Meta and Yandex Caught Bypassing Privacy Protections with Localhost Tracking

2025-06-04
Meta and Yandex Caught Bypassing Privacy Protections with Localhost Tracking

Security researchers revealed that Meta and Yandex used native Android apps to listen on localhost ports, linking web browsing data to user identities and bypassing typical privacy safeguards. Meta's Pixel script has stopped sending data to localhost and removed much of the tracking code, likely to avoid violating Google Play policies. Researchers discovered that Facebook, Instagram, and Yandex apps silently collected cookie data via fixed local ports, linking browsing activity to user identities and circumventing cookie clearing, incognito mode, and app permission systems. Meta employed this technique starting in September 2024, using HTTP, WebSocket, and WebRTC protocols. Meta has since ceased this practice, but Yandex's use continues. Chrome 137 includes some mitigations, and Firefox and DuckDuckGo are also taking action.

Read more

Towards an AI Model Virtual Machine: A Secure and Interoperable Future for AI Applications

2025-08-30
Towards an AI Model Virtual Machine: A Secure and Interoperable Future for AI Applications

The increasing capabilities of LLMs and extension mechanisms like MCP have significantly heightened the complexity of building secure and reliable AI applications. This paper proposes an AI Model Virtual Machine (MVM), analogous to the Java Virtual Machine (JVM), to provide AI models with security, isolation, extensibility, and portability. The MVM decouples model development from integration logic, allowing for plug-and-play model interchangeability and incorporating built-in security and access controls to safeguard AI application security and privacy. Further benefits include transparent performance and resource tracking, and potential for verifiable model outputs. This innovation promises to address significant challenges in AI application development, paving the way for a more secure, reliable, and efficient AI ecosystem.

Read more

GTA V Remains King of Twitch, Hints at GTA VI's Immense Potential

2025-04-24
GTA V Remains King of Twitch, Hints at GTA VI's Immense Potential

Eleven years after its release, Grand Theft Auto V (GTA V) continues its reign as Twitch's most-watched game, accumulating over 1 billion hours watched last year! This dominance, alongside League of Legends also exceeding 1 billion hours, foreshadows the immense potential of the upcoming GTA VI. Other top performers include Call of Duty, Fortnite, and Valorant. Interestingly, V-Tubers also saw a 10% increase in viewership, reaching over a billion hours. GTA V's staggering numbers strongly suggest that GTA VI's launch later this year will be a monumental event.

Read more
Game GTA V GTA VI

Schizophrenia's Evolutionary Enigma: The Cliff Edge Fitness Model

2025-06-29
Schizophrenia's Evolutionary Enigma: The Cliff Edge Fitness Model

The genetic basis and high prevalence of schizophrenia have long been a puzzle in evolutionary biology. Traditional theories struggle to explain its persistence. This post introduces the "cliff edge fitness model," which proposes that certain cognitive and social traits enhance fitness up to a threshold, beyond which they lead to severe disorders like schizophrenia. This model explains the observation of both positive and negative selection on schizophrenia-related genes and predicts a complex relationship between polygenic risk scores and reproductive success. Research suggests that while schizophrenia itself is detrimental, its associated genes may have conferred other benefits during evolution, such as enhanced cognitive abilities. The model highlights that evolution optimizes for gene transmission, not individual health, explaining why some diseases persist with high heritability and prevalence.

Read more

Texas Mega-Data Center to Run on Nuclear Power?

2025-08-05
Texas Mega-Data Center to Run on Nuclear Power?

Facing AI's insatiable energy demands, Fermi America is planning a massive advanced energy campus in Texas, featuring up to six gigawatts of nuclear power deployed by Hyundai. The project aims to power data centers by 2032, with the first reactor slated to begin construction next year. While ambitious, the project faces significant cost and risk, as similar ventures have experienced massive overruns and supplier bankruptcies (Westinghouse). Besides nuclear, the campus will include gas, solar, and battery storage. Fermi America is already building initial gas generation capacity, targeting one gigawatt by late 2026. This isn't the first nuclear-powered data center proposal; other companies like Amazon, Microsoft, and Oracle are also exploring similar initiatives.

