We finally may be able to rid the world of mosquitoes. But should we? (hell yes! And ticks please!)

They buzz, they bite, and they cause some of the deadliest diseases known to humanity. Mosquitoes are perhaps the planet’s most universally reviled animals.

If we could zap them off the face of the Earth, should we?

Subscribe to The Post Most newsletter for the most important and interesting stories from The Washington Post.

The question is no longer hypothetical. In recent years, scientists have devised powerful genetic tools that may be able to eradicate mosquitoes and other pests once and for all.

Now, some doctors and scientists say it is time to take the extraordinary step of unleashing gene editing to suppress mosquitoes and avoid human suffering from malaria, dengue, West Nile virus and other serious diseases.

“There are so many lives at stake with malaria that we want to make sure that this technology could be used in the near future,” said Alekos Simoni, a molecular biologist with Target Malaria, a project aiming to target vector mosquitoes in sub-Saharan Africa.

Yet the development of this technology also raises a profound ethical question: When, if ever, is it okay to intentionally drive a species out of existence?

Even the famed naturalist E.O. Wilson once said: “I would gladly throw the switch and be the executioner myself” for malaria-carrying mosquitoes.

But some researchers and ethicists warn it may be too dangerous to tinker with the underpinnings of life itself. Even irritating, itty-bitty mosquitoes, they say, may have enough inherent value to keep around.

How to exterminate mosquitoes

Target Malaria is one of the most ambitious mosquito suppression efforts in the works. Simoni and his colleagues are seeking to diminish populations of mosquitoes in the Anopheles gambiae complex that are responsible for spreading the deadly disease.

In their labs, the scientists have introduced a gene mutation that causes female mosquito offspring to hatch without functional ovaries, rendering them infertile. Male mosquito offspring can carry the gene but remain physically unaffected.

The concept is that when female mosquitoes inherit the gene from both their mother and father, they will go on to die without producing offspring. Meanwhile, when males and females carrying just one copy of the gene mate with wild mosquitoes, they will spread the gene further until no fertile females are left – and the population crashes.

[…]

At the heart of Target Malaria’s work is a powerful genetic tool called a gene drive.

Under the normal rules of inheritance, a parent has a 50-50 chance of passing a particular gene on to an offspring. But by adding special genetic machinery – dubbed a gene drive – to segments of DNA, scientists can rig the coin flip and ensure a gene is included in an animal’s eggs and sperm, nearly guaranteeing it will be passed along.

Over successive generations, gene drives can cause a trait to spread across an entire species’s population, even if that gene doesn’t benefit the organism.

[…]

When so many wildlife conservationists are trying to save plants and animals from disappearing, the mosquito is one of the few creatures that people argue is actually worthy of extinction. Forget about tigers or bears; it’s the tiny mosquito that is the deadliest animal on Earth.

The human misery caused by malaria is undeniable. Nearly 600,000 people died of the disease in 2023, according to the World Health Organization, with the majority of cases in Africa.

On the continent, the death toll is akin to “crashing two Boeing 747s into Kilimanjaro” every day, said Paul Ndebele, a bioethicist at George Washington University.

[…]

A compelling candidate for total eradication, according to the bioethicists, is the New World screwworm. This parasitic fly, which lays eggs in wounds and eats the flesh of both humans and livestock, appears to play little role in ecosystems. Infections are difficult to treat and can lead to slow and painful deaths.

Yet it may be too risky, they say, to use gene drives on invasive rodents on remote Pacific islands where they decimate native birds, given the nonzero chance of a gene-edited rat or mouse jumping ship to the mainland and spreading across a continent.

“Even at a microbial level, it became plain in our conversations, we are not in favor of remaking the world to suit human desires,” said Gregory Kaebnick, a senior research scholar at the institute.

It’s unclear how important malaria-carrying mosquitoes are to broader ecosystems.

