Category: Tech

Google's Android Sideloading Restrictions: A Pragmatic Balancing Act?

2025-08-30
Google's Android Sideloading Restrictions: A Pragmatic Balancing Act?

Google's upcoming restrictions on Android sideloading, requiring developer registration, spark a debate between security and freedom. The author argues that while banks and game developers have legitimate reasons to restrict app usage on rooted devices, Google's move might stifle open-source and small developers, questioning its effectiveness in combating fraudulent apps. The piece concludes by posing several questions, pondering the balance between user safety and software freedom.

WhatsApp Patches Zero-Click Vulnerability Exploited in Sophisticated Spyware Campaign

2025-08-30
WhatsApp Patches Zero-Click Vulnerability Exploited in Sophisticated Spyware Campaign

WhatsApp has patched a critical security vulnerability (CVE-2025-55177) in its iOS and Mac apps that was exploited in a sophisticated spyware campaign targeting nearly 200 users. The vulnerability, used in conjunction with another flaw fixed by Apple (CVE-2025-43300), allowed attackers to steal data via a zero-click exploit, requiring no user interaction. Amnesty International's Security Lab confirmed the attack, which lasted over 90 days. While Meta hasn't identified the attacker, this isn't the first time WhatsApp has faced government-backed spyware attacks, having previously sued and won damages against NSO Group for its Pegasus spyware.

Amazon CTO Werner Vogels: AI is Not Magic, Clarity is King

2025-08-30
Amazon CTO Werner Vogels: AI is Not Magic, Clarity is King

At Startup Summit 2025, I had a fireside chat with Werner Vogels, Amazon's CTO. He shared two decades of lessons learned building critical internet infrastructure. Key takeaways: focus on problems, not hype; prioritize problem-solving over chasing new tech; distinguish between reversible and irreversible decisions (move fast on the former, slow down on the latter); prioritize security, then operations, then cost; AI is a tool for efficiency, not magic; build only when you can't buy, but own the critical parts; embrace DevOps, engineers are responsible for what they build; manage costs aggressively and make it a product discussion; ultimately, your most valuable asset is time. Clarity of thought is key to success.

Microsoft Denies Link Between Windows Update and SSD/HDD Failures

2025-08-30
Microsoft Denies Link Between Windows Update and SSD/HDD Failures

Users reported SSD and HDD failures and data corruption after installing August's Windows 11 24H2 security update. Microsoft investigated and found no connection between the update and the reported issues. However, they advise users with drives over 60% full to avoid writing large files. Microsoft is collaborating with storage device partners to investigate further. Affected drives reportedly include those from Corsair, SanDisk, and Kioxia, with issues primarily occurring during heavy write operations. While some drives recovered after restarting, others remained inaccessible.

Gmail Accused of Partisan Spam Filtering: GOP Claims Bias

2025-08-30
Gmail Accused of Partisan Spam Filtering: GOP Claims Bias

FTC Chairman Andrew Ferguson accused Google of using partisan spam filters in Gmail, allegedly sending Republican fundraising emails to spam while delivering Democratic emails to inboxes. Ferguson's letter to Alphabet CEO Sundar Pichai alleges potential FTC Act violations. Google denies the accusations, stating its spam filters are based on objective user signals and apply equally to all senders, regardless of political affiliation. This reignites long-standing Republican complaints previously dismissed by a federal judge and the Federal Election Commission.

Tech

FCC Rejects Regulatory Fee Proposals Targeting Big Tech

2025-08-30
FCC Rejects Regulatory Fee Proposals Targeting Big Tech

The Federal Communications Commission (FCC) has rejected proposals to impose cable-style regulatory fees on streaming services, tech companies, and broadband providers. Groups like the NAB argued that these companies benefit from FCC resources and should contribute financially. However, the FCC cited administrative difficulties and a lack of evidence showing increased regulatory burdens imposed by tech firms. Telecommunications and tech trade groups opposed the proposals, arguing fees should only cover directly regulated industries. The FCC's decision maintains the existing fee structure, with broadcasters, satellite operators, and licensees bearing the burden through fiscal year 2025.

Michael Larabel: 20 Years of Linux Hardware Benchmarking

2025-08-30

Michael Larabel, founder and principal author of Phoronix.com, has been enriching the Linux hardware experience since 2004. He's penned over 20,000 articles covering Linux hardware support, performance, graphics drivers, and more. Larabel is also the lead developer behind the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software, significantly contributing to the Linux ecosystem.