Read more
Tech

Turo Car-Sharing App Implicated in Las Vegas Explosion and New Orleans Attack

2025-01-02
Turo Car-Sharing App Implicated in Las Vegas Explosion and New Orleans Attack

A Tesla Cybertruck rented through the Turo car-sharing app exploded in Las Vegas, killing one and injuring seven. Separately, a pickup truck rented via Turo was used in a deadly attack in New Orleans, resulting in 15 fatalities. President Biden ordered an investigation into a possible connection between the two incidents. Turo stated it's cooperating with law enforcement but hasn't found a link and admits it cannot fully verify all renter identities. The events raise serious questions about Turo's safety protocols and background checks, highlighting inherent risks in the sharing economy.

Read more

Shape-Shifting Browser Extensions Steal Credentials

2025-03-10
Shape-Shifting Browser Extensions Steal Credentials

Researchers at SquareX Labs have uncovered a new class of malicious browser extensions dubbed "polymorphic extensions." These extensions can impersonate legitimate extensions like password managers in real-time, tricking users into revealing sensitive credentials. The attack proceeds in four phases: distribution, reconnaissance, impersonation, and exploitation. Attackers distribute the malicious extension disguised as a useful tool on the Chrome Web Store. Once installed, it identifies target extensions and, upon use, temporarily disables the legitimate version, replacing it with a near-identical fake. Credentials are stolen and the legitimate extension is restored, leaving no obvious trace. Because the attack uses legitimate browser features, there's no easy fix, but SquareX suggests countermeasures like restricting sudden extension icon changes and enhancing permission monitoring.

Read more

Fortescue's 'Infinity Train': A Self-Charging Battery-Electric Locomotive

2025-06-25
Fortescue's 'Infinity Train': A Self-Charging Battery-Electric Locomotive

Australian mining giant Fortescue, through its subsidiary Fortescue Future Industries (FFI), and Williams Advanced Engineering have unveiled an ambitious project: an "infinity train." This battery-electric locomotive utilizes regenerative braking to recharge its batteries downhill, eliminating the need for external charging infrastructure. The train is designed to transport iron ore between mine sites without needing recharging, aiming to replace diesel locomotives and significantly reduce emissions. While details are still emerging, the project's success hinges on sufficient downhill gradients for regenerative charging. FFI's broader commitment to green technology includes ammonia-powered ships and hydrogen fuel cell mining trucks, positioning them as a major player in the green energy transition.

Read more
Tech

Emily Dickinson's Playful Letterlocking: Poetry in Envelopes

2025-04-14
Emily Dickinson's Playful Letterlocking: Poetry in Envelopes

Emily Dickinson's creative use of envelopes and seals transformed letters into miniature works of art. She ingeniously inscribed poems onto envelopes, utilizing the physical act of sealing and the envelope's form as part of the poetic expression. This unique approach, blending the epistolary with the poetic, showcases Dickinson's playful experimentation with form and content, highlighting her multifaceted genius beyond her renowned poetry.

Read more

Grima: A Colombian Martial Art Fights for Survival

2025-04-29
Grima: A Colombian Martial Art Fights for Survival

In Puerto Tejada, Colombia, a handful of masters are preserving Grima, a traditional Afro-Colombian martial art using machetes and sticks. Rooted in colonial-era resistance, Grima faces an uncertain future as younger generations migrate to urban centers. Masters are seeking national and international recognition to safeguard this cultural heritage, hoping for the funding and publicity that come with it. However, they also worry about potential commercialization harming the tradition. Despite the challenges, Grima remains a vibrant expression of Afro-Colombian identity, its practitioners dedicated to passing it on to future generations.