[…]

Instead, the authors said, geneticists should be able to use gene editing, vaccines and other tools to target not the mosquito itself, but the single-celled Plasmodium parasite that is responsible for malaria. That invisible microorganism – which a mosquito transfers from its saliva to a person’s blood when it bites – is the real culprit.

“You can get rid of malaria without actually getting rid of the mosquito,” Kaebnick said. He added that, at a time when the Trump administration talks cavalierly about animals going extinct, intentional extinction should be an option for only “particularly horrific species.”

But Ndebele, who is from Zimbabwe, noted that most of the people opposed to the elimination of the mosquitoes “are not based in Africa.”

[…]

Source: We finally may be able to rid the world of mosquitoes. But should we?

We have driven many species to extinction, many of which really did not deserve to die. Mosquitos and ticks (and bed bugs) most definitely do deserve to die. This technology is available, the gene editing is not. Go forth and exterminate!

ESA – “The models were right”: astronomers find ‘missing’ matter

Astronomers have discovered a huge filament of hot gas bridging four galaxy clusters. At 10 times as massive as our galaxy, the thread could contain some of the Universe’s ‘missing’ matter, addressing a decades-long mystery.

The astronomers used the European Space Agency’s XMM-Newton and JAXA’s Suzaku X-ray space telescopes to make the discovery.

Over one-third of the ‘normal’ matter in the local Universe – the visible stuff making up stars, planets, galaxies, life – is missing. It hasn’t yet been seen, but it’s needed to make our models of the cosmos work properly.

Said models suggest that this elusive matter might exist in long strings of gas, or filaments, bridging the densest pockets of space. While we’ve spotted filaments before, it’s tricky to make out their properties; they’re typically faint, making it difficult to isolate their light from that of any galaxies, black holes, and other objects lying nearby.

New research is now one of the first to do just this, finding and accurately characterising a single filament of hot gas stretching between four clusters of galaxies in the nearby Universe.

The filament is made up of hot intergalactic gas (shown in mottled black-yellow), a type of ‘ordinary matter’ that has proven really difficult for astronomers to find.
The filament is made up of hot intergalactic gas (shown in mottled black-yellow), a type of ‘ordinary matter’ that has proven really difficult for astronomers to find.

“For the first time, our results closely match what we see in our leading model of the cosmos – something that’s not happened before,” says lead researcher Konstantinos Migkas of Leiden Observatory in the Netherlands. “It seems that the simulations were right all along.”

XMM-Newton on the case

Clocking in at over 10 million degrees, the filament contains around 10 times the mass of the Milky Way and connects four galaxy clusters: two on one end, two on the other. All are part of the Shapley Supercluster, a collection of more than 8000 galaxies that forms one of the most massive structures in the nearby Universe.

The filament stretches diagonally away from us through the supercluster for 23 million light-years, the equivalent of traversing the Milky Way end to end around 230 times.

Astronomers discover vast filament of ‘missing’ matter
Open Image

Konstantinos and colleagues characterised the filament by combining X-ray observations from XMM-Newton and Suzaku, and digging into optical data from several others.

The two X-ray telescopes were ideal partners. Suzaku mapped the filament’s faint X-ray light over a wide region of space, while XMM-Newton pinpointed very precisely contaminating sources of X-rays – namely, supermassive black holes – lying within the filament.

“Thanks to XMM-Newton we could identify and remove these cosmic contaminants, so we knew we were looking at the gas in the filament and nothing else,” adds co-author Florian Pacaud of the University of Bonn, Germany. “Our approach was really successful, and reveals that the filament is exactly as we’d expect from our best large-scale simulations of the Universe.”

Not truly missing

As well as revealing a huge and previously unseen thread of matter running through the nearby cosmos, the finding shows how some of the densest and most extreme structures in the Universe – galaxy clusters – are connected over colossal distances.

It also sheds light on the very nature of the ‘cosmic web’, the vast, invisible cobweb of filaments that underpins the structure of everything we see around us.

