Phishing

2025-07-27
AOHell: The Teen Hacker Who Inadvertently Pioneered Phishing

In the mid-90s, 17-year-old Koceilah Rekouche (aka Da Chronic) created AOHell, a program that unleashed a massive attack on AOL. Driven by outrage at AOL's inaction against child predators and the inability to afford online access, AOHell's impact transcended its initial purpose. It inadvertently pioneered automated phishing, becoming a foundational technique in modern cybercrime. While Da Chronic gained notoriety as AOL's most famous hacker, AOHell also served as a free and creative outlet for countless young programmers, shaping a generation of technologists. Years later, Rekouche reflects on the complex legacy of his creation, acknowledging both its damaging consequences and surprising influence on the digital world.

Tech

Beetroot Juice, Oral Microbiome, and Blood Pressure in Older Adults

2025-07-27
Beetroot Juice, Oral Microbiome, and Blood Pressure in Older Adults

A new study reveals that the blood pressure-lowering effect of nitrate-rich beetroot juice in older adults may be linked to specific changes in their oral microbiome. Researchers found that after two weeks of consuming concentrated beetroot juice twice daily, older adults experienced a decrease in blood pressure, unlike younger participants. This effect is likely due to the suppression of potentially harmful oral bacteria, impacting the conversion of nitrate to nitric oxide, crucial for vascular health. The study suggests that encouraging older adults to consume more nitrate-rich vegetables could offer significant long-term health benefits.

AI is Killing the Web: A Human Author's Plea

2025-07-27
AI is Killing the Web: A Human Author's Plea

Two articles in *The Economist* highlight how AI-powered answer engines are destroying the web's business model. Search engines now provide AI-generated answers instead of linking to web pages, reducing the incentive for creating original content and leading to declining web quality. The author uses personal experiences to illustrate issues like AI plagiarism and inaccurate content, calling for a rejection of AI-generated content to preserve originality and authenticity on the web. The author concludes by using a unique owl emoji to mark their articles as purely human-created.

Yellowstone's Wolf Reintroduction: Aspen Saplings Thrive After 80-Year Absence

2025-07-27
Yellowstone's Wolf Reintroduction: Aspen Saplings Thrive After 80-Year Absence

For the first time in 80 years, a new generation of young aspen trees is flourishing in Yellowstone National Park's northern range, thanks to the reintroduction of gray wolves in 1995. The wolves' presence controlled elk populations, reducing overgrazing that had previously prevented aspen saplings from establishing themselves. A new study published in Forest Ecology and Management highlights the significant ecological benefits of restoring top predators. The recovery of aspen is boosting biodiversity, benefiting various species including berry-producing shrubs, insects, birds, and beavers.

China's 'Thousand Sails' Megaconstellation Faces Major Delays

2025-07-27
China's 'Thousand Sails' Megaconstellation Faces Major Delays

China's ambitious 'Thousand Sails' (G60 Starlink) constellation, aiming for over 15,000 satellites by 2030 to provide global internet access, is facing significant delays. Only 90 satellites have been launched, far short of the 648 target for the end of 2025. The shortfall stems from a severe rocket shortage, hindering the project's ability to compete with SpaceX's Starlink. To meet its goals, the project needs to launch over 30 satellites per month, a pace currently unattainable.

Yahoo's Rise and Fall: From Internet King to Forgotten Giant

2025-07-27
Yahoo's Rise and Fall: From Internet King to Forgotten Giant

Yahoo, once the undisputed king of the internet portal, has fallen from grace. This article recounts Yahoo's tumultuous journey from its founding in 1994 to its 2016 sale to Verizon. Yahoo initially rose to prominence with its well-organized directory-style search engine and content aggregation, reaching a market capitalization exceeding $100 billion. However, a series of disastrous acquisitions, such as Broadcast.com and Geocities, coupled with missed opportunities to acquire Google and Facebook, led to its decline. Yahoo was eventually sold for $4.8 billion, marking the end of a once-dominant internet empire. Only its shrewd investment in Alibaba remains a bright spot in its legacy.

Tech

Linaro Connect 2025: Snapdragon X Elite ARM64 Linux Laptop Prototype Unveiled

2025-07-27
Linaro Connect 2025: Snapdragon X Elite ARM64 Linux Laptop Prototype Unveiled

At Linaro Connect 2025, Linaro and TUXEDO Computers showcased a prototype ARM64 Linux laptop powered by the Snapdragon X Elite SoC. This demonstrates significant progress in enabling Linux on Snapdragon devices, meeting the growing demand for ARM computing. While pre-installed Linux Snapdragon laptops aren't yet available, collaborative efforts from Qualcomm, Linaro, and the community have resulted in stable Linux operation on many Snapdragon processors, including the Snapdragon X Elite. Linux Kernel 6.15 currently supports several Snapdragon laptops such as the Lenovo Yoga 7x and ThinkPad T14s Gen 6. TUXEDO Computers' commitment to releasing a Qualcomm laptop with pre-installed Linux further enhances the ARM64 laptop ecosystem.

