Category: Tech

Using Your Apple Device as an Access Card: A Clever Hack Using a Chinese Transit Card

2025-01-19
Using Your Apple Device as an Access Card: A Clever Hack Using a Chinese Transit Card

Many have tried using their Apple device as an access card, but the closed nature of NFC and Wallet ecosystems makes this difficult. However, a Chinese transit card called "China T-Union," officially supported by Apple Wallet, offers a clever workaround. Its unique properties – a non-randomizing UID and unchanging serial number across devices – allow it to be recognized by some UID-based access control systems. While UID authentication is less secure, some systems support it as a fallback. Obtaining the card requires an Alipay account and a biometric travel document. The method is slightly convoluted, but it provides a viable solution for access systems supporting UID authentication.

TikTok Ban Takes Effect: Data Shows Sharp Traffic Drop, Shift to Alternatives

2025-01-19
TikTok Ban Takes Effect: Data Shows Sharp Traffic Drop, Shift to Alternatives

The US TikTok ban went into effect on January 19, 2025. Cloudflare data reveals a significant impact after 03:30 UTC, with DNS traffic to TikTok-related domains plummeting by as much as 85%, and traffic from ByteDance's network dropping by 95%. Concurrently, alternatives like RedNote (Xiaohongshu) saw a massive surge in traffic, with a 74% increase in the US and a staggering 500% increase in Mexico. This highlights US national security concerns and the rapid user adaptation to alternative platforms.

WWII's Unsung Heroes: How Academics Won the War

2025-01-19
WWII's Unsung Heroes: How Academics Won the War

Elyse Graham's *Book and Dagger* reveals the surprising story of how scholars and librarians became pivotal spies during WWII. These 'scholar-spies,' working primarily for the OSS, didn't engage in traditional espionage. Instead, their expertise in information gathering, organization, and analysis provided crucial intelligence advantages. By meticulously sifting through seemingly mundane sources – newspapers, maps, phone books – they uncovered vital information that shifted the tide of the war. The book highlights how their contributions redefined intelligence gathering, influencing the CIA and other agencies for decades to come.

TikTok and ByteDance Apps Pulled from US App Store

2025-01-19

Following the Protecting Americans from Foreign Adversary Controlled Applications Act, apps developed by ByteDance Ltd. and its subsidiaries, including TikTok, CapCut, and others, will be unavailable for download or updates on the US App Store starting January 19, 2025. Existing users can continue using installed apps, but re-downloads and restoration after device changes are impossible. In-app purchases and new subscriptions will also cease. This could impact app performance, security, and compatibility with future iOS and iPadOS versions.

Hubble Tension Crisis Deepens: Universe Expanding Faster Than Expected

2025-01-19
Hubble Tension Crisis Deepens: Universe Expanding Faster Than Expected

New measurements confirm the universe is expanding faster than predicted by current theoretical models, deepening the Hubble tension crisis. Researchers made extremely precise distance measurements to the Coma Cluster of galaxies, revealing an expansion rate exceeding expectations. This confirms previous, debated results, showing the universe's expansion surpasses our current understanding of physics. Using Type Ia supernovae as the first rung of a cosmic distance ladder, the team arrived at a Hubble constant of 76.5 km/s/Mpc, consistent with other local universe measurements but conflicting with predictions from the distant universe, suggesting flaws in cosmological models.

Tracing Myanmar's Military Command Chains: A Data-Driven Case Study

2025-01-19

DOT • STUDIO partnered with the Security Force Monitor (SFM) to build "Under Whose Command," a platform leveraging cutting-edge technology to precisely trace Myanmar's complex military command chains. Employing sophisticated data modeling (EAV and Datalog databases) and precise handling of time and location, the platform overcomes the challenges of dynamic and overlapping command structures, providing journalists, courts, and researchers with a powerful tool for accountability. The project successfully integrated existing research workflows with new technologies, resulting in a user-friendly and sustainably maintained public platform.

