Category: Tech

Apple Finally Lets You Migrate Purchases Between Accounts

2025-02-12
Apple Finally Lets You Migrate Purchases Between Accounts

Apple released a new support document detailing how users can migrate their movie, music, and app purchases from older iTools/.Mac/MobileMe/iTunes accounts to their primary Apple ID. This long-awaited feature addresses the fragmentation of accounts that many long-time users have experienced. The migration process takes place on an iPhone or iPad within the Settings app, under 'Media & Purchases'. However, there are limitations: only one migration per year is allowed, child accounts and Family Sharing are not supported, and the feature is unavailable in the EU, UK, and India.

Syria's First Tech Conference in 50 Years: A Spark of Hope Amidst Reconstruction

2025-02-12
Syria's First Tech Conference in 50 Years: A Spark of Hope Amidst Reconstruction

Following the end of the Syrian civil war, a group of Silicon Valley entrepreneurs and tech leaders gathered in Damascus for SYNC 25, the first independent tech conference in 50 years. The conference aimed to connect Silicon Valley with Syria's emerging tech ecosystem and create 25,000 tech jobs over five years. Despite challenges like poor infrastructure, unreliable electricity, and slow internet, Syria boasts resilient and talented software engineers. SYNC 25 represents a significant step in rebuilding Syria's economy and infrastructure, offering a spark of hope for the future.

Is the Race for Mobile Bandwidth Over? 1Gbps May Be Enough

2025-02-12
Is the Race for Mobile Bandwidth Over? 1Gbps May Be Enough

The global race to expand mobile bandwidth may be nearing its end. Data shows that terrestrial and mobile data growth is slowing, and data rate demand may peak below 1 Gbps in the next few years. Current mainstream consumer applications require far less than 1 Gbps, even high-bandwidth applications like Microsoft Flight Simulator 2024. While future technologies like AI, autonomous driving, and the metaverse may increase bandwidth demand, existing 4G and 5G networks appear sufficient. Telecom companies should shift their R&D focus from bandwidth expansion to cost control and service improvement to adapt to the new reality of slowing bandwidth growth.

Tech bandwidth

UK Secretly Demands Apple Weaken iCloud Encryption: A Privacy Nightmare

2025-02-12
UK Secretly Demands Apple Weaken iCloud Encryption: A Privacy Nightmare

The UK government secretly demanded Apple weaken the end-to-end encryption in its iCloud Advanced Data Protection (ADP) system, raising major privacy concerns. This system is designed to protect user data from unauthorized access, but the UK's request would allow it to secretly access user data. This not only threatens the privacy of UK users but also sets a dangerous precedent for other countries, potentially jeopardizing global data security. The author urges Apple to accelerate the rollout of end-to-end encryption and suggests US legislation prohibiting US companies from installing encryption backdoors at the request of foreign governments.

Most Energetic Neutrino Ever Detected by Mediterranean Sea Telescope

2025-02-12
Most Energetic Neutrino Ever Detected by Mediterranean Sea Telescope

Scientists using the Cubic Kilometre Neutrino Telescope (KM3NeT) in the Mediterranean Sea have detected the highest-energy neutrino ever recorded. The particle, with an energy of 120 PeV, likely originated from a distant galaxy and traveled almost horizontally across the Earth. Detected in February 2023, the event wasn't analyzed until early 2024, revealing a groundbreaking discovery in high-energy astrophysics.

LSD Dose-Response Study: A Double-Blind, Placebo-Controlled Crossover Trial

2025-02-12
LSD Dose-Response Study: A Double-Blind, Placebo-Controlled Crossover Trial

This study employed a double-blind, placebo-controlled, crossover design with six experimental sessions to investigate the effects of varying doses of LSD (25µg, 50µg, 100µg, 200µg, and 200µg 1 hour post-ketanserin administration) on healthy participants. Sixteen subjects underwent assessments of subjective effects, physiological responses, plasma BDNF levels, and LSD plasma concentrations. The findings provide insights into LSD's mechanism of action. This research falls under the Tech category.

