Category: Tech

VPNSecure Cancels Lifetime Subscriptions, Angering Users

2025-05-12
VPNSecure Cancels Lifetime Subscriptions, Angering Users

The new owners of VPN provider VPNSecure have angered users by canceling all lifetime subscriptions. They claim they were unaware of these subscriptions during the acquisition and cannot honor them. This has led to widespread complaints, prompting VPNSecure to offer discounted subscriptions as compensation. However, this hasn't appeased users, highlighting issues of transparency and responsibility in business acquisitions.

Venus' Surprisingly Thin Crust: A New Model for Geological Processes

2025-05-12
Venus' Surprisingly Thin Crust: A New Model for Geological Processes

New research reveals surprising details about Venus' crust. Unlike Earth, Venus possesses a single-piece crust, lacking plate tectonics. Scientists expected its crust to thicken over time due to the absence of subduction. However, a study published in Nature Communications proposes a crustal metamorphism model based on rock density and melting cycles. This model suggests a surprisingly thin crust, averaging around 25 miles (40 kilometers) thick, with a maximum thickness of 40 miles (65 kilometers). The research indicates that as the crust thickens, the bottom becomes dense enough to break off into the mantle or melt due to heat. This process recycles material back into the interior, driving volcanic activity and influencing Venus' geological evolution and atmospheric composition. Upcoming missions like NASA's DAVINCI and VERITAS, and ESA's Envision, aim to further explore Venus and test this model.

Tech Geology Crust

macOS Permission Pop-Up Vulnerability: TCC, Who?

2025-05-12
macOS Permission Pop-Up Vulnerability: TCC, Who?

A recently patched macOS vulnerability, CVE-2025-31250, allowed applications to spoof system permission pop-ups, tricking users into granting unauthorized access. Attackers exploited a flaw in Apple Events and the Transparency, Consent, and Control (TCC) system, separating the application displayed in the pop-up from the application actually receiving permissions. This vulnerability leveraged a logic error in the TCC daemon's handling of Apple Events permission requests, bypassing the need to create fake apps or override Dock shortcuts. The vulnerability has been patched, but highlights the complexity and potential risks in system permission management.

Internet Map 2010: A BGP Visualization Pioneer

2025-05-12

This 2010 image of the internet, unseen publicly until 2014, represents a groundbreaking visualization. Unlike previous traceroute-based maps, it uses BGP data as its foundation, creating a framework for future internet visualizations using the Route Views table dump archive. The color scheme depicts connection density as incandescence, with hotter colors representing higher connection points. This image was previously only viewable at the Museum of Modern Art (MoMA) and in Discover Magazine.

Nvidia Raises Prices Across the Board Amidst Multiple Crises

2025-05-12
Nvidia Raises Prices Across the Board Amidst Multiple Crises

Nvidia has increased prices on almost all its products, citing tariffs, manufacturing costs, and the impact of export restrictions on its AI chips. Gaming GPUs saw a 5-10% price hike, while AI GPUs experienced a more significant 15% increase. The company's Q[number] earnings took a $5.5 billion hit due to export restrictions, including a ban on H20 chip sales to China. CEO Jensen Huang has been working to mitigate these issues, and the price increases aim to maintain profitability. Despite the price hikes, strong demand for AI chips outside of China and increased spending from cloud providers are expected to keep the company's financial report within forecasts. The move to TSMC's US plant for Blackwell chip production further exacerbated the cost increases. While a recent US-China trade deal may eventually lead to lower prices, consumers may not see immediate relief.

The Demise of USENIX ATC: The End of Academic Conferences in the Age of Open Source?

2025-05-12

The USENIX Annual Technical Conference (ATC) has been discontinued, prompting reflection on the academic conference model and the direction of systems research in the age of open source. The author recounts ATC's journey from glory to decline, arguing that the rise of open source has altered how systems research findings are disseminated, diminishing the importance of academic conferences. Simultaneously, ATC itself suffered from becoming overly academic and detached from practice, ultimately leading to its demise. While lamenting ATC's end, the author suggests that the rise of online conferences offers new possibilities for systems research.