TikTok Goes Dark in the US: Overnight Ban

2025-01-19
TikTok Goes Dark in the US: Overnight Ban

Following a new federal law, TikTok has been banned in the US, rendering the popular social media app inaccessible to millions of American users overnight. Users began receiving notifications about the ban Friday evening, and by Saturday evening, the app was also removed from the Apple App Store. This event highlights US government concerns about data security and national security, and has sparked discussion about alternative social media apps.

Tech

Saving Bluesky's Protocol: Preventing the Next Tech Oligarchy

2025-01-19
Saving Bluesky's Protocol: Preventing the Next Tech Oligarchy

The experiences of Facebook and Twitter demonstrate the vulnerability of centralized social media platforms to the whims of capricious billionaires. This article calls for protecting Bluesky, built on the open AT Protocol, from a similar fate. Bluesky's decentralized architecture allows for user-defined content moderation and independent platform building, avoiding single points of control. However, the article points out Bluesky's current reliance on venture capital and advocates for creating a non-profit foundation to govern the AT Protocol, building redundant servers to ensure user data portability and platform independence, thus creating a user-driven social media ecosystem akin to Wikipedia.

TikTok Ban Fuels Mass Migration to Xiaohongshu

2025-01-19
TikTok Ban Fuels Mass Migration to Xiaohongshu

Facing a potential TikTok ban in the US, a wave of American users are migrating to the Chinese social media platform Xiaohongshu, creating an unusual surge in US-China online interaction. These self-proclaimed "TikTok refugees" are sharing their lives and engaging with Chinese users, fostering a unique cross-cultural exchange. Xiaohongshu's welcoming atmosphere and openness have provided fertile ground for this unexpected migration, creating new opportunities for understanding and communication between users from both countries.

Matrix.org Warns: Nation-Scale Matrix Deployments Will Fail

2025-01-19

Matrix.org issued a warning that nation-scale deployments of Matrix will fail if improperly built. This highlights the critical need to carefully consider architecture and scalability when building large-scale decentralized communication systems. The warning emphasizes the importance of ensuring system stability and reliability for a positive user experience.

Tech

NATO Responds to Baltic Sea Cable Cuts with Increased Naval Presence and AI Monitoring

2025-01-18
NATO Responds to Baltic Sea Cable Cuts with Increased Naval Presence and AI Monitoring

Following the suspected severing of undersea cables linking Finland and Estonia on Christmas Day, allegedly by a Russian-linked oil tanker, NATO is bolstering its response. Nearly a dozen warships will patrol the Baltic Sea to protect undersea infrastructure. Concurrently, a UK-led Joint Expeditionary Force (JEF) has reactivated an AI-powered system to track suspicious vessels. Finnish authorities have detained the implicated ship and its crew. This incident underscores rising tensions in the region, prompting a sustained increase in NATO's military presence to deter further sabotage.

Tech NATO

Google Analytics is Dead: Long Live Privacy-Preserving Analytics with IODIASIX

2025-01-18

Facing GDPR compliance issues and growing user privacy concerns, Google Analytics is under fire. Countries in the EU, starting with Austria, have ruled it violates GDPR, issuing hefty fines. This article introduces IODIASIX, a privacy-focused analytics framework designed as a solution. By keeping data within the EU and avoiding the collection of personally identifiable information, IODIASIX offers businesses a compliant and efficient alternative for website analytics, ensuring user privacy.

Perplexity AI Bids to Merge with TikTok to Avoid US Ban

2025-01-18
Perplexity AI Bids to Merge with TikTok to Avoid US Ban

With a US ban on TikTok looming, AI search engine Perplexity AI has surprisingly submitted a bid to merge with TikTok US. The proposal would create a new entity combining Perplexity, TikTok US, and new equity partners, bringing more video content to Perplexity's search engine while allowing most ByteDance investors to retain their equity. While ByteDance has repeatedly stated its unwillingness to sell TikTok, Perplexity hopes a merger, rather than an acquisition, will overcome this obstacle. This unexpected move has sent ripples through the tech world, with its success or failure having significant implications for US tech regulation and the convergence of AI and social media.