Simulation of the cosmic web
Simulation of the cosmic web

“This research is a great example of collaboration between telescopes, and creates a new benchmark for how to spot the light coming from the faint filaments of the cosmic web,” adds Norbert Schartel, ESA XMM-Newton Project Scientist.

“More fundamentally, it reinforces our standard model of the cosmos and validates decades of simulations: it seems that the ‘missing’ matter may truly be lurking in hard-to-see threads woven across the Universe.”

Piecing together an accurate picture of the cosmic web is the domain of ESA’s Euclid mission. Launched in 2023, Euclid is exploring this web’s structure and history. The mission is also digging deep into the nature of dark matter and energy – neither of which have ever been observed, despite accounting for a whopping 95% of the Universe – and working with other dark Universe detectives to solve some of the biggest and longest-standing cosmic mysteries.

Source: ESA – “The models were right”: astronomers find ‘missing’ matter

Traceable random numbers from a non-local quantum advantage

The unpredictability of random numbers is fundamental to both digital security1,2 and applications that fairly distribute resources3,4. However, existing random number generators have limitations—the generation processes cannot be fully traced, audited and certified to be unpredictable. The algorithmic steps used in pseudorandom number generators5 are auditable, but they cannot guarantee that their outputs were a priori unpredictable given knowledge of the initial seed. Device-independent quantum random number generators6,7,8,9 can ensure that the source of randomness was unknown beforehand, but the steps used to extract the randomness are vulnerable to tampering. Here we demonstrate a fully traceable random number generation protocol based on device-independent techniques. Our protocol extracts randomness from unpredictable non-local quantum correlations, and uses distributed intertwined hash chains to cryptographically trace and verify the extraction process. This protocol forms the basis for a public traceable and certifiable quantum randomness beacon that we have launched10. Over the first 40 days of operation, we completed the protocol 7,434 out of 7,454 attempts—a success rate of 99.7%. Each time the protocol succeeded, the beacon emitted a pulse of 512 bits of traceable randomness. The bits are certified to be uniform with error multiplied by actual success probability bounded by 2−64. The generation of certifiable and traceable randomness represents a public service that operates with an entanglement-derived advantage over comparable classical approaches.

Source: Traceable random numbers from a non-local quantum advantage | Nature

16 billion passwords exposed in colossal data breach

[…] , the Cybernews research team discovered a plethora of supermassive datasets, housing billions upon billions of login credentials. From social media and corporate platforms to VPNs and developer portals, no stone was left unturned.

Our team has been closely monitoring the web since the beginning of the year. So far, they’ve discovered 30 exposed datasets containing from tens of millions to over 3.5 billion records each. In total, the researchers uncovered an unimaginable 16 billion records.

None of the exposed datasets were reported previously, bar one: in late May, Wired magazine reported a security researcher discovering a “mysterious database” with 184 million records. It barely scratches the top 20 of what the team discovered. Most worryingly, researchers claim new massive datasets emerge every few weeks, signaling how prevalent infostealer malware truly is.

[…]

“This is not just a leak – it’s a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What’s especially concerning is the structure and recency of these datasets – these aren’t just old breaches being recycled. This is fresh, weaponizable intelligence at scale,” researchers said.

The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances.

[…]

Information in the leaked datasets opens the doors to pretty much any online service imaginable, from Apple, Facebook, and Google, to GitHub, Telegram, and various government services. It’s hard to miss something when 16 billion records are on the table.

[…]

 

Source: 16 billion passwords exposed in colossal data breach​ | Cybernews

UK data watchdog fines 23andMe £2.3M over incompetently handled 2023 DNA megabreach

The UK’s data watchdog is fining beleaguered DNA testing outfit 23andMe £2.31 million ($3.13 million) over its 2023 mega breach.

Among the various security failings demonstrated by the genetics company were:

  • Unsatisfactory authentication measures, including lack of mandatory MFA and unsecure password requirements
  • No measures taken to prevent accessing and downloading raw genetic data
  • No measures to adequately monitor, detect, or respond to security threats to user data

The announcement comes a year after the Information Commissioner’s Office (ICO) and Office of the Privacy Commissioner of Canada (OPC) teamed up to investigate 23andMe and the failures that led to attackers compromising nearly 7 million users’ data.