America's Road Safety Crisis: Why are US Road Deaths So High?

2025-05-12

Over 40,000 people die on US roads annually, a shockingly high rate among developed nations. This isn't inevitable; it's a policy choice. The article highlights how the US lags behind countries like the Netherlands and Sweden in road safety improvements due to a lack of a nationwide systemic safety approach. These countries employ the 'Safe System' approach, prioritizing human-centered design, lower speeds, and reducing human-vehicle conflict. The article calls for the US to learn from international experiences and tackle its road safety crisis through a national strategy, design reforms, and a cultural shift.

Dating App Cerca Leaks Thousands of User Profiles Due to Critical Vulnerabilities

2025-05-12

A security researcher discovered critical vulnerabilities in the dating app Cerca, exposing the personal information of thousands of users, including phone numbers, university emails, and even national ID information. The researcher responsibly disclosed the vulnerabilities to Cerca in late February but received no response. The vulnerabilities allowed attackers to access user profiles, private messages, and even force matches between users. While the vulnerabilities have since been patched, Cerca has not publicly acknowledged the incident or informed affected users. This highlights the critical need for startups to prioritize security and promptly respond to security vulnerability reports.

Tech

Retro Revival: Cyclauto's Front-Wheel-Drive Cargo Bike from the 1930s

2025-05-12
Retro Revival: Cyclauto's Front-Wheel-Drive Cargo Bike from the 1930s

French company Cyclauto has revived a vintage cargo bike design from the 1930s, originally by French industrialist Auguste Reymond. Unlike typical cargo bikes, the Cyclauto positions the rider above the front wheel, directly powering it without a chain, reducing maintenance. Its detachable cargo section, like a semi-trailer, offers high modularity, carrying goods, passengers, or even commercial fixtures. The shorter wheelbase makes it highly maneuverable in urban settings. Cyclauto has been showcased at bike shows, but production dates remain unannounced.

Tech cargo bike

Cerabyte Secures Western Digital Investment for 5000-Year Data Storage

2025-05-12
Cerabyte Secures Western Digital Investment for 5000-Year Data Storage

German data storage startup Cerabyte announced it has received strategic investment from Western Digital, accelerating development of its groundbreaking ceramic-based data storage technology. Boasting a 5000-year lifespan and potentially yottabyte-scale capacity, Cerabyte's technology has undergone extreme testing, proving resilient to heat, water, radiation, and more. Aiming for sub-$1/TB storage by 2030, this partnership promises to bring commercially viable, ultra-long-term data storage solutions to market.

Tailscale 4via6: Revolutionizing Edge Device Connectivity

2025-05-12
Tailscale 4via6: Revolutionizing Edge Device Connectivity

Deploying software or hardware to the edge often faces connectivity challenges: NAT, restrictive network policies, fixed CIDR ranges, and unknowns. Tailscale's 4via6 subnet routing solves this by enabling seamless connections between numerous networks (e.g., robots, sensor networks) without managing IPs, CIDRs, or ports. Each network gets a unique identifier, devices are named using MagicDNS, simplifying management and granting secure remote access even for complex customer networks. Ideal for connecting autonomous robots, linking VPCs across clouds, or using the same IP range for testing and production.

OpenEoX: Revolutionizing Cybersecurity and Product Lifecycle Management

2025-05-12
OpenEoX: Revolutionizing Cybersecurity and Product Lifecycle Management

OpenEoX standardizes End-of-Life (EOL) and End-of-Support (EOS) policies across vendors and open-source maintainers, dramatically reducing cybersecurity risks. It allows organizations to quickly identify unsupported products, enabling timely retirement or replacement of outdated, vulnerable systems. This leads to a more secure IT environment. OpenEoX's machine-readable format enables automated vulnerability management, providing real-time monitoring and alerts for proactive risk mitigation. Further benefits include simplified product management, enhanced customer confidence, and smoother technology transitions.