Hiding Secrets in Emojis: Exploiting Unicode Variation Selectors

2025-02-12
Hiding Secrets in Emojis: Exploiting Unicode Variation Selectors

A Hacker News comment sparked a discussion about hiding information using Unicode variation selectors. This article demonstrates that arbitrary data can be encoded into a single emoji by converting data into a sequence of Unicode variation selectors, remaining invisible after rendering. This method can bypass human content filters or be used for text watermarking, enabling covert information transmission and tracking. While this technique has potential for abuse, it also highlights the complexity and potential security challenges of Unicode.

Cheap Smartwatch Security Flaw Exposes Sensitive Health Data

2025-02-12
Cheap Smartwatch Security Flaw Exposes Sensitive Health Data

A security researcher reverse-engineered a low-cost smartwatch, revealing a critical vulnerability. The watch, using the VeryFit app, lacks authentication, allowing anyone to connect and access sensitive health data—activity, sleep, heart rate, even menstrual cycles—without any security measures. The researcher created a website to extract and convert this data to TCX format. This highlights the security risks of budget smartwatches and underscores the need for user caution.

Massive Supply Chain Attack: Malware Delivered via Abandoned Amazon S3 Buckets

2025-02-12

Researchers registered roughly 150 abandoned Amazon S3 buckets for around $400, finding they contained software libraries still in use. These buckets received eight million requests in two months, highlighting a massive vulnerability. An attacker could easily inject malware into these libraries, spreading it widely through software updates – a SolarWinds-style attack on a much larger scale. The abandonment of these buckets leaves developers unable to automatically patch vulnerabilities, giving attackers control over updates and hindering vendor identification of affected software. This underscores the critical flaws in software supply chain security; fixing it will be both difficult and expensive.

NASCAR's Next Gen: How 3D Printing is Revolutionizing Race Car Design

2025-02-12
NASCAR's Next Gen: How 3D Printing is Revolutionizing Race Car Design

NASCAR's Next Gen platform utilizes 3D printing, specifically additive manufacturing by Stratasys, to create custom race car parts. This allows for greater design freedom and faster iteration compared to traditional subtractive methods like CNC machining. Stratasys provides parts like ducts, covers, and brackets, significantly reducing costs and lead times. The partnership with Joe Gibbs Racing highlights the advantages of 3D printing for rapid prototyping and problem-solving, exemplified by the quick creation of a custom fixture for a problematic tube. The faster, cheaper, and less skill-intensive nature of 3D printing gives NASCAR teams a significant competitive edge.

EU Launches €200 Billion AI Investment Plan to Rival US

2025-02-12
EU Launches €200 Billion AI Investment Plan to Rival US

The European Commission announced a €200 billion investment in AI, with €20 billion allocated to AI gigafactories for collaborative development of complex AI models. This ambitious plan aims to compete with massive US investments like OpenAI's $500 billion initiative. The gigafactories, boasting 100,000 next-generation AI chips each, will provide crucial computing power for companies of all sizes, fostering the growth of trustworthy AI. Funding will leverage existing EU programs and encourage member state contributions, creating the world's largest public-private partnership for AI development.

Critical YouTube Flaw Leaks User Emails via Pixel Recorder

2025-02-12
Critical YouTube Flaw Leaks User Emails via Pixel Recorder

A critical vulnerability in YouTube allows attackers to leak the email address of any YouTube user by exploiting the Google Pixel Recorder service. The attack chain involves first obtaining the user's obfuscated Gaia ID through YouTube's /get_item_context_menu endpoint. Then, by leveraging Pixel Recorder's sharing functionality and bypassing notification mechanisms, the attacker converts the Gaia ID into the email address. While the exploit requires a complex chain of steps, its impact is significant, resulting in a $10,500 bounty from Google.