Read more

OpenAI's Rumored Acquisition Sparks AI Consolidation Anxiety

2025-04-24
OpenAI's Rumored Acquisition Sparks AI Consolidation Anxiety

Rumors of OpenAI potentially acquiring Windsurf have ignited a debate about the future of AI. The article explores the differences between model-layer and application-layer innovation, arguing that model-layer giants like OpenAI are moving into the application layer through acquisitions, leading to increased industry consolidation. However, it highlights that application-layer innovation demands rapid iteration and efficient delivery, unlike the deep technical research required for model-layer innovation. While LLMs are becoming commoditized, the application market will be larger than the foundation model market. Companies like OpenAI face an innovator's dilemma, needing to balance the value of model and application layers. The article suggests acquisitions aren't always successful, and OpenAI's culture might hinder application development. Ultimately, success hinges on delivering tangible value to customers, not just impressive models or high-profile acquisitions.

Read more

Bypass HWID Bans: The Ultimate Guide to Sync.top

2025-06-03

Sync.top is a premium HWID spoofer designed to help gamers circumvent hardware ID bans in online games. This article details how HWID bans work, explains Sync.top's functionality, and guides users on choosing between permanent and temporary spoofing modes. It boasts compatibility with major anti-cheat systems, a user-friendly interface, 24/7 support, and a money-back guarantee. However, it stresses responsible use and cautions against employing it for cheating or other rule violations.

Read more

Century-Old Mine's Secret: The Mystery of Ground Subsidence

2025-05-08
Century-Old Mine's Secret: The Mystery of Ground Subsidence

Multiple sinkholes have appeared on I-80 near Wharton, New Jersey, causing massive traffic disruptions. Investigations revealed these weren't natural occurrences, but rather the legacy of numerous underground iron mines from the past century. Early mining practices lacked planning and regulation, leaving behind unstable voids that, combined with water erosion, eventually led to surface collapses. The issue highlights complex land ownership, the challenges of predicting and mitigating such disasters, and underscores the importance of sustainable mining practices.

Read more

Norway's EV Market Dominated by Tesla in June 2025

2025-07-04
Norway's EV Market Dominated by Tesla in June 2025

Electric vehicles (EVs) captured a stunning 96.9% market share in Norway during June 2025, with 17,799 new registrations out of a total of 18,376. Tesla's Model Y led the pack, boasting 5,004 registrations, significantly outpacing competitors. The overall car market also rebounded, showing a 23% year-on-year increase in the first half of 2025. Low-interest rates fueled sales, but intense competition hints at future challenges for automakers.

Read more
Tech

Google Wallet Expands Digital ID Capabilities: More States and Countries Added

2025-05-01
Google Wallet Expands Digital ID Capabilities: More States and Countries Added

Google Wallet is rapidly expanding its digital identity features. Residents in several US states can now store government-issued digital IDs in Google Wallet and use them at DMVs in select states. Additionally, Google Wallet supports using ID passes created from US passports for TSA security at supported airports for domestic travel. Future use cases include Amazon account recovery, accessing online health services, and Uber profile verification. Fast, privacy-preserving age verification is implemented using Zero Knowledge Proof (ZKP) technology. Finally, Google Wallet is expanding to 50 more countries.

Read more
Tech

YouTube: TV Overtakes Mobile as Primary Viewing Device in the US

2025-02-11
YouTube: TV Overtakes Mobile as Primary Viewing Device in the US

YouTube reports that in the US, TVs have surpassed mobile devices as the primary way people watch its content. Despite the rise of smartphones, big-screen TVs and their remotes remain dominant, based on YouTube's watch time data. Nielsen confirms YouTube's leading position in streaming watch time for two years running. Furthermore, YouTube announced a new feature, "Watch With," enabling creators to provide live commentary and reactions to games and events, currently in testing.

Read more
Tech TV viewing

arXivLabs: Experimental Projects with Community Collaborators

2025-04-25
arXivLabs: Experimental Projects with Community Collaborators

arXivLabs is a framework enabling collaborators to develop and share new arXiv features directly on the website. Individuals and organizations working with arXivLabs uphold arXiv's values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only partners with those who share them. Got an idea for a project that will benefit the arXiv community? Learn more about arXivLabs.