US and China Agree to 90-Day Tariff Truce

2025-05-12
US and China Agree to 90-Day Tariff Truce

The US and China announced a temporary agreement to lower tariffs, offering a 90-day truce in their ongoing trade war. The US will reduce tariffs on Chinese imports from 145% to 30%, while China will lower tariffs on US goods from 125% to 10%. Both sides cited a desire to avoid economic decoupling and buy time for further negotiations. The agreement offers a lifeline to American businesses that had suspended orders, hoping for a tariff reduction amid rising prices.

Tech Trade Deal

FTC Delays Enforcement of Click-to-Cancel Rule

2025-05-12
FTC Delays Enforcement of Click-to-Cancel Rule

The Federal Trade Commission (FTC) has delayed enforcement of its “click-to-cancel” rule until July 14th, pushing back the original May 14th deadline. The rule, part of the Negative Option Rule, requires subscription cancellations to be as easy as sign-ups. The FTC cited a reassessment of the burden of immediate compliance as the reason for the delay. While enforcement will begin July 14th, the FTC remains open to amending the rule if problems arise during implementation.

The Gig Trap: How Algorithmic Exploitation is Hurting US Gig Workers

2025-05-12
The Gig Trap: How Algorithmic Exploitation is Hurting US Gig Workers

A new Human Rights Watch report exposes the dark side of seven major US digital labor platforms, including Uber and DoorDash. These platforms misclassify gig workers as independent contractors, evading employer responsibilities and using opaque algorithms to control wages and job assignments. This results in workers earning far below minimum wage, lacking social protection, and facing constant fear of termination. The report highlights the extreme economic insecurity of these workers while the platform companies rake in billions. It calls for stronger government regulation to protect gig workers' rights.

UK Creative Industry Fights Back Against AI Copyright Loopholes

2025-05-12
UK Creative Industry Fights Back Against AI Copyright Loopholes

Over 400 leading UK media and arts professionals have penned a letter to the Prime Minister opposing an amendment to the Data (Use and Access) Bill. This amendment would allow AI models to use copyrighted works, causing concerns about widespread copyright infringement. While an opt-out is proposed, the group, including Paul McCartney, Elton John, Coldplay, and numerous media organizations, argues it's insufficient. They demand transparency, forcing AI companies to disclose copyrighted works used in training, protecting creators and fostering a vibrant UK creative industry. The letter highlights the economic impact and the need to prevent years of potential copyright theft.

Crypto Dev's Fake Suicide Video Exposed

2025-05-12
Crypto Dev's Fake Suicide Video Exposed

Jeffy Yu, a 23-year-old cryptocurrency developer, seemingly took his own life in a video released days before his birthday. A flattering obituary followed, hailing him as a tech prodigy, and a memecoin was even created in his honor. However, online sleuths quickly uncovered inconsistencies, debunking the video's authenticity and leading to the obituary's disappearance. The Standard ultimately located Yu at his parents' home, where he confessed to orchestrating the hoax due to online harassment. Yu is the creator of Zerebro, a cryptocurrency with a $44 million market cap, a fraction of Bitcoin's $2 trillion. This incident highlights the speculation and misinformation prevalent in the crypto space.

Massive Underground Water Reservoir Discovered on Mars

2025-05-12
Massive Underground Water Reservoir Discovered on Mars

New research using seismic data from NASA's InSight mission has revealed evidence of a vast liquid water reservoir deep beneath the Martian surface, between 5.4 and 8 kilometers below. This reservoir could contain enough water to cover the entire planet, matching estimates of Mars's "missing" water. This discovery not only explains the fate of Mars' ancient oceans but also opens exciting new avenues for future exploration and the search for extraterrestrial life. The subsurface water could support simple life forms and even provide valuable resources for future human explorers.