SEC's X Account Hijacked in Bitcoin Pump-and-Dump Scheme

2025-02-12
SEC's X Account Hijacked in Bitcoin Pump-and-Dump Scheme

An Alabama man pleaded guilty to identity theft and access device fraud for hijacking the US Securities and Exchange Commission's (SEC) X account to artificially inflate Bitcoin's price. He and his co-conspirators falsely claimed the SEC approved Bitcoin ETFs. Bitcoin's price surged before plummeting after the SEC's chairman debunked the claim. The hack exploited SIM swapping, a social engineering technique to gain control of accounts. This case highlights the vulnerability of cryptocurrency markets and the dangers of SIM swapping.

A Retro Computing Odyssey: The Mystery of the Yellow Commodore Disks

2025-02-12

This article recounts the author's discovery of a set of unusual Commodore 64/128 disks, 'Penny Farthing,' created by the late Commodore enthusiast David Mohr (Lord Ronin). These bright yellow disks contained chapters of Mohr's science fiction story and games by the late interactive fiction author Paul Panks. Accessing the disks required specialized Commodore hardware and software (like Wheels GEOS), highlighting the allure of retro computing and its niche community. The story pays tribute to Mohr and Panks, and their contributions to the Commodore scene.

Tech

US Warns Against AI Deals with Authoritarian Regimes, Exacerbating Tensions with Allies

2025-02-12
US Warns Against AI Deals with Authoritarian Regimes, Exacerbating Tensions with Allies

US Deputy Secretary of Commerce Don Graves delivered a strong message at an AI summit, cautioning countries against AI deals with "authoritarian regimes" and asserting the US's unwavering leadership in AI. This contrasted sharply with a jointly signed declaration advocating international cooperation, prompting concerns from participating nations about US unilateralism. These nations expressed disagreement with US terminology regarding multilateralism and international collaboration, and voiced suspicion over a French-initiated AI fund. This move is interpreted as a US response to European and other nations' attempts to challenge its dominance in AI, sparking debate over the future of global AI governance.

Tech

Tesla's European Sales Crash: Model Y Transition and the Musk Effect

2025-02-12
Tesla's European Sales Crash: Model Y Transition and the Musk Effect

Tesla's January sales in Germany plummeted nearly 60% year-over-year, mirroring a broader European slump. The downturn is attributed to the Model Y transition and negative sentiment surrounding Elon Musk's political actions. While the overall German auto market declined only 2.8%, the electric vehicle market grew by 53.5%, highlighting Tesla's unique challenges. While Tesla will likely cite the Model Y transition, the 'Musk effect' is undeniable, potentially impacting the entire EV industry.

Tech

Tesla's Reign in China: Power, Lawsuits, and Silence

2025-02-12
Tesla's Reign in China: Power, Lawsuits, and Silence

Tesla's success in the Chinese market is inextricably linked to its aggressive suppression of critics. This article exposes numerous instances where Tesla sued car owners and media outlets in China, almost always winning. It details how Tesla's connections with high-ranking Chinese officials secured preferential treatment and policies. The case of Zhang Yazhou, a car owner sued and defeated for publicly questioning Tesla's brake system, highlights concerns about Tesla using legal means to silence critics and harm consumer rights. This underscores Tesla's unique business model in China and the intertwined relationship between power and capital in influencing business operations and public opinion.

Sustainable Polymerization Revolution: Degradable Thermosets Arrive

2025-02-12
Sustainable Polymerization Revolution: Degradable Thermosets Arrive

Cornell researchers have developed a novel degradable thermoset plastic made from bio-based materials, offering both durability and recyclability. This material uses orthogonal polymerization of a single monomer, first creating a flexible polymer chain, then using remaining monomer for a second polymerization to form a tough, cross-linked polymer. By controlling light exposure and catalysts, material properties can be adjusted. This innovation promises a sustainable alternative to current non-degradable petroleum-based thermosets, offering a potential solution to plastic pollution.

