Category: Tech

Revolutionary Laser-Free Alternative to LASIK Emerges

2025-08-18
Revolutionary Laser-Free Alternative to LASIK Emerges

Scientists have developed a non-invasive surgical technique called electromechanical reshaping (EMR) that promises to revolutionize vision correction. This technique uses an electric potential to alter the pH of the cornea, making it malleable, and then shapes the cornea using a platinum 'contact lens' template to correct vision. Animal tests showed EMR is comparable to LASIK in correcting myopia, but without incisions, with less expensive equipment, and potentially reversible, even reversing some chemical-induced corneal cloudiness. While still in its early stages, EMR holds significant promise as a safer and more affordable vision correction method.

Birdsong Echoes Human Language Rule: Zipf's Law Discovered in Avian Vocalizations

2025-08-18
Birdsong Echoes Human Language Rule: Zipf's Law Discovered in Avian Vocalizations

Researchers from the University of Manchester and Chester Zoo have uncovered a hidden pattern in birdsong mirroring a core principle of human language – Zipf's Law of Abbreviation (ZLA). This law states that more frequently used sounds tend to be shorter, increasing communication efficiency. Using a new open-source tool, ZLAvian, they analyzed over 600 songs from 11 bird populations across seven species. While individual variation was significant, the overall data revealed that more frequently used birdsong phrases were shorter on average. This finding offers new insights into animal communication and the potential application of the 'principle of least effort' in avian vocalizations.

Tech

The Internet's Missing Piece: A Secure and Simple Identity System

2025-08-18
The Internet's Missing Piece: A Secure and Simple Identity System

This article critiques the internet's flawed design separating identity verification from payments, leading to insecure and complex systems like passwords and third-party accounts. It proposes an ideal system: a single tap verifies identity and enables payments, offering security, ease, and user control. While the concept of 'being your own bank' was initially hampered by high barriers to entry, new tools like social recovery, smart wallets, and passkeys are simplifying secure, self-owned digital identities. The future promises a secure and user-friendly identity system, enabling safe digital lives without requiring users to be crypto experts.

Viking Hoard Reveals Surprising Trade Links Between England and the Islamic World

2025-08-18
Viking Hoard Reveals Surprising Trade Links Between England and the Islamic World

A Viking-Age silver hoard unearthed in Bedale, North Yorkshire, is rewriting our understanding of Viking-era trade. Analysis reveals that a significant portion of the silver, dating back to the 9th-10th centuries AD, originated not from local plunder but from the Islamic world, specifically Iran and Iraq. This silver traveled along established trade routes, reaching Scandinavia and eventually England. The discovery challenges the simplistic 'Viking raider' stereotype, highlighting the sophisticated trade networks and economic integration of Viking-Age England within a broader Eurasian economic system. The hoard's contents, including ingots, necklaces, and a sword pommel, demonstrate the Vikings' ability to refine and recast silver, blending Eastern and Western materials, showcasing cultural fusion alongside economic exchange.

Dating App TeaOnHer Exposed Thousands of User's Private Data Due to Critical Security Flaws

2025-08-18
Dating App TeaOnHer Exposed Thousands of User's Private Data Due to Critical Security Flaws

TeaOnHer, a dating gossip app designed for men to share information about women they claim to have dated, suffered a major security breach exposing thousands of users' personal information, including driver's license photos and other government-issued IDs. TechCrunch reporters discovered easily exploitable flaws, including exposed admin panel credentials and an API allowing unauthenticated access to user data. The app's developer, Xavier Lampkin, failed to respond to multiple requests for comment and didn't commit to notifying affected users or regulators. While the vulnerabilities have since been patched, the incident highlights the critical need for developers to prioritize user data security.