Read more
Development

Berkeley Humanoid Lite: A $5K Open-Source 3D-Printed Humanoid Robot

2025-04-26

Researchers at UC Berkeley have unveiled Berkeley Humanoid Lite, an open-source humanoid robot boasting a modular 3D-printed gearbox and a sub-$5,000 price tag. Its design prioritizes accessibility and customization, with components readily sourced and fabricated using standard 3D printers. Rigorous testing validated the durability of its 3D-printed actuators. A reinforcement learning-based locomotion controller successfully demonstrated zero-shot policy transfer from simulation to hardware. By open-sourcing hardware, code, and training frameworks, the project aims to democratize humanoid robotics development.

Read more

Over-the-Counter CGM for $50: My Experience

2025-06-30

Continuous Glucose Monitoring (CGM) is now available over-the-counter for $50. This device, resembling a thick guitar pick, measures glucose levels every 5 minutes, transmitting data to a smartphone app. The author's experience highlighted unexpected blood sugar spikes from seemingly healthy meals and the significant impact of exercise. While data export isn't directly supported, integration with Apple Health allows for data retrieval. The gamified aspect of monitoring blood sugar levels proved highly effective. Overall, the device provides affordable and accessible glucose monitoring, offering valuable insights into personal health.

Read more

Building a Cute Framework Game Project with CMake and Swift

2025-06-06

This tutorial demonstrates setting up a 2D game project using the Cute Framework, CMake, and Swift. Cute Framework, a powerful C/C++ framework, allows you to write game logic in Swift while leveraging the performance of C/C++ for rendering. The guide details setting up the project structure, configuring CMakeLists.txt, enabling Swift-C/C++ interoperability, and building the project. The result is a basic Cute Framework game ready for expansion.

Read more
Game

ZFS Compression Paradox: Logical vs. Physical Blocks

2025-04-17

A 256KB zero file created with `dd` on a ZFS filesystem with compression enabled exhibits a puzzling behavior: `ls -l` shows its size as 256KB, but `ls -s` and `ls -slh` show a much smaller size, almost zero. This is due to ZFS's efficient compression resulting in a minimal number of physical blocks. The article explores three ways to measure file size: logical size (in bytes), physical block count, and logical block count. It points out that the POSIX `st_blocks` field doesn't specify which size to report, leading to potential changes in `st_blocks` value when moving files between filesystems, and even potential file size expansion exceeding the capacity of the new filesystem.

Read more
Development

The Cybersecurity Industry's Silence on the Chris Krebs Case: A Moral Failing

2025-04-18
The Cybersecurity Industry's Silence on the Chris Krebs Case: A Moral Failing

Former CISA Director Chris Krebs, who affirmed the integrity of the 2020 election, faces retaliation via an executive order aiming to blacklist him. This action raises serious constitutional concerns, violating the First Amendment’s protection of free speech. While a few cybersecurity voices have spoken out, the industry's largely silent response is alarming. The author argues this silence is a moral failure, highlighting the industry's complicity in allowing political power to suppress truth. The article calls for a stronger defense of principles and a rejection of appeasement.

Read more

Neuroscience's Theoretical Bottleneck: Can Spatial Dynamics Unlock the Brain's Secrets?

2025-03-12

While the cellular biology of brains is relatively well-understood, neuroscientists haven't yet generated a theory explaining how brains work. This article explores major obstacles in neuroscience, identifying them as largely conceptual. Neuroscience lacks models rooted in experimental results explaining how neurons interact at all scales. Brains aren't solely driven by external and internal stimuli; their autonomy is significant. Furthermore, the traditional assumption of time as an independent variable clashes with experimental findings; spatial dynamics may offer a more suitable framework. The paper proposes several conceptual frontiers needing breakthroughs, emphasizing the importance of single-trial designs and analyses, and the need for improved experimental methods to reveal the brain's spatial dynamics.