Tech

Decentralized Mastodon Defies Mississippi's Age Verification Law

2025-08-30
Decentralized Mastodon Defies Mississippi's Age Verification Law

Decentralized social network Mastodon announced its inability to comply with Mississippi's age verification law, the same law that prompted rival Bluesky to leave the state. Mastodon cites its user-tracking limitations and reluctance to employ IP-based blocks as reasons for non-compliance. Founder Eugen Rochko highlighted the importance of true decentralization, stating that no one can unilaterally decide to block Mississippi from the Fediverse. While Mastodon's own servers specify a minimum signup age, its software doesn't support age verification across all servers. Individual server owners must decide on age verification implementation. Mastodon claims it can't directly assist other server operators, suggesting they consult online resources and comply with local laws.

Tech

China Unveils World's Most Sensitive Neutrino Detector

2025-08-30
China Unveils World's Most Sensitive Neutrino Detector

After over a decade of construction, China has launched the Jiangmen Underground Neutrino Observatory (JUNO), claimed to be the world's most sensitive neutrino detector. Located 700 meters underground, JUNO boasts a 20,000-tonne liquid scintillator detector and over 45,000 photomultiplier tubes. It detects neutrinos from nearby nuclear power plants by capturing the light produced when neutrinos interact with hydrogen atoms in the scintillator. JUNO's success will significantly advance our understanding of neutrino mass hierarchy and types, with international collaboration from scientists across the globe signifying a major leap in China's fundamental science research.

Tech Detector

Google's AI Summaries: A Publisher's Nightmare?

2025-08-30
Google's AI Summaries: A Publisher's Nightmare?

Google's new AI-generated summaries in search results often pull content, diverting traffic away from websites. Publishers face a dilemma: blocking summaries reduces visibility, while allowing them means surrendering content control. While EU and UK investigations are underway, effective workarounds remain scarce. The article outlines several options, including the `max-snippet:0` and `nosnippet` meta tags, and the `data-nosnippet` attribute, but none are perfect. Ultimately, it labels this a classic 'dark pattern' design, heavily disadvantaging publishers, and calls for regulatory intervention.

Romania's Olympiad Miracle: A Hyper-Stratified Education System

2025-08-30
Romania's Olympiad Miracle: A Hyper-Stratified Education System

Romania's disproportionate success in international academic Olympiads, despite its average educational performance, is examined. The article delves into its highly stratified education system: top students are paired with top teachers in elite schools, incentivized by substantial rewards. While this produces exceptional Olympiad winners, it also leads to significant brain drain as these talents leave for other countries. The article concludes by suggesting other nations adopt similar strategies to maximize their high-potential students' capabilities.

Tech olympiads

15x Power Boost for Solar Thermoelectric Generators via Synergistic Spectral and Thermal Management

2025-08-30
15x Power Boost for Solar Thermoelectric Generators via Synergistic Spectral and Thermal Management

Researchers significantly improved the power output of solar thermoelectric generators (STEGs) by optimizing both hot- and cold-side thermal management. They employed a selective solar absorber (SSA) to maximize solar energy absorption and minimize radiative losses, while using an air film to reduce convective losses on the hot side. On the cold side, a micro-dissipator (μ-dissipator) was designed for efficient heat dissipation through convection and radiation. Experiments demonstrated a 15x peak power enhancement when combining both hot- and cold-side optimizations, enough to power an LED, showcasing the potential for applications in IoT and beyond.

Cloudflare's Signed Agents: A Path to a Closed Web?

2025-08-29
Cloudflare's Signed Agents: A Path to a Closed Web?

Cloudflare's new "signed agents" system, pitched as a safety measure, is argued to be a dangerous path towards a closed web. The system functions like an allowlist, deciding which agents can access the web, contradicting the open nature of the internet. The author advocates for open, portable, and company-independent authentication based on verifiable chains of delegation and request-level proof, rather than a single company's control. The article draws parallels to historical events, highlighting how open standards consistently beat closed plugins, and calls for an open, verifiable, and decentralized authentication system to manage the increasing number of web agents, ensuring the openness and innovation of the internet. The author even offers to open-source a first cut of their proposed solution.

Quantum Signals Sent Over Commercial Fiber Using Standard Internet Protocol

2025-08-29
Quantum Signals Sent Over Commercial Fiber Using Standard Internet Protocol

Researchers at the University of Pennsylvania have achieved a groundbreaking feat: transmitting quantum signals over commercial fiber-optic cables using the standard Internet Protocol (IP). Their innovative Q-chip coordinates quantum and classical data, packaging them into standard internet packets. This overcomes the fragility of quantum signals and represents a crucial step towards a practical quantum internet, promising faster, more energy-efficient AI and breakthroughs in drug and materials design.

Sig Sauer P320 FMECA Leak Escalates in Appeals Court

2025-08-29

The legal battle over the secrecy of Sig Sauer's P320's Failure Modes, Effects, and Criticality Analysis (FMECA) document intensifies. The Trace newsroom intervened in the appeal, pushing for the release of key records and highlighting Practical Shooting Insights' role in publishing the unredacted document. Sig Sauer counters with national security concerns, but the FMECA has been widely disseminated online, including a discussion by a Sig Sauer executive who directed listeners to the website. The court will decide whether to allow intervention and whether to uphold the strong presumption of public access to class-certification records. The case has significant implications for consumer protection and product safety.