Airbus A320 Family Poised to Surpass Boeing 737 as Top-Delivered Airliner

2025-08-18
Airbus A320 Family Poised to Surpass Boeing 737 as Top-Delivered Airliner

Airbus's A320 family of narrow-body jets is on the verge of surpassing Boeing's 737 family as the world's most-delivered commercial airliner, according to Cirium data. This milestone, nearly four decades in the making, marks a significant win for Airbus in its long-standing competition with Boeing. The A320's success is attributed to its innovative fly-by-wire technology, flexible engine options, and the fuel-efficient 'neo' variant, while Boeing's 737 MAX grounding provided a crucial opportunity. Despite Boeing's early lead, Airbus's continuous improvements and innovations have propelled the A320 to surpass its rival in delivery numbers.

Duolingo's Wild Ride: AI's Double-Edged Sword

2025-08-18
Duolingo's Wild Ride: AI's Double-Edged Sword

Language learning platform Duolingo saw its stock surge 30% after a strong quarter, only to plummet after OpenAI's GPT-5 demonstrated the ability to create a language-learning app with a simple prompt. This highlights AI's double-edged sword: it can fuel growth, but also bring disruptive competition. While Duolingo embraces AI, its advantages proved fragile against GPT-5, serving as a warning to software companies about the rapid disruptive potential of AI.

Tech

Android's pKVM Achieves SESIP Level 5 Certification: A New Era for Mobile Security

2025-08-18
Android's pKVM Achieves SESIP Level 5 Certification: A New Era for Mobile Security

Google announced that pKVM (protected KVM), the hypervisor powering Android's Virtualization Framework, has achieved SESIP Level 5 certification—a first for a software security system designed for large-scale deployment in consumer electronics. This allows Android to securely support next-generation high-criticality isolated workloads, such as on-device AI processing ultra-personalized data, with the highest assurances of privacy and integrity. The certification, conducted by Dekra and compliant with EN-17927, includes AVA_VAN.5, the highest level of vulnerability analysis and penetration testing. This achievement sets a cornerstone for Android's multi-layered security strategy and provides device manufacturers with a robust, open-source firmware base.

US EV Market Plateaus: High Prices and Hybrid Competition Stall Growth

2025-08-18
US EV Market Plateaus: High Prices and Hybrid Competition Stall Growth

US electric vehicle registrations rose 4.6% year-over-year in June 2025, but market share remained flat at 7.5%, with Tesla declining and General Motors surging. Data reveals a slowing EV market, primarily due to high prices; the average transaction price was $56,910. Consumers anticipate more affordable EVs (around $30,000) in the coming years, like Nissan's upcoming 2026 Leaf. The rise of hybrid vehicles is also diverting some demand. While a short-term sales surge is expected in Q3 due to the expiring $7,500 federal tax credit, the market is poised for increased volatility afterward.

Tech

AI-Powered Scam Tricks Google User

2025-08-18
AI-Powered Scam Tricks Google User

Alex Rivlin, a Las Vegas real estate executive, fell victim to a sophisticated AI-powered scam while booking a cruise shuttle. He used a Google search result, an AI-generated overview, to find a customer service number that turned out to be fraudulent. The scammer, posing as Royal Caribbean customer service, obtained his credit card information and charged him $768. Experts warn that this is a new twist on old scams, leveraging AI to spread misinformation and trick users. Google's AI Overviews and even ChatGPT were found to be displaying the fraudulent number, highlighting the vulnerability of these AI tools to manipulation. The incident serves as a stark warning about the evolving nature of online scams and the need for increased vigilance.

Tech AI scam

Napster's Legacy: How the Music Industry Blew It (and Apple Saved the Day)

2025-08-18
Napster's Legacy: How the Music Industry Blew It (and Apple Saved the Day)

The story of Primitive Radio Gods perfectly encapsulates the music industry's disastrous response to the digital revolution. Their hit song led to a rushed album release full of demos, angering fans and paving the way for Napster. Subsequent attempts like MusicNet and Pressplay, hampered by DRM, internal conflicts, and a user-unfriendly design, ultimately failed. It wasn't until Apple's iTunes, with its user-centric approach, that the industry found its footing, highlighting the importance of prioritizing the customer experience.

Tech

Leeches: An Ancient Remedy's Modern Comeback?

2025-08-18
Leeches: An Ancient Remedy's Modern Comeback?