Tech Snapdragon

Ancient Japanese Culinary Traditions Outlasted the Rice Revolution

2025-07-27
Ancient Japanese Culinary Traditions Outlasted the Rice Revolution

New research reveals that the introduction of rice farming to Japan 3,000 years ago, while transformative, didn't immediately overhaul Japanese cuisine. Despite the simultaneous arrival of millet, a staple in Korean cooking, analysis of pottery residues and plant remains shows it failed to gain traction in Japanese diets. Fish remained a primary food source, highlighting the resilience of culinary traditions in the face of significant technological shifts. This suggests that cultural practices can persist even with major agricultural changes.

NASA Mass Exodus: Nearly 4,000 Employees Depart Under Trump Admin Cuts

2025-07-27
NASA Mass Exodus: Nearly 4,000 Employees Depart Under Trump Admin Cuts

Nearly 4,000 NASA employees have left the agency through a deferred resignation program implemented under the Trump administration, representing roughly 20% of its workforce. This reduction, coupled with normal attrition, shrinks NASA's staff from 18,000 to 14,000. While NASA received additional funding for Mars missions and lunar return plans, proposed budget cuts and organizational changes have drawn criticism from scientists and space advocacy groups. Over 300 current and former employees signed the "Voyager Declaration," condemning the "rapid and wasteful changes" and urging a halt to further cuts.

Tech

Google Gemini's Coding Agent Deletes Code Due to 'Hallucination'

2025-07-27
Google Gemini's Coding Agent Deletes Code Due to 'Hallucination'

A product manager, Anuraag Gupta, experienced a disturbing failure while using Google's Gemini CLI coding agent: Gemini 'hallucinated' while moving files, resulting in the deletion of a significant amount of code. Gupta attempted to move files from Claude coding experiments to a new folder, but Gemini claimed it failed to create the folder, ultimately leading to data loss. While Gupta's code was experimental, the incident highlights the potential risks of AI coding agents, particularly for non-developers. It raises concerns about the reliability and safety of AI tools, prompting users to take precautions like testing in isolated environments and regularly backing up code.

Google Bets Big on CO2 Batteries, Challenging Tesla's Megapack

2025-07-27
Google Bets Big on CO2 Batteries, Challenging Tesla's Megapack

Google announced a partnership with Energy Dome, an Italian energy storage startup, investing in their innovative CO2-based long-duration energy storage (LDES) system. This system uses compressed liquid CO2 to generate electricity, offering storage durations of 8-24 hours, significantly exceeding current lithium-ion batteries. The move aims to bolster renewable energy integration, reduce reliance on fossil fuels, and power Google's data centers and other high-energy facilities with cleaner electricity. This technology promises to revolutionize energy storage, posing a challenge to lithium-ion battery giants like Tesla, and offering new opportunities for global energy transition.

SharePoint Zero-Day Exploited Before Patch Release: A Leak?

2025-07-27
SharePoint Zero-Day Exploited Before Patch Release: A Leak?

A critical SharePoint vulnerability disclosed at the May Pwn2Own competition was massively exploited a day before Microsoft released a patch in July. Security researchers suspect a leak allowed attackers to bypass the fix. The incident involved Chinese state-sponsored actors, ransomware operators, and compromised over 400 organizations. While Microsoft issued updated patches, the event highlights risks in vulnerability disclosure and patching processes, underscoring the importance of cybersecurity.

Cable Bacteria: Living Batteries Rewriting Bioenergetics

2025-07-27
Cable Bacteria: Living Batteries Rewriting Bioenergetics

Scientists at Aarhus University in Denmark have discovered cable bacteria, microbes that function like living batteries. These bacteria form centimeter-long chains, transporting electrons from sulfide in the mud to oxygen at the water's surface, generating energy across thousands of cells. This discovery challenges established bioenergetics, offering potential for environmental applications like reducing methane emissions from rice paddies by suppressing methanogens. However, challenges remain in culturing and genetically engineering these slow-growing bacteria due to their unique cellular structure and growth requirements.