Tech

GOP Launches Probe into Wikipedia: A Conservative Assault on the Information Ecosystem?

2025-08-29
GOP Launches Probe into Wikipedia: A Conservative Assault on the Information Ecosystem?

Republican Representatives James Comer and Nancy Mace are investigating Wikipedia, alleging a search for evidence of bias, particularly anti-Israel sentiment. This is seen as part of a broader conservative effort to control the information ecosystem, following attempts to control social media and defund public broadcasting. The investigation's outcome and potential actions remain unclear, but are sure to be controversial.

Facebook Secretly Uploads User Photos to the Cloud?

2025-08-29
Facebook Secretly Uploads User Photos to the Cloud?

Meta, Facebook's parent company, is testing a new feature that secretly uploads users' phone photos and videos to the cloud without explicit consent, using them to generate AI-powered suggestions like collages, monthly recaps, and themed albums. While Meta claims the feature is opt-in and prompts users, some report never seeing the prompt and finding the feature enabled by default. This raises serious privacy concerns as Meta accesses users' private, unshared photos and videos. The test is currently limited to the US and Canada, excluding Illinois and Texas due to privacy laws.

How Likely Is a Bitcoin Address Typo to Cause a Problem?

2025-08-29

Concerns exist about accidentally sending Bitcoin to the wrong address due to typos. This article uses checksum probabilities, the vast size of the address space, and edit distance calculations to demonstrate the extremely low likelihood of this happening. Even considering addresses that are a small edit distance apart, the probability of a typo leading to a collision with another valid address in the enormous address space is negligible. Therefore, address typos are not a major risk in using Bitcoin.

Tech

TransUnion Data Breach Exposes 4.4M Customers' Personal Info

2025-08-29
TransUnion Data Breach Exposes 4.4M Customers' Personal Info

Credit reporting agency TransUnion disclosed a data breach affecting over 4.4 million customers. Unauthorized access to a third-party application storing customer data for US consumer support operations on July 28th is blamed. While TransUnion claims no credit information was accessed, a later filing in Texas confirmed the breach included names, birthdates, and Social Security numbers. The incident follows recent hacks targeting various sectors, highlighting the vulnerability of large corporations to data breaches. The perpetrators and their motives remain unclear.

Tech

US to Put GDP Data on Blockchain: Trump's Crypto Vision?

2025-08-29
US to Put GDP Data on Blockchain: Trump's Crypto Vision?

US Commerce Secretary Howard Lutnick announced the Department of Commerce will publish economic statistics, including GDP data, on a blockchain. This initiative, spurred by President Trump's vision, aims to improve data distribution efficiency across government agencies. While blockchain technology enhances data security and transparency, it doesn't guarantee accuracy. The move comes amid Trump's repeated questioning of US economic data reliability, contrasting with other governments' blockchain adoption, such as Estonia's e-health system and the EU's EBSI project.

Tech

Scottish Police Face Data Sovereignty Showdown with Microsoft

2025-08-29

Scottish police are grappling with significant data security and sovereignty challenges in their adoption of Microsoft Office 365. Microsoft's refusal to disclose data processing locations and methods, citing "commercial confidentiality," prevents the police from meeting the stringent data transfer restrictions of the UK's 2018 Data Protection Act. This raises concerns about data potentially being processed in countries lacking adequate data protection, including China and India, and highlights the risks of relying on cloud services without sovereign cloud capabilities. While aware of the risks, the police are constrained by the UK National Enabling Programme and existing contracts with Microsoft, making a swift change of supplier difficult.

Tech

Microsoft Copilot Lands on Samsung TVs: Your AI Sidekick, Now on the Big Screen

2025-08-29
Microsoft Copilot Lands on Samsung TVs: Your AI Sidekick, Now on the Big Screen

Microsoft's AI assistant, Copilot, is coming to TVs, starting with Samsung's 2025 lineup. Users can ask Copilot for movie recommendations, spoiler-free episode summaries, and answer general questions. Copilot appears as a friendly, animated character, bouncing around the screen with mouth movements synced to its responses. It's integrated into Samsung Tizen OS, Samsung Daily Plus, and Click to Search, accessible via voice or remote. Signing in allows for a personalized experience using past conversations and preferences. Supported models include Samsung's 2025 Micro RGB, Neo QLED, OLED, The Frame Pro, The Frame TVs, and M7, M8, and M9 smart monitors. Microsoft plans to bring Copilot to LG TVs as well.