Tech

Will Quantum Computers Really Work? Challenging Doubts About Quantum Attacks on RSA

2025-01-18

This blog post addresses skepticism surrounding the feasibility of quantum computers breaking RSA-2048 encryption. The author refutes arguments claiming quantum computers won't work, such as the exponential energy argument, the number of variables argument, the error correction argument, and visibility arguments. These arguments, the author contends, are largely based on wishful thinking and confirmation bias, lacking scientific rigor. While acknowledging challenges in quantum computing, the author emphasizes that based on current literature and progress, breaking RSA with quantum computers isn't far-fetched, making early preparation crucial.

Tech

Building a Mechanical Star Tracker for the ISS

2025-01-18
Building a Mechanical Star Tracker for the ISS

Engineer Ted Kinsman was tasked by NASA astronaut Don Pettit to design and build a mechanical star tracker for capturing high-quality astrophotography images from the International Space Station (ISS). Due to the lengthy testing period for electronic devices, the tracker was entirely mechanical, cleverly utilizing a clock drive from an industrial oven. Gear ratios were adjusted to match the ISS's orbital speed. The device successfully reached the ISS in 2024 and has captured stunning images of the cosmos.

Tech space

Atproto: A Decentralized Social Network Revolution?

2025-01-18

Atproto is an emerging decentralized social networking protocol that solves problems inherent in traditional social networks like account-app binding and scattered data storage. It uses Personal Data Servers (PDS) and domain-based identities, allowing users to own their identity and data, and reuse the same identity across different apps. This simplifies development for various 'social-enabled' applications (forums, long-form writing platforms, etc.) and fosters new business models. Compared to the Fediverse, Atproto boasts improved interoperability and user experience. The success of projects like Bluesky further fuels Atproto's growth, promising a new generation of social networks centered around user-owned identities.

Tech

Why Honeybees Die After Stinging: A Suicide Mission for the Colony?

2025-01-18
Why Honeybees Die After Stinging: A Suicide Mission for the Colony?

Honeybees die after stinging because their barbed stingers become embedded in the victim's skin, ripping off part of their abdomen. This isn't simply an accident; it's an evolved strategy. The stinger, connected to a venom sac and muscular pump, continues injecting venom even after the bee is gone. This contrasts with wasps, whose stings lack barbs, allowing multiple stings. The article explores the evolutionary reasons for this suicidal behavior, delving into honeybee social structure, the immune system, group selection, and kin selection. Worker bees, being reproductively sterile, are expendable, and their sacrifice protects the queen and colony. The article further examines kin selection theory and haplodiploidy, explaining how the high relatedness between worker sisters promotes this altruistic behavior. While not perfect, the theory offers a compelling explanation for the evolution of this suicidal defense mechanism.

Windows BitLocker Vulnerability: Bypassing Encryption Without a Screwdriver

2025-01-18
Windows BitLocker Vulnerability: Bypassing Encryption Without a Screwdriver

A critical vulnerability in Windows BitLocker allows attackers to extract the disk encryption key without physical access, merely requiring a network connection and keyboard. The vulnerability exploits a flaw in the Windows Boot Manager, enabling attackers to downgrade to a vulnerable version and bypass Secure Boot. While patched in late 2022, a design flaw in the Secure Boot standard allows exploitation to persist. The article details the exploit, including a PXE boot into a downgraded bootloader, manipulation of the Boot Configuration Data (BCD) to trigger a soft reboot, and memory scanning for the VMK using a Linux exploit. Mitigation strategies, such as enabling a pre-boot PIN or applying KB5025885, are outlined.