John Edwards, the UK’s Information Commissioner, said: “This was a profoundly damaging breach that exposed sensitive personal information, family histories, and even health conditions of thousands of people in the UK. As one of those impacted told us, once this information is out there, it cannot be changed or reissued like a password or credit card number.

“23andMe failed to take basic steps to protect this information. Their security systems were inadequate, the warning signs were there, and the company was slow to respond. This left people’s most sensitive data vulnerable to exploitation and harm.”

The ICO went on to note the five-month gap between the attacker’s credential-stuffing activity, which began in April 2023, and 23andMe finally acknowledging the attack publicly in October that year.

It said 23andMe “missed many opportunities to act” during this time and only did so after the stolen data was put up for sale on Reddit.

[…]

Source: UK data watchdog fines 23andMe £2.3M over 2023 breach • The Register

MiniMax M1 model claims Chinese LLM crown from DeepSeek and is completely open source

MiniMax, an AI firm based in Shanghai, has released an open source reasoning model that challenges Chinese rival DeepSeek and US-based Anthropic, OpenAI, and Google in terms of performance and cost.

MiniMax-M1 was released Monday under an Apache software license, and thus is actually open source, unlike Meta’s Llama family, offered under a community license that’s not open source, and DeepSeek, which is only partially under an open source license.

“In complex, productivity-oriented scenarios, M1’s capabilities are top-tier among open source models, surpassing domestic closed-source models and approaching the leading overseas models, all while offering the industry’s best cost-effectiveness,” MiniMax boasts in a blog post.

According to the blog post, M1 is competitive with OpenAI o3, Gemini 2.5 Pro, Claude 4 Opus, DeepSeek R1, DeepSeek R1-0528, and Qwen3-235B on various benchmarks (AIME 2024, LiveCodeBench, SWE-bench Verified, Tau-bench, and MRCR), coming in behind some models and ahead of others to varying degrees. As always, take vendor-supplied benchmark results with a grain of salt, but the source code is available on GitHub should you wish to confirm its performance independently.

But MiniMax makes clear that it’s trying to supplant DeepSeek as the leading industry disruptor by noting that its context window (the amount of input it can handle) is one million tokens, which rivals Google Gemini 2.5 Pro and is eight times the capacity of DeepSeek R1.

[…]

Backed by Alibaba Group, Tencent, and IDG Capital, MiniMax claims its Lightning Attention mechanism, a way to calculate attention matrices that improves both training and inference efficiency, gives its M1 model an advantage when computing long context inputs and when trying to reason.

“For example, when performing deep reasoning with 80,000 tokens, it requires only about 30 percent of the computing power of DeepSeek R1,” the company claims. “This feature gives us a substantial computational efficiency advantage in both training and inference.”

This more efficient computation method, in conjunction with an improved reinforcement learning algorithm called CISPO (detailed in M1’s technical report [PDF]), translates to lower computing costs.

“The entire reinforcement learning phase used only 512 [Nvidia] H800s for three weeks, with a rental cost of just $537,400,” MiniMax claims. “This is an order of magnitude less than initially anticipated.”

Source: MiniMax M1 model claims Chinese LLM crown from DeepSeek • The Register

Silicon Valley Execs Join the Army as Lt Colonel Officers (But Won’t Have to Attend Boot Camp)

The U.S. military recently announced that four executives from some of the top tech companies in Silicon Valley have joined the Army Reserve as direct-commissioned officers. The move is part of a push to speed up the adoption of technology in the military, but as the news outlet Task & Purpose points out, it’s pretty unusual.

The Army said in a press release that the four executives are Shyam Sankar, CTO at Palantir; Andrew Bosworth, CTO at Meta; Kevin Weil, Chief Product Officer of OpenAI; and Bob McGrew, an advisor at Thinking Machines Lab and former Chief Research Officer for OpenAI.