Read more

Librarians: More Dangerous Than You Think

2025-04-19
Librarians: More Dangerous Than You Think

This article playfully celebrates the powerful influence of librarians. Starting with the provocative statement, "Librarians are dangerous," the author explains that this danger isn't in a physical sense, but rather in their positive impact on society. Librarians are portrayed as agents of change, promoting literacy, information literacy education, and community engagement. They are not simply guardians of books but disseminators of knowledge and igniters of minds, playing a crucial role in combating misinformation, fostering equality, and building a better world. The author encourages readers to reassess the value of librarians and pay tribute to their work.

Read more

GOP Launches Probe into Wikipedia: A Conservative Assault on the Information Ecosystem?

2025-08-29
GOP Launches Probe into Wikipedia: A Conservative Assault on the Information Ecosystem?

Republican Representatives James Comer and Nancy Mace are investigating Wikipedia, alleging a search for evidence of bias, particularly anti-Israel sentiment. This is seen as part of a broader conservative effort to control the information ecosystem, following attempts to control social media and defund public broadcasting. The investigation's outcome and potential actions remain unclear, but are sure to be controversial.

Read more

Koreo: Building Complex Kubernetes Platforms with Functional Programming

2025-04-10
Koreo: Building Complex Kubernetes Platforms with Functional Programming

Koreo empowers you to build complex Kubernetes platforms using composable workflows and functions, inspired by functional programming. Workflows act as blueprints for platform operations, defining steps for tasks like application deployments or infrastructure provisioning. Functions are individual building blocks, encapsulating logic for data transformation, API interaction, or resource creation. Built-in testing validates configuration and catches errors early. Koreo's power lies in programming these workflows: incorporate conditional logic, loops, and error handling for dynamic platform operations, automating complex processes, enforcing policies, and building self-service platforms for development teams.

Read more
Development Platform Automation

Critical Security Flaw in Jitsi's Public Instance: Unauthorized Mic and Camera Access

2025-07-24
Critical Security Flaw in Jitsi's Public Instance: Unauthorized Mic and Camera Access

A critical security vulnerability has been discovered in Jitsi's public instance, an open-source video conferencing application. Attackers can silently initiate a Jitsi meeting in the background by tricking users into visiting a malicious link, gaining unauthorized access to their microphones and cameras. Jitsi claims this is a 'feature' and refuses to fix it. The vulnerability exploits previously granted permissions, allowing attackers to capture audio and video even without the user's knowledge or interaction. The author urges Jitsi to at least remove this 'feature' from the public instance to mitigate the significant security risk.

Read more
Tech

Disneyland's 70th Anniversary: A Hyperrealistic Walt Disney Animatronic

2025-05-04
Disneyland's 70th Anniversary: A Hyperrealistic Walt Disney Animatronic

To celebrate Disneyland's 70th anniversary, a new attraction, "Walt Disney — A Magical Life," will debut, featuring a hyperrealistic animatronic Walt Disney. This technologically advanced figure aims to recreate Disney's presence and mannerisms, sparking debate about ethical considerations and the respect for the deceased. While some family members voiced concerns, Disney maintains support from others and emphasizes the project's goal: showcasing Walt Disney's life to new generations, beyond the company's branding.

Read more

Pitt Study Upends Decades-Old Assumptions About Brain Plasticity

2025-06-05
Pitt Study Upends Decades-Old Assumptions About Brain Plasticity

A groundbreaking Pitt study challenges the long-held belief that the brain uses a single mechanism for plasticity. Researchers found that distinct transmission sites are responsible for different types of plasticity, specifically spontaneous and evoked transmissions. Published in Science Advances, the study reveals that the brain uses separate sites with unique developmental timelines and regulatory rules. This dual system maintains stability while allowing flexibility for learning and adaptation. The findings have significant implications for understanding neurological and psychiatric conditions like autism and Alzheimer's disease, offering a new avenue for research into synaptic signaling dysregulation.

Read more
1 2 103 104 105 107 109 110 111 596 597