Toyota Prius: The Hybrid Pioneer That Reshaped the Auto Industry

2025-01-18
Toyota Prius: The Hybrid Pioneer That Reshaped the Auto Industry

The 1997 launch of the Toyota Prius marked a pivotal moment in automotive history, as the world's first mass-produced hybrid vehicle. Combining an internal combustion engine with an electric motor, it dramatically reduced fuel consumption and emissions, overcoming significant technical and market challenges. These challenges included designing an efficient hybrid powertrain, managing battery technology, and addressing consumer skepticism. The Prius's success not only established a new benchmark for environmentally friendly vehicles but also spurred other automakers to accelerate hybrid development, fundamentally altering the automotive landscape. Even today, the Prius continues to set fuel efficiency records and drive innovation.

FTC Probes Microsoft-OpenAI Deal Over Antitrust Concerns

2025-01-18
FTC Probes Microsoft-OpenAI Deal Over Antitrust Concerns

The Federal Trade Commission (FTC) has expressed concerns about Microsoft's $13 billion investment in OpenAI, fearing it could extend Microsoft's cloud computing dominance into the burgeoning AI market and potentially lead to the full acquisition of AI companies by tech giants in the future. The FTC is also investigating Amazon and Google's partnerships with other AI companies, citing potential antitrust risks.

World-First? Meteorite Crash in Canada Caught on Home Security Camera

2025-01-18
World-First? Meteorite Crash in Canada Caught on Home Security Camera

A Canadian homeowner's security camera captured what might be the world's first video and audio recording of a meteorite impact. The meteorite landed precisely where the homeowner had been standing just minutes earlier on Prince Edward Island in July 2024. The homeowner, alerted by strange debris, reviewed the footage to witness the event. The University of Alberta confirmed the meteorite, named the "Charlottetown Meteorite," as an ordinary chondrite. This unique event, complete with sound recording, adds a new chapter to the island's natural history and highlights the unexpected value of home security footage in scientific research.

Fun with Timing Attacks: Exploiting Subtle Timing Differences to Crack Passwords

2025-01-18

This article unveils a clever attack technique known as a timing attack. By repeatedly calling a seemingly secure function, `checkSecret`, and precisely measuring its execution time, an attacker can infer the secret value. Even if `checkSecret` has no obvious vulnerabilities, its internal 'early exit' mechanism causes partially matching guesses to take longer, leaking information. The article details how to exploit this timing difference, combining Thompson Sampling and a Trie data structure to efficiently guess passwords, and discusses handling the complexities of network noise. Ultimately, the article stresses the importance of avoiding direct comparison of sensitive data, recommending the use of hashes or other secure algorithms, and implementing robust rate limits.

LA Wildfires: A Self-Inflicted Wound

2025-01-18
LA Wildfires: A Self-Inflicted Wound

The author recounts their personal experience with the devastating Los Angeles wildfires, arguing that the disaster wasn't a natural event but rather a consequence of long-term negligence in forest fire management. The article highlights the lack of preventative measures, such as regular brush clearing, and the excessively lengthy environmental review processes hindering fire prevention efforts, leading to massive fuel accumulation and ultimately, catastrophic wildfires. The author calls for a renewed focus on fire prevention, streamlined approval processes, and a critical examination of current policies to avert future tragedies.

ChatGPT's Environmental Impact: Debunking the Myths

2025-01-18
ChatGPT's Environmental Impact: Debunking the Myths

Recent discussions surrounding the environmental impact of ChatGPT and other Large Language Models (LLMs) have sparked concerns about excessive energy consumption and pollution. However, this post argues that these claims are largely exaggerated. The energy used by a single ChatGPT search is far less than commonly believed, dwarfed by everyday activities like watching Netflix. Furthermore, the total energy consumption of LLMs must be considered in relation to the number of users; its impact is significantly smaller than other internet activities such as video streaming. While training large models is indeed energy-intensive, this is a one-time cost, and subsequent usage energy consumption is far lower than many imagine. The author urges a rational assessment of the environmental impact of LLMs, cautioning against misinformation that could cause people to miss out on this beneficial technology.