The four men are being commissioned at the high rank of lieutenant colonel as part of a program called Detachment 201: The Army’s Executive Innovation Corps. As Task & Purpose notes, the men will get to skip the usual process of taking a Direct Commissioning Course at Fort Benning, Georgia, and they won’t need to complete the Army Fitness Test.

[…]

The new reservists will serve for about 120 hours a year, according to the Wall Street Journal, and will have a lot of flexibility to work remotely. They’ll work on helping the Army acquire more commercial tech, though it’s not clear how conflict-of-interest issues will be enforced, given the fact that the people all work for companies that would conceivably be selling their wares to the military. In theory, they won’t be sharing information with their companies or “participating in projects that could provide them or their companies with financial gain,” according to the Journal.

[…]

Some people may think that’s a good thing, and at the very least, it might be a wise business decision for some firm like Palantir to hope for war. But OpenAI and Meta have a lot of products that depend on buy-in from the general public. And we’ve seen guys like Elon Musk take huge hits to their bottom lines after attaching themselves to Trumpism. And with Trump at the helm, any association with the Army is bound to be perilous in a time of war. We all saw the viral videos of Trump’s parade, right?

Source: Silicon Valley Execs Join the Army as Officers (But Won’t Have to Attend Boot Camp)

This is a hugely disrespectful move to all the career officers who have had to work hard to get promoted to colonel – this is not a small rank, but a hugely powerful one.

Not only that, it smacks of the fascism of the Nazi reich where civilians were put into uniform to look more impressive. It also ensured that people with no military competence were put in charge of the decisions which turned out to be poor and ended up being catastrophic for the military campaigns being run.

And how about conflict of interest? I know that in the Trump administration, buying from your buddies, pork barrel rolling and cronyism is the norm, but in the military, wouldn’t you at least want some competent products being used?

Makers of air fryers and smart speakers told to respect users’ right to privacy in UK

Makers of air fryers, smart speakers, fertility trackers and smart TVs have been told to respect people’s rights to privacy by the UK Information Commissioner’s Office (ICO).

People have reported feeling powerless to control how data is gathered, used and shared in their own homes and on their bodies.

After reports of air fryers designed to listen in to their surroundings and public concerns that digitised devices collect an excessive amount of personal information, the data protection regulator has issued its first guidance on how people’s personal information should be handled.

Is your air fryer spying on you? Concerns over ‘excessive’ surveillance in smart devices

It is demanding that manufacturers and data handlers ensure data security, are transparent with consumers and ensure the regular deletion of collected information.

Stephen Almond, the executive director for regulatory risk at the ICO, said: “Smart products know a lot about us: who we live with, what music we like, what medication we are taking and much more.

“They are designed to make our lives easier, but that doesn’t mean they should be collecting an excessive amount of information … we shouldn’t have to choose between enjoying the benefits of smart products and our own privacy.

“We all rightly have a greater expectation of privacy in our own homes, so we must be able to trust smart products are respecting our privacy, using our personal information responsibly and only in ways we would expect.”

The new guidance cites a wide range of devices that are broadly known as part of the “internet of things”, which collect data that needs to be carefully handled. These include smart fertility trackers that record the dates of their users’ periods and body temperature, send it back to the manufacturer’s servers and make an inference about fertile days based on this information.

Smart speakers that listen in not only to their owner but also to other members of their family and visitors to their home should be designed so users can configure product settings to minimise the personal information they collect.

[…]

Source: Makers of air fryers and smart speakers told to respect users’ right to privacy | Technology | The Guardian

Wouldn’t it be nice if they benefited from the same privacy laws as exist in the EU?

Microsoft Is Deleting Old Drivers From Windows Update – does the manufacturer still exist? If not, your hardware just turned into junk.

In a move that could quietly wreak havoc across the Windows ecosystem, Microsoft is purging outdated drivers from Windows Update. The company claims it is doing this for security and reliability, but the result might be broken hardware for users who rely on legacy devices. If you’re using older peripherals or custom-built PCs, you could soon find yourself hunting for drivers that have vanished into the digital abyss.