Hirudotherapy, the use of leeches in medicine, is experiencing a resurgence. This article delves into the history of leech therapy, from ancient Chinese medicine to its modern applications in reconstructive surgery. Leeches' saliva contains bioactive compounds like hirudin, possessing anticoagulant and anti-inflammatory properties. Despite a lack of large-scale clinical trials, leech therapy shows promise in certain contexts, such as improving blood flow in reconstructive surgery. However, infection risks and limited funding hinder further development.

Google Hit with $55M Fine for Anti-Competitive Practices in Australia

2025-08-18
Google Hit with $55M Fine for Anti-Competitive Practices in Australia

The Australian Competition and Consumer Commission (ACCC) has filed suit against Google, alleging anti-competitive agreements with Telstra and Optus to pre-install Google Search on Android phones. Google has admitted liability and will pay a $55 million penalty. The agreements limited competition from other search engines. The ACCC also secured commitments from Google to remove restrictions on pre-installation and default search engines, potentially opening the market to competitors and offering Australian consumers greater search choice, especially with the rise of AI search tools.

Tech

Astronaut Captures Rare Gigantic Jet from ISS

2025-08-18
Astronaut Captures Rare Gigantic Jet from ISS

NASA astronaut Nichole Ayers captured a stunning image from the International Space Station, revealing a gigantic jet, a rarer phenomenon than sprites, a type of Transient Luminous Event (TLE). Gigantic jets are powerful electrical discharges extending from thunderstorm tops into the upper atmosphere, requiring specific turbulent conditions to form. Unlike sprites, which form higher in the atmosphere after lightning strikes, gigantic jets erupt directly upwards from the thundercloud top, creating an electrical bridge between the cloud and upper atmosphere. This discovery provides valuable data for studying atmospheric electricity.

Critical Flaw in Carmaker's Portal Exposes Customer Data, Enables Remote Vehicle Access

2025-08-17
Critical Flaw in Carmaker's Portal Exposes Customer Data, Enables Remote Vehicle Access

Security researcher Eaton Zveare discovered a critical vulnerability in a major automaker's online dealership portal. The flaw allowed the creation of an admin account, granting access to sensitive data from over 1,000 dealerships. This included customer personal and financial information, vehicle tracking data, and the ability to remotely control vehicle functions. Exploiting a weakness in the login system, Zveare bypassed authentication and created a 'national admin' account. While patched in February 2025, the vulnerability highlights significant security risks in car dealership systems.

Tech

Juno Probe Could Intercept Interstellar Comet 3I/ATLAS

2025-08-17
Juno Probe Could Intercept Interstellar Comet 3I/ATLAS

A team led by Harvard's Professor Abraham Loeb proposes a daring plan: using NASA's Juno probe, already in orbit, to intercept the interstellar comet 3I/ATLAS as it approaches Jupiter. The plan leverages Juno's proximity to Jupiter on March 16th, 2026, for an orbital adjustment to enable a rendezvous with 3I/ATLAS. This would mark humanity's first close-up observation of an interstellar object, providing invaluable data to study its composition, origin, and the possibility of it being an artificial construct. While 3I/ATLAS's diameter may be smaller than initially estimated, the intercept remains scientifically significant, offering a unique opportunity to unveil the mysteries of interstellar space.

Rebooting the 80s: My BBC Master and the UK's Computer Education Push

2025-08-17
Rebooting the 80s: My BBC Master and the UK's Computer Education Push

This post details the author's rediscovery of their BBC Master microcomputer from the 1980s. This machine, featuring a 65C12 processor, 128KB of RAM, and a 5 1/4" floppy drive, was a key part of the UK government's ambitious program to integrate computers into education. The author reminisces about the government's investment in computer literacy, the BBC Master's role in schools, and contrasts it with computers used in schools in other countries like the Commodore PET and Apple II. Despite its high cost, the BBC Master's superior BASIC and expansion capabilities made it a lasting legacy.