Tech

Glowing Plants: Cheap Nanoparticles Turn Succulents into Night Lights

2025-08-29
Glowing Plants: Cheap Nanoparticles Turn Succulents into Night Lights

Researchers at South China Agricultural University have developed a low-cost, biocompatible phosphor compound that allows succulents to glow for up to two hours after just a few minutes of sunlight or LED exposure. This inexpensive method, involving injecting nanoparticles into the leaves, avoids complex genetic modification techniques. The team found an optimal nanoparticle size for uniform, bright illumination, even enough to light nearby objects. The technology could revolutionize indoor and garden decor, creating stunning, glowing landscapes at minimal cost (around $1.4 per plant). Long-term safety studies are underway.

PowerPoint Killed Seven: The Columbia Disaster

2025-08-29
PowerPoint Killed Seven: The Columbia Disaster

The Space Shuttle Columbia disaster of January 16th, 2003, claimed the lives of seven astronauts. An investigation revealed that a piece of foam insulation detached 82 seconds into launch, striking the shuttle's left wing and causing catastrophic damage upon re-entry. The incident highlights the devastating consequences of seemingly minor failures in complex systems, prompting reflection on both spacecraft safety and the effectiveness of communication, in contrast to the often ineffective ‘death by PowerPoint’ presentations.

86-DOS: The Untold Story Behind the PC Revolution

2025-08-28
86-DOS: The Untold Story Behind the PC Revolution

In April 1980, a young programmer at Seattle Computer Products (SCP), Tim Paterson, began developing a small disk operating system, codenamed QDOS (Quick and Dirty Operating System), for the new Intel 8086-based board. This project, initially designed as a quick fix for SCP's 8086 computer, unexpectedly evolved into Microsoft's MS-DOS, dominating the PC industry for over a decade. The article details QDOS's development, including the controversy surrounding its compatibility with CP/M's API, and Microsoft's acquisition of QDOS and its renaming to MS-DOS. The simplicity and CP/M-inspired API of QDOS, despite the resulting controversy, allowed for a quick release and made it a cornerstone of the PC era.

Tech

Trump, the Fed, and the Distorted Reality of ZIRP: The Hidden Economic Risks Behind the Stock Market's Euphoria

2025-08-28
Trump, the Fed, and the Distorted Reality of ZIRP: The Hidden Economic Risks Behind the Stock Market's Euphoria

This article analyzes Trump's attempts to interfere with the Fed's independence and the distorting effects of the long-term zero interest rate policy (ZIRP) on the economy. Trump's attempt to fire a Fed governor is motivated by a desire to force interest rate cuts, threatening the Fed's independence and potentially leading to economic catastrophe. The article points out that ZIRP led to irrational expectations about future cash flows, fueling tech bubbles and financial risks. The stock market's optimistic response to Trump's actions contrasts sharply with the bond market's concerns about economic risks – a divergence that will eventually lead to market correction. The author argues that the Fed's independence is crucial and that the long-term effects of ZIRP represent a serious economic risk.

ELEGANTBOUNCER: Mobile Exploit Detection Without Samples

2025-08-28

ELEGANTBOUNCER is a novel mobile security tool that detects malware by analyzing file structure instead of signatures. Without access to actual malicious samples, it detects known exploits leveraging vulnerabilities in JBIG2, WebP, TrueType, and DNG formats, such as FORCEDENTRY, BLASTPASS, and TRIANGULATION. The tool features parallel processing and a terminal UI, and can analyze iOS backups to detect threats hidden in messaging app attachments. It represents a paradigm shift in mobile threat detection: effective detection without a vault of secret samples, but by understanding the fundamental mechanics of exploitation.

Google's Device-Bound Session Credentials: The End of Session Hijacking?

2025-08-28

Session hijacking has long been a major threat to online security. Traditional cookie-based session management is vulnerable, leaving systems open to attack. To combat this, Google has introduced Device-Bound Session Credentials (DBSC), leveraging public-key cryptography. DBSC generates a key pair for each session, securely stored on the device (e.g., using TPM on Windows). This renders session identifiers useless on other devices, effectively preventing hijacking. Currently in beta for Google Workspace Chrome users (Windows), widespread adoption by other browser vendors could finally make session hijacking a relic of the past.

Apple Removes Torrent Client iTorrent from AltStore in EU, Demonstrating App Store Control

2025-08-28
Apple Removes Torrent Client iTorrent from AltStore in EU, Demonstrating App Store Control

Apple has removed the iPhone torrent client, iTorrent, from the AltStore PAL alternative iOS app store in the EU. This action highlights Apple's continued ability to control apps outside its official App Store. Developer Daniil Vinogradov states Apple revoked his distribution rights across all alternative iOS stores, not just AltStore PAL. While Apple bans torrent apps from its own store, the EU's Digital Markets Act allows for third-party app stores. iTorrent's addition to AltStore last July raises the question of why Apple acted now.

Tech
1 2 4 6 7 8 9 182 183