This initiative, buried in a low-profile blog post, is part of Microsoft’s new cleanup program. The first wave targets legacy drivers that already have newer replacements available. But the real kicker is that Microsoft isn’t warning individual users about which drivers are going away. If your device needs one of those expired drivers, Windows Update simply won’t offer it anymore. It just disappears.

Microsoft refers to this as “expiring” a driver, which means removing its audience assignments so Windows Update no longer distributes it. Once that happens, only the hardware partner who published it can bring it back. But there’s a catch. Microsoft may demand a business justification before allowing a republish. And if the partner doesn’t respond within six months, the driver is deleted permanently.

[…]

Microsoft’s cleanup may sound responsible on the surface, but for anyone still clinging to older hardware or niche accessories, it might feel more like abandonment. Once a driver disappears, finding it again could become a scavenger hunt. And if your hardware vendor is long gone, good luck.

Source: Microsoft Is Deleting Old Drivers From Windows Update And It Might Break Your PC – NERDS.xyz

Pornhub Back Online in France After Court Ruling About Age Verification

Many porn sites, including Pornhub, YouPorn, and RedTube, all went dark earlier this month in France to protest a new age verification law that would have required the websites to collect ID from users. But those sites went back online Friday after a new ruling from a French court suspended enforcement of the law until it can be determined whether it conflicts with existing European Union rules, according to France24.

Aylo, the company that owns Pornhub, has previously said that requiring age verification “creates an unacceptable security risk” and warned that setting up that kind of process makes people vulnerable to hacks and leaks of sensitive information. The French law would’ve required Aylo to verify user ages with a government-issued ID or a credit card.

[…]

Age verification laws for porn websites has been a controversial issue globally, with the U.S. seeing a dramatic uptick in states passing such laws in recent years. Nineteen states now have laws that require age verification for porn sites, meaning that anyone who wants to access Pornhub in places like Florida and Texas need to use a VPN.

Australia recently passed a law banning social media use for anyone under the age of 16, regardless of explicit content, which is currently making its way through the expected challenges. The law had a 12-month buffer built in to allow the country’s internet safety regulator to figure out how to implement it. Tech giants like Meta and TikTok were dealt a blow on Friday after the commission issued a report stating that age verification “can be private, robust and effective,” though trials are ongoing about how to best make the law work, according to ABC News in Australia.

Source: Pornhub Back Online in France After Court Ruling About Age Verification

Nope. Age verification is easily broken and is a huge security / privacy risk.

Your brain has a hidden beat — and smarter minds sync to it

When we focus, switch tasks, or face tough mental challenges, the brain starts to sync its internal rhythms, especially in the midfrontal region. A new study has found that smarter individuals show more precise and flexible coordination of slow theta waves during key decision-making moments. Using EEG recordings and cognitive testing, researchers discovered that it s not constant brainwave synchronization that matters most, but the brain s ability to dynamically adapt its rhythms like a well-tuned orchestra. This flexible neural harmony seems to be a hidden engine behind attention, reasoning, and intelligence.

[…]

A new study from Johannes Gutenberg University Mainz (JGU) is the first to show how flexibly this neural synchrony adjusts to different situations and that this dynamic coordination is closely linked to cognitive abilities. “Specific signals in the midfrontal brain region are better synchronized in people with higher cognitive ability – especially during demanding phases of reasoning,” explained Professor Anna-Lena Schubert from JGU’s Institute of Psychology, lead author of the study recently published in the Journal of Experimental Psychology: General.

The researchers focused on the midfrontal area of the brain and the measurable coordination of the so-called theta waves. These brainwaves oscillate between four and eight hertz and belong to the group of slower neural frequencies. “They tend to appear when the brain is particularly challenged such as during focused thinking or when we need to consciously control our behavior,” said Schubert, who heads the Analysis and Modeling of Complex Data Lab at JGU.