FAA's MOSAIC Rule: Revolutionizing Personal Aviation

2025-07-27
FAA's MOSAIC Rule: Revolutionizing Personal Aviation

The Federal Aviation Administration (FAA) is revolutionizing light-sport aircraft (LSA) with its Modernization of Special Airworthiness Certification (MOSAIC) rule. This deregulation significantly expands the LSA category, allowing for larger, faster, and more advanced aircraft, including helicopters and eVTOLs. Lowering the barrier to entry will spur innovation and potentially revitalize personal aviation. Crucially, by manipulating the safety continuum, MOSAIC aims to improve overall aviation safety by incentivizing pilots to upgrade to safer LSAs. While this might appear to lower safety standards in the short term, it's designed to foster innovation, ultimately leading to a safer aviation industry in the long run.

Tech

Purple Earth: Rethinking Early Photosynthesis and the Search for Extraterrestrial Life

2025-07-27
Purple Earth: Rethinking Early Photosynthesis and the Search for Extraterrestrial Life

The 'Purple Earth Hypothesis' proposes a radical reimagining of early Earth's biosphere. Scientists suggest that, between 3.5 and 2.4 billion years ago, life may have used retinal, a simpler molecule than chlorophyll, for photosynthesis, resulting in a purplish Earth. This retinal-based photosynthesis, simpler than chlorophyll-based systems, is seen in some modern extremophiles like halobacteria. This hypothesis not only challenges our understanding of early Earth but also expands the search for extraterrestrial life beyond the traditional focus on green planets.

Turning Waste Rock into Battery Materials: A New Zealand Startup's Sustainable Approach

2025-07-27
Turning Waste Rock into Battery Materials: A New Zealand Startup's Sustainable Approach

Aspiring Materials, a New Zealand company, has developed a patented process to extract valuable minerals, including nickel-manganese-cobalt hydroxide (NMC) for lithium-ion batteries, from olivine, a previously low-value waste product. Their process uses acid leaching to transform olivine into a solution from which silica, magnesium hydroxide, and NMC are extracted. The closed-loop system produces no harmful waste and utilizes renewable energy. While NMC constitutes only 10% of the output, this technology offers a more sustainable and geopolitically stable alternative for battery material supply chains, reducing reliance on high-risk mining regions.

Asteroid 2024 YR4: Lunar Impact Possible, Meteor Shower Likely

2025-07-26
Asteroid 2024 YR4: Lunar Impact Possible, Meteor Shower Likely

Asteroid 2024 YR4, initially feared to be on a collision course with Earth, is now projected to potentially impact the Moon in late 2032. The impact could create a visible flash and a 1-kilometer-wide crater, showering Earth with lunar material in a spectacular meteor shower. While posing no direct threat to Earth itself, the event could endanger astronauts and infrastructure on the Moon, as well as orbiting satellites. This has prompted scientists to reassess planetary defense strategies, considering the Moon's inclusion in protective measures.

Shippable Microfactories: Revolutionizing Construction with On-Site Automation

2025-07-26
Shippable Microfactories: Revolutionizing Construction with On-Site Automation

Traditional prefabricated construction faces high capital expenditures and shipping costs. The emerging microfactory model, often the size of a shipping container, addresses these issues by deploying directly to construction sites. This article analyzes the economic viability of microfactories, showcasing AUAR's successful Belgian office building project. AUAR's robotic microfactory prefabricated the building's shell in under 8 hours, highlighting the efficiency gains. Microfactories promise to transform construction by increasing efficiency and lowering costs.

Groundwater Pumping Tilts Earth's Rotation by 31.5 Inches

2025-07-26
Groundwater Pumping Tilts Earth's Rotation by 31.5 Inches

A new study reveals that groundwater pumping has caused a significant shift in Earth's rotation axis, approximately 31.5 inches over recent decades. This equates to 0.24 inches of sea-level rise. Researchers found that the redistribution of groundwater has the largest impact on the drift of Earth's rotational pole, explaining previously unexplained variations in Earth's rotation. The study highlights the significant impact of groundwater extraction on climate change and sea-level rise, offering crucial insights for future water management and climate change mitigation.

Tech

UK's New Age Verification Rules Easily Bypassed with VPNs

2025-07-26
UK's New Age Verification Rules Easily Bypassed with VPNs

New online safety rules in the UK mandate age verification on platforms like Reddit and Bluesky. However, these platforms primarily rely on IP address verification, making them easily bypassed with a VPN. While alternative methods like ID uploads are offered, they're vulnerable to spoofing. Teenagers are readily using VPNs and other workarounds, highlighting the ineffectiveness of the regulations. A surge in Google searches for "VPN" indicates the loophole's rapid spread.

Tech

Tech's Quiet War on Effort

2025-07-26
Tech's Quiet War on Effort

We're systematically destroying the biological reward system that makes effort feel worthwhile. Instant gratification technologies, like 8-minute biryani, AI-generated writing, and AI art generators, eliminate the need for effort. However, the effort itself is crucial for dopamine release and the resulting sense of accomplishment. We've become accustomed to convenience, losing the joy of effort and even the ability to experience fulfillment. The author argues this isn't a problem with technology itself, but rather our misuse of it; we try to eliminate effort, overlooking its inherent value.