FTC Cracks Down on DoNotPay's Misleading 'Robot Lawyer'

2025-02-12
FTC Cracks Down on DoNotPay's Misleading 'Robot Lawyer'

The Federal Trade Commission (FTC) has ordered DoNotPay to cease deceptive marketing of its AI chatbot as a “robot lawyer.” The FTC argued that DoNotPay’s claims were unsubstantiated, failing to meet the standards of a human lawyer in generating legal documents and advice. The final order includes a $193,000 penalty, notification to affected consumers (2021-2023 subscribers), and a ban on advertising its service as a lawyer’s replacement without sufficient evidence.

Massive Lexipol Data Leak Exposes Police Policy Controversies

2025-02-12
Massive Lexipol Data Leak Exposes Police Policy Controversies

Thousands of files from Lexipol, a company providing policy manuals and training materials to law enforcement agencies, have been leaked by hackers. These manuals, while customized, have drawn criticism for potentially hindering police reform and failing to address local community needs. The leaked data includes sensitive user information, raising privacy concerns. Lexipol has faced previous accusations from the ACLU of contributing to racial profiling and unlawful detentions through its policies. This breach highlights the lack of transparency in police policymaking and the influence of private companies on public safety.

Tumblr's Fediverse Integration: A WordPress Migration Play

2025-02-12
Tumblr's Fediverse Integration: A WordPress Migration Play

Tumblr, owned by Automattic, is integrating with the fediverse via a planned migration to the WordPress infrastructure. Once complete, all Tumblr users will gain ActivityPub federation, mirroring current WordPress.com functionality. This move also opens doors to other open web integrations like custom plugins and themes. While Automattic hasn't revealed a timeline, this migration is a significant step towards Tumblr's promised fediverse integration, offering users a more open and interconnected social experience. Integration with the AT Protocol (Bluesky) remains unconfirmed.

Tech

BYD's Free Self-Driving Tech Shakes Up the EV Industry

2025-02-12
BYD's Free Self-Driving Tech Shakes Up the EV Industry

BYD, China's largest carmaker, has disrupted the electric vehicle market by offering its cutting-edge "God's Eye" advanced driver-assistance system (ADAS) for free on all its models, including its cheapest. This move democratizes autonomous driving technology, potentially sparking a price war and significantly impacting rivals like Tesla. BYD's undercutting of competitors, particularly in the Chinese market, and its potential impact on European sales are noteworthy. Tesla's stock price dropped following the announcement, while BYD's surged.

Tech

US, UK, and Australia Sanction Russian 'Bulletproof Hosting' Provider Zservers

2025-02-11
US, UK, and Australia Sanction Russian 'Bulletproof Hosting' Provider Zservers

The US, UK, and Australia have jointly sanctioned Zservers, a Russian 'bulletproof hosting' provider, and several individuals linked to it. Zservers provided services to the LockBit ransomware operation, helping them evade law enforcement. This trilateral action aims to disrupt cybercrime and protect national security. Sanctions target Zservers, its UK subsidiary XHOST Internet Solutions, and six key individuals, two of whom are alleged Zservers administrators accused of providing services to LockBit and other ransomware groups, and managing related cryptocurrency transactions.

Tech

NOAA: The Unsung Hero Behind US Weather Forecasts

2025-02-11
NOAA: The Unsung Hero Behind US Weather Forecasts

Ever wonder how those effortless-looking weather forecasts come to be? The answer is NOAA (National Oceanic and Atmospheric Administration). NOAA uses a vast network of satellites, airplanes, radar, weather balloons, and buoys to gather real-time data, which is then processed by sophisticated computer models and experienced meteorologists to create accurate weather forecasts and warnings. This data is freely accessible to the public and widely used by various industries, from aviation to agriculture. NOAA's public nature and reliability make it irreplaceable.