Ex-Intel Employee Gets Probation for Stealing Trade Secrets to Land Microsoft Job

2025-08-17
Ex-Intel Employee Gets Probation for Stealing Trade Secrets to Land Microsoft Job

A former Intel employee, Varun Gupta, was sentenced to two years' probation and fined $34,472 for stealing thousands of files containing trade secrets. These files reportedly aided him in securing a position at Microsoft and were used in processor purchasing negotiations with Intel. While the prosecution sought an eight-month prison sentence, the judge considered Gupta's reputational damage and the $40,000 he already paid in a civil settlement. Gupta has since relocated to France and is pursuing a career in the wine industry.

Tech

16 Billion Passwords Exposed? Not Quite.

2025-08-17
16 Billion Passwords Exposed? Not Quite.

A recent headline claiming 16 billion passwords were exposed in a record-breaking breach sparked widespread concern. Security expert Troy Hunt investigated and found the reality far less alarming. The data wasn't from a single breach, but aggregated from multiple infostealer datasets. Significant duplication existed, with most email/password combinations already in the Have I Been Pwned (HIBP) database. Only 4.4 million unique email addresses were newly added. The sensationalized headline misrepresented the situation, highlighting the need for a more nuanced understanding of data breaches.

Tech

Uranus: Not as Cold and Dead as We Thought

2025-08-17
Uranus: Not as Cold and Dead as We Thought

A new study reveals Uranus possesses internal heat, contradicting previous observations. Researchers found Uranus radiates more heat than it receives from the sun, indicating a slow release of residual heat from its formation. This discovery enhances our understanding of Uranus's origin and evolution, informing future exploration missions and potentially providing insights into Earth's climate and atmospheric processes. While Uranus's internal heat is weaker than other gas giants, its energy levels fluctuate with its lengthy 20-year seasons, likely due to its eccentric orbit and tilted spin. This research significantly supports NASA's planned Uranus mission and offers novel approaches to studying radiant energy in other planets, both within and beyond our solar system.

Photosynthesis-Inspired Green Chemistry: Making Drugs with Visible Light

2025-08-17
Photosynthesis-Inspired Green Chemistry: Making Drugs with Visible Light

Researchers at the University of Melbourne have developed a new class of photocatalysts inspired by photosynthesis, capable of absorbing energy from multiple photons using visible light to drive energy-demanding chemical reactions. This technology utilizes simple alkenes and amines to synthesize complex molecules, such as antihistamines, under mild conditions. This method is greener and safer than traditional methods and has the potential for industrial applications, opening new avenues for green chemistry.

US Launches First Commercial-Scale Battery Recycling Facility: 97% Recovery Rate

2025-08-17
US Launches First Commercial-Scale Battery Recycling Facility: 97% Recovery Rate

Princeton NuEnergy (PNE) has opened the first U.S. commercial-scale advanced black mass and battery-grade cathode active material production and recycling facility in Chester, South Carolina. Employing a low-temperature plasma-assisted separation process, the facility boasts a remarkable 97%+ recovery rate, a 38% cost reduction, and a 69% lower environmental impact compared to traditional methods. PNE plans to expand capacity to 15,000 tons annually by 2026, eventually aiming for 50,000 tons, driving a circular battery economy and securing the domestic supply chain.

Passive Microwave Repeaters: The Unsung Heroes of Telecommunications

2025-08-17
Passive Microwave Repeaters: The Unsung Heroes of Telecommunications

Post-WWII, microwave communications boomed, but line-of-sight limitations hampered its reach. This article tells the story of the Kreitzberg brothers and their invention: the passive microwave repeater. This power-free device, using reflectors to boost signals, solved communication challenges in mountainous and complex terrains. Widely adopted in the 1960s and 70s, especially in the American West, these repeaters enabled communication networks in remote areas. Now largely obsolete due to fiber optics and satellites, their ingenious design and historical significance remain noteworthy.

Itch.io's Payment Processing Predicament: Is Building Your Own System the Answer?