Shazam for Leopards: Identifying Big Cats by Their Roars

2025-01-18
Shazam for Leopards: Identifying Big Cats by Their Roars

Researchers in Tanzania have developed a groundbreaking technique to identify individual leopards by analyzing the unique patterns in their roars. By sifting through 75,000 hours of acoustic data, they achieved 93% accuracy in identifying individual leopards. This innovative method overcomes the limitations of traditional tracking techniques, offering a powerful new tool for conservation efforts, especially crucial given the increasing habitat loss. The study highlights the potential of bioacoustics in wildlife conservation.

National Archives Needs Your Help Deciphering Historical Handwriting

2025-01-18
National Archives Needs Your Help Deciphering Historical Handwriting

The US National Archives holds a vast collection of historical documents written in cursive, many of which are difficult to read. To increase accessibility of its digital catalog, the Archives launched the 'Citizen Archivist' program, recruiting volunteers to transcribe and organize these handwritten records. Volunteers can use simple online tools to transcribe or tag already transcribed documents, contributing even small amounts of time. This project not only aids historical research but also gives more people access to American history and even reignites interest in cursive writing, as more states mandate its teaching in schools.

Pulitzer-Winning Cartoonist Arrested for AI-Generated CSAM

2025-01-18
Pulitzer-Winning Cartoonist Arrested for AI-Generated CSAM

Under a new California law targeting AI-generated child sexual abuse material (CSAM), Pulitzer Prize-winning cartoonist Darrin Bell was arrested for possessing 134 CSAM videos. The law, effective January 1st, criminalizes AI-generated CSAM even without a real victim, citing the inherent harm and revictimization of those depicted in the training data. Police traced the files to Bell's account, marking the Sacramento Valley ICAC's first arrest for AI-generated CSAM. This case highlights the emerging legal and ethical challenges posed by AI-generated content in the context of child exploitation.

Tech CSAM Law

BYD's Gigantic Car Carrier Fuels Global EV Ambitions

2025-01-18
BYD's Gigantic Car Carrier Fuels Global EV Ambitions

BYD launched the world's largest car carrier, the BYD Shenzen, capable of transporting 9,200 vehicles. This is BYD's fourth ro-ro ship, following three others already delivering thousands of NEVs to Europe and South America. Following a record 4.25 million NEV sales in 2024, BYD is aggressively expanding globally, challenging established automakers and seeing significant success in markets like Japan and South Korea. The sheer scale of the Shenzen underscores BYD's ambition to dominate the global EV market.

Supreme Court Upholds TikTok Ban: A Blow to Free Speech?

2025-01-18
Supreme Court Upholds TikTok Ban: A Blow to Free Speech?

The US Supreme Court upheld the ban on TikTok, sparking a debate over free speech and data privacy. The Electronic Frontier Foundation (EFF) expressed deep disappointment, arguing the court failed to adequately scrutinize the ban's impact on the First Amendment. EFF contends the ban is content-based, aiming to control what Americans see and share, rather than addressing genuine data security concerns. The EFF believes shutting down or forcing the sale of social media platforms under national security pretenses is anti-democratic, advocating for comprehensive privacy legislation instead of sacrificing free speech.

Tech TikTok ban

RedNote's Dilemma: A Flood of 'TikTok Refugees' and the Threat of US Influence

2025-01-17
RedNote's Dilemma:  A Flood of 'TikTok Refugees' and the Threat of US Influence

The impending US ban on TikTok has sent millions of users flocking to RedNote, a Chinese social media platform. However, this influx presents a challenge. To prevent US users from influencing its Chinese user base, RedNote may soon segregate users, sparking controversy. This move risks cutting off Chinese-Americans from Chinese culture and information, while simultaneously highlighting China's long-standing concerns about Western social media influence – a situation ironically mirroring the US's planned TikTok ban. RedNote's unexpected popularity has caught it off guard, forcing it to scramble to moderate English content and build translation tools.

Tech
1 2 157 158 159 161 163 164 165 183 184