Tech

US Copyright Chief Fired After AI Fair Use Report

2025-05-12
US Copyright Chief Fired After AI Fair Use Report

Shira Perlmutter, head of the US Copyright Office, was reportedly fired a day after the agency concluded that AI model builders' use of copyrighted material exceeded existing fair use doctrines. The report stated that AI companies cannot sustain a fair use defense under specific circumstances, putting companies like Google, Meta, OpenAI, and Microsoft at legal risk. Reasons for the firing are debated, with suggestions ranging from Perlmutter's refusal to allow Elon Musk's use of copyrighted material for AI training to a broader Trump administration policy shift on diversity. The incident escalates the AI copyright battle and sparks debate on balancing AI development with copyright protection.

Tech

Universe's Decay Rate Far Faster Than Previously Thought: 10⁷⁸ Years Until the End

2025-05-12
Universe's Decay Rate Far Faster Than Previously Thought: 10⁷⁸ Years Until the End

A team of Dutch scientists has revealed that the universe is decaying far faster than previously anticipated. Their calculations, focusing on Hawking-like radiation, predict that the longest-lasting celestial bodies, white dwarf stars, will decay in approximately 10⁷⁸ years—significantly shorter than the previously estimated 10¹¹⁰⁰ years. This research reinterprets Hawking radiation, considering the 'evaporation' of other objects like neutron stars. The team even calculated the 'evaporation' time for humans and the moon at around 10⁹⁰ years. This interdisciplinary study, combining astrophysics, quantum physics, and mathematics, offers new insights into Hawking radiation.

US-China Trade War: 90-Day Truce, Massive Tariff Cuts

2025-05-12
US-China Trade War: 90-Day Truce, Massive Tariff Cuts

In a surprise breakthrough, the US and China agreed to significantly roll back tariffs on each other's goods for 90 days, easing the punishing trade war and boosting global markets. The US will temporarily lower tariffs on Chinese goods from 145% to 30%, while China will cut tariffs on US imports from 125% to 10%. Both sides committed to establishing a mechanism for continued dialogue on economic and trade relations. The news sent global markets soaring, easing recession fears.

Copyright Showdown: Big Tech's AI Training Data Faces Legal Scrutiny

2025-05-12
Copyright Showdown: Big Tech's AI Training Data Faces Legal Scrutiny

Big Tech companies are facing a copyright battle over their use of others' content to train AI models. A new report from the US Copyright Office suggests that using copyrighted material for AI training may constitute infringement. The report distinguishes between AI models used for research and commercial purposes, stating that commercial AI models using vast amounts of copyrighted works for training, especially without authorization, may exceed fair use boundaries. The firing of the Copyright Office director shortly after the report's release has fueled speculation of a connection, highlighting the intensifying conflict between tech giants and the government.

Tech

US Research Funding Freeze: Innovation Engine Stalls

2025-05-12
US Research Funding Freeze: Innovation Engine Stalls

The US National Science Foundation (NSF) froze all outgoing funding, abruptly canceling over 1,000 research projects and halting roughly $739 million in research funds. This has caused widespread chaos in academia, forcing labs to shut down, jeopardizing graduate students' degrees, and leaving early-career faculty without grants. The article argues that this threatens the future of the US tech industry, as many tech giants' technologies originated from publicly funded university research. It calls for tech companies to reciprocate and collectively protect the research ecosystem to prevent a talent shortage.

Apple's 2027 Product Blitz: A Mostly Glass, Curved iPhone and a Home Robot?

2025-05-12
Apple's 2027 Product Blitz: A Mostly Glass, Curved iPhone and a Home Robot?

Bloomberg's Mark Gurman predicts a major Apple product launch in 2027, including a 'mostly glass, curved iPhone' with no display cutouts, marking the iPhone's 20th anniversary. This follows reports of an under-display front-facing camera for at least one 2027 model. Gurman also anticipates Apple's first foldable iPhone, smart glasses, camera-equipped AirPods and Apple Watches, and a tabletop robot with an AI assistant featuring a 'personality'. Finally, an LLM-powered Siri and new chips for server-side AI processing are also expected by 2027.