2025-08-16

Itch.io faced backlash after payment processors forced them to remove adult content. Many suggested Itch.io create its own payment system or use one that handles adult material. A seasoned SRE with a background in finance and tech debunks these easy solutions. The article details the immense challenges of building a payment processor: bank sponsorship, licensing, KYC/KYCC compliance, and substantial security and compliance costs. Even finding an adult-content-friendly processor (like CCBill) comes with exorbitant fees and risks. The core issue, however, is that any part of the payment chain can be influenced by political pressure or moral censorship. Switching processors won't solve Itch.io's fundamental problem. The author ultimately pleads for understanding of Itch.io's position and a search for systemic solutions, rather than simple blame or boycotts.

Is Crypto a CIA Plot for Global Domination?

2025-08-16
Is Crypto a CIA Plot for Global Domination?

This article explores theories surrounding Bitcoin's origins and its alleged ties to the CIA. The pseudonym of Bitcoin's creator, Satoshi Nakamoto, translated from Japanese, curiously resembles "Central Intelligence," fueling speculation about CIA involvement. The piece examines why intelligence agencies might be interested in cryptocurrencies – their pseudonymous nature allows for discreet fundraising, but also raises concerns about potential "backdoors" built into systems for surveillance. The article discusses the implications of cryptocurrencies for financial systems and national interests, and the challenges governments face in regulating and harnessing crypto's potential benefits while mitigating its risks.

Tech conspiracy

Arrow Stork: Solving the Mystery of Bird Migration

2025-08-16
Arrow Stork: Solving the Mystery of Bird Migration

The discovery of the Rostock Arrow Stork in 1822, a white stork with a 75cm spear embedded in its neck, revolutionized our understanding of bird migration. This single bird, carrying an African projectile, debunked theories of hibernation or transformation, proving conclusively that birds migrate long distances. While subsequent similar cases have been documented, they have decreased with the replacement of bows and arrows with guns. The Arrow Stork's legacy is a pivotal moment in ornithology, highlighting the wonders and mysteries of the natural world.

Hair-Based Toothpaste: A Sustainable Solution for Enamel Repair

2025-08-16
Hair-Based Toothpaste: A Sustainable Solution for Enamel Repair

Scientists at King's College London have discovered that keratin, a protein found in hair, skin, and wool, can repair tooth enamel and prevent early decay. This revolutionary approach utilizes minerals in saliva to create a protective layer mimicking natural enamel, eliminating the need for toxic resins. The keratin-based toothpaste or gel is projected to be available within two to three years, offering a sustainable and clinically effective alternative for dental care. This groundbreaking research marks a significant step forward in regenerative dentistry, transforming waste into a valuable clinical resource.

VW's Pay-to-Unlock Horsepower Feature Sparks Debate

2025-08-16

Volkswagen is offering a paid upgrade to unlock extra horsepower in its vehicles, sparking controversy. Owners question why this power is present but requires additional payment. VW argues this mirrors traditional options for different engine power, but shifted to a post-purchase choice. However, unofficially unlocking this power ('jailbreaking') could void warranties or invite legal action. This practice isn't unique to VW; BMW and Polestar have also offered similar paid performance upgrades.

Sunlight-Powered Flight: Battery-Free Atmospheric Explorers

2025-08-16
Sunlight-Powered Flight: Battery-Free Atmospheric Explorers

Harvard researchers have designed a battery-free, miniature flying device that uses sunlight for propulsion, allowing it to levitate in the upper atmosphere. The device consists of two ultrathin layers of aluminum oxide, generating lift through a thermal difference created by sunlight and a clever hole design, acting like a miniature 'solar-powered helicopter'. This technology promises to explore understudied regions of Earth's atmosphere, even the edge of space, opening new avenues for atmospheric science research.

Global Plastics Treaty Talks Collapse: Is Consensus Dead?

2025-08-16
Global Plastics Treaty Talks Collapse: Is Consensus Dead?

Nine days of talks in Geneva on a global plastics treaty ended without an agreement. Major disagreements arose over the final draft, particularly with oil-producing nations opposing legally binding obligations and controls on plastic production. Negotiations stalled as countries reiterated previous positions, ultimately failing to reach a deal. While all parties expressed interest in continued negotiations, the future remains uncertain unless the decision-making process changes. Environmental groups are disappointed but praise nations for prioritizing a strong treaty over a weak one.

1 2 8 9 10 12 14 15 16 183 184