Tech

Chrome's AI-Powered Password Savior: Auto-Replacing Compromised Credentials

2025-02-11
Chrome's AI-Powered Password Savior: Auto-Replacing Compromised Credentials

A new AI feature in Chrome Canary automatically replaces passwords compromised in data breaches. When Chrome detects a leaked password, it offers to generate and store a stronger replacement upon login. This simplifies password management and enhances security, with passwords encrypted within Google's Password Manager. The feature is currently experimental and requires enabling specific flags in Chrome's settings.

Tech

Empirical Health: Seeking Design Engineer to Revolutionize Primary Care

2025-02-11
Empirical Health:  Seeking Design Engineer to Revolutionize Primary Care

Empirical Health, a virtual-first medical service using AI and wearable health sensors, is hiring a Design Engineer. You'll build core features for their patient-facing mobile app (React Native, TypeScript), crafting intuitive data visualizations, designing GenAI UI patterns beyond chat, and launching features to improve AI-driven care plans. They emphasize rapid iteration, impactful work, and a small, experienced team. This role offers a unique opportunity to make a real difference in healthcare.

Thomson Reuters Wins Major AI Copyright Case: A Blow to Generative AI

2025-02-11
Thomson Reuters Wins Major AI Copyright Case: A Blow to Generative AI

Thomson Reuters has won a landmark AI copyright lawsuit against Ross Intelligence, a legal AI startup. The court rejected Ross's fair use defense, finding its intent was to compete with Westlaw. This ruling is a significant setback for generative AI companies, potentially impacting future cases. Many AI tools were trained on copyrighted material, and this decision suggests that the common fair use arguments may not hold up. While Ross Intelligence shut down in 2021 due to litigation costs, financially strong companies like OpenAI and Google are better positioned to withstand prolonged legal battles.

Tesla Cybertruck's FSD Crashes into Pole: Owner Praises Safety, Ignores System Failure

2025-02-11
Tesla Cybertruck's FSD Crashes into Pole: Owner Praises Safety, Ignores System Failure

A Tesla Cybertruck owner lauded Tesla's passive safety after his Full Self-Driving (FSD) system crashed the vehicle into a utility pole in Reno, Nevada. The FSD system failed to merge lanes, resulting in a collision with a curb and then a pole. While the owner walked away unscathed, he admitted to inattention. However, the incident highlights a significant flaw in the FSD system's basic lane-merging capabilities and the unquestioning loyalty of some Tesla owners, raising concerns about the safety of autonomous driving technology.

Tech Accident

UK Alone Among G10 Meets Paris Agreement's 1.5C Goal

2025-02-11
UK Alone Among G10 Meets Paris Agreement's 1.5C Goal

Over 170 countries missed a UN deadline to submit updated emissions-cutting plans, but the UK stands out. It's the only G10 nation with a strategy aligned with the Paris Agreement's 1.5C target, pledging an 81% emissions reduction by 2035 (vs. 1990 levels). Major economies like the US and China failed to submit plans consistent with this goal. Despite economic challenges and political headwinds, the UK remains committed, leveraging early successes like coal power phase-out. However, challenges remain, including large-scale carbon capture and widespread adoption of electric vehicles and heat pumps.

Japan's Interdisciplinary Research Crisis and Path to Breakthrough

2025-02-11
Japan's Interdisciplinary Research Crisis and Path to Breakthrough

Japanese research has long been hampered by disciplinary silos, with interdisciplinary research severely lacking funding support, leading to a decline in innovation. The article argues that Japanese research funding agencies should learn from Western counterparts, shifting from project-based funding to supporting talented researchers, embracing high-risk, high-reward interdisciplinary projects, and expanding the diversity of their review panels. This would foster interdisciplinary research and enhance Japan's global competitiveness in science. The Okinawa Institute of Science and Technology Graduate University (OIST) serves as a successful example with its flexible funding model and emphasis on interdisciplinary collaboration.

1 2 139 140 141 143 145 146 147 184 185