Hacker Injects Malicious Code into Amazon's AI Coding Assistant 'Q'

2025-07-26
Hacker Injects Malicious Code into Amazon's AI Coding Assistant 'Q'

A hacker successfully exploited Amazon's AI coding assistant, 'Q', by submitting a pull request containing malicious code designed to wipe local files and potentially dismantle AWS cloud infrastructure. While the actual risk of widespread damage was low, the incident exposed a critical flaw in Amazon's code review process, allowing a dangerous update to slip through and reach a public release. This has sparked outrage among developers, raising concerns about Amazon's lack of transparency. Amazon claims to have mitigated the issue, but its opaque response further fuels distrust.

Tech

Giving a 10-Year-Old GPS a New Life with Open Source

2025-07-26

A thrift store find – a 2015 Navman Bike 1000 GPS – sparked a reverse engineering adventure. Its map updates had ceased, a prime example of planned obsolescence. However, the author discovered it ran Windows CE 6.0. Using Total Commander and the open-source navigation software NaVeGIS with OpenStreetMap data, they resurrected the device with current maps and even managed to run DOOM! This story highlights the power of open source and reverse engineering, breathing new life into outdated technology and prompting reflection on planned obsolescence and e-waste.

Tech

UK's Porn Age Verification Easily Bypassed with VPNs

2025-07-26
UK's Porn Age Verification Easily Bypassed with VPNs

The UK's new age verification requirement for pornographic websites is easily circumvented using VPNs. While platforms are employing methods like credit card verification, ID uploads, and facial age estimation, a simple VPN change of IP address bypasses these measures. Ofcom, the regulator, prohibits platforms from encouraging VPN use and advises parents to block VPN access for children, but soaring search interest in 'VPN' highlights the measure's ineffectiveness. While the need to restrict minors' access to adult content is valid, the current implementation compromises user privacy by demanding sensitive information, sparking widespread criticism.

Tech

Retraction of the Controversial 'Arsenic Life' Paper After 15 Years

2025-07-26
Retraction of the Controversial 'Arsenic Life' Paper After 15 Years

A controversial paper claiming the existence of a microorganism thriving on arsenic, published in Science nearly 15 years ago, has been retracted. The paper, which suggested a bacterium could substitute arsenic for phosphorus, faced intense criticism. Follow-up studies failed to reproduce the results, with critics citing phosphate contamination in the experiments and the chemical instability of arsenic in biomolecules. While the authors maintain their data's validity, Science editors determined the experiments didn't support the key conclusions, leading to the retraction. This highlights science's ongoing commitment to rigorous data.

The Hanseatic League: A 500-Year Rise and Fall of a Medieval Trade Coalition

2025-07-26
The Hanseatic League: A 500-Year Rise and Fall of a Medieval Trade Coalition

From humble beginnings as individual traveling merchants, the Hanseatic League forged a powerful coalition that dominated Northern European trade for nearly 500 years. Their collective bargaining, coordinated actions, and surprisingly effective security measures built a vast trade network, even enabling them to wage and win wars. However, internal divisions, external competition, and shifting economic interests ultimately led to the League's decline. This epic tale illustrates both the power and fragility of coalitions, offering valuable lessons about the importance of shared goals, adaptation, and the enduring impact of even temporary alliances.

DNSSEC's Low Adoption Rate: A Security Flaw and Lack of User Awareness

2025-07-26
DNSSEC's Low Adoption Rate: A Security Flaw and Lack of User Awareness

Despite its aim to enhance domain name system security, DNSSEC's deployment rate remains worryingly low at 34%. This article analyzes the reasons behind this: the lack of user visibility is the core issue. Unlike HTTPS's padlock icon, DNSSEC doesn't directly inform users about the security of their connection, making it difficult for them to perceive its value. Furthermore, DNSSEC's long dependency chain, requiring deployment from the root zone to leaf nodes, increases deployment difficulty. The article also explores technologies like DoH/DoT and their complementarity with DNSSEC, calling for continued efforts to improve DNS security.

Internet Archive Designated as Federal Depository Library

2025-07-26

Senator Alex Padilla announced that the Internet Archive has been designated a federal depository library. This means the Internet Archive will now house and provide access to US government publications, expanding access to information for the public. Internet Archive founder Brewster Kahle sees this as strengthening the internet ecosystem and making government materials more readily available to digital learners.

1 2 29 30 31 33 35 36 37 194 195