Tech

Sub-Pixel Motion Detection with Ferroelectric Polymer-Based Memristor

2025-05-12
Sub-Pixel Motion Detection with Ferroelectric Polymer-Based Memristor

Researchers have developed a novel ferroelectric random-access memory (FeRAM) using solution-processed ferroelectric P(VDF-TrFE) thin films for sub-pixel motion detection. This FeRAM, based on a passive crossbar array of capacitors, leverages the nonlinear dynamics of ferroelectric domains to effectively eliminate sneak-path issues. By switching ferroelectric domains via controlled electric field polarity, the system stores and processes image information, directly extracting image differences. This enables applications like calculating derivatives of mathematical functions and identifying moving objects. The system boasts high accuracy, low power consumption, and eliminates the need for additional memory units, showing significant potential for applications in video surveillance and defect detection.

Faster, More Accurate Stellarator Design: A Fusion Energy Breakthrough

2025-05-11
Faster, More Accurate Stellarator Design: A Fusion Energy Breakthrough

Researchers from UT Austin, Los Alamos National Lab, and Type One Energy Group have achieved a significant breakthrough in fusion energy research. They've developed a novel method for designing leak-proof magnetic confinement systems in stellarators, a type of fusion reactor. This new method, leveraging symmetry theory, is 10 times faster than previous gold-standard methods without sacrificing accuracy, solving a 70-year-old problem and significantly accelerating the path towards clean energy.

Biomass Satellite: Precisely Measuring Forest Carbon Storage to Combat Climate Change

2025-05-11
Biomass Satellite: Precisely Measuring Forest Carbon Storage to Combat Climate Change

The European Space Agency and Airbus have developed the Biomass satellite, the first of its kind to directly measure forest carbon storage using P-band radar. Overcoming previous limitations of indirect measurement, Biomass uses its P-band radar to penetrate the canopy and precisely measure carbon stored in trunks and large branches, providing crucial data for assessing the impact of climate change. While the satellite's radar must be switched off over North America and Europe to avoid interference, its data collection in regions like the Amazon rainforest will fill critical information gaps, informing climate policy. This is vital in combating global warming by reducing atmospheric carbon dioxide levels.

Spaceport America: Beyond Virgin Galactic

2025-05-11
Spaceport America: Beyond Virgin Galactic

Spaceport America in New Mexico is striving to transcend its association with Virgin Galactic, showcasing its potential as a versatile commercial space launch complex. Beyond its existing tenants like Virgin Galactic, it's actively expanding, including building new hangars, developing vertical and horizontal launch capabilities, and exploring new ventures such as data centers and electromagnetic pulse facilities. The spaceport aims to become a comprehensive launch and re-entry center, attracting clients like the Department of Defense. Its inland location offers advantages in security and rapid turnaround times.

Tech New Mexico

The Rise and Fall of Bell Labs: A Lesson in Innovation

2025-05-11
The Rise and Fall of Bell Labs: A Lesson in Innovation

This article explores the success and demise of Bell Labs. Its brilliance stemmed from a unique management style: granting brilliant scientists radical freedom and autonomy, fostering collaboration and innovation, and having visionary leaders select appropriate projects and talent. However, the information age and modern corporations' focus on short-term gains made this model difficult to replicate. The article argues that reviving the Bell Labs spirit requires giving scientists more freedom and time to achieve breakthroughs in technological innovation.

Whoop 5.0 Upgrade U-Turn: Free or Fee?

2025-05-11
Whoop 5.0 Upgrade U-Turn: Free or Fee?

Fitness tracker maker Whoop faced a backlash over its Whoop 5.0 upgrade policy. Initially, Whoop announced users would need to pay extra or extend subscriptions to upgrade, contradicting its previous promise of free upgrades. This sparked outrage. Facing criticism, Whoop quickly revised its policy, offering free upgrades to users with over 12 months remaining on their subscription and allowing shorter-term subscribers to extend for a free upgrade. While Whoop claimed this was a response to user feedback, some users questioned the veracity of its prior free upgrade claims. The incident highlights the importance of product upgrade strategies and user communication.

1 2 78 79 80 82 84 85 86 194 195