Being able to focus even next to a buzzing phone

The 148 participants in the study, aged between 18 and 60, first completed tests assessing memory and intelligence before their brain activity was recorded using electroencephalography (EEG). This method measures tiny electrical signals in the brain using electrodes placed on the scalp and is a well-established technique for gaining precise insights into cognitive processes. During EEG recording, participants completed three mentally demanding tasks designed to assess cognitive control.

The researchers were interested in the participants’ ability to flexibly shift between changing rules, which is an essential aspect of intelligent information processing. For example, participants had to press a button to decide whether a number was even or odd, and moments later whether it was greater or less than five. Each switch of rules required rapid adjustment of mental strategies – a process that allowed researchers to closely observe how the brain’s networks coordinate in real time.

As a result, individuals with higher cognitive abilities showed especially strong synchronization of theta waves during crucial moments, particularly when making decisions. Their brains were better at sustaining purposeful thought when it mattered most. “People with stronger midfrontal theta connectivity are often better at maintaining focus and tuning out distractions, be it that your phone buzzes while you’re working or that you intend to read a book in a busy train station,” explained Schubert.

A flexible rhythm in the brain

Professor Anna-Lena Schubert was particularly surprised by how closely this brain rhythm coordination was tied to cognitive abilities. “We did not expect the relationship to be this clear,” she said. What mattered most was not continuous synchronization, but the brain’s ability to adapt its timing flexibly and contextually – like an orchestra that follows a skilled conductor. The midfrontal region often sets the tone in this coordination but works in concert with other areas across the brain. This midfrontal theta connectivity appears to be particularly relevant during the execution of decisions, however not during the preparatory mental adjustment to new task rules.

[…]

Journal Reference:

  1. Anna-Lena Schubert, Christoph Löffler, Henrike M. Jungeblut, Mareike J. Hülsemann. Trait characteristics of midfrontal theta connectivity as a neurocognitive measure of cognitive control and its relation to general cognitive abilities.. Journal of Experimental Psychology: General, 2025; DOI: 10.1037/xge0001780

Source: Your brain has a hidden beat — and smarter minds sync to it | ScienceDaily

Denmark using robotic sailboats for surveillance in Baltic and North Seas

KOGE MARINA, Denmark (AP) — From a distance they look almost like ordinary sailboats, their sails emblazoned with the red-and-white flag of Denmark.

But these 10-meter (30-foot) -long vessels carry no crew and are designed for surveillance.

Four uncrewed robotic sailboats, known as “Voyagers,” have been put into service by Denmark’s armed forces for a three-month operational trial.

Built by Alameda, California-based company Saildrone, the vessels will patrol Danish and NATO waters in the Baltic and North Seas, where maritime tensions and suspected sabotage have escalated sharply since Russia’s full-scale invasion of Ukraine on Feb. 24, 2022.

Two of the Voyagers launched Monday from Koge Marina, about 40 kilometers (25 miles) south of the Danish capital, Copenhagen. Powered by wind and solar energy, these sea drones can operate autonomously for months at sea. Saildrone says the vessels carry advanced sensor suites — radar, infrared and optical cameras, sonar and acoustic monitoring.

Their launch comes after two others already joined a NATO patrol on June 6.

Saildrone founder and CEO Richard Jenkins compared the vessels to a “truck” that carries sensors and uses machine learning and artificial intelligence to give a “full picture of what’s above and below the surface” to about 20 to 30 miles (30 to 50 kilometers) in the open ocean.

Saildrone, he said, is “going to places … where we previously didn’t have eyes and ears.”

The Danish Defense Ministry says the trial is aimed at boosting surveillance capacity in under-monitored waters, especially around critical undersea infrastructure such as fiber-optic cables and power lines.

[…]

Source: Denmark using robotic sailboats for surveillance in Baltic and North Seas | AP News

Pregnant mothers exposed to Sandstorm Sandy and extreme heat end up birthing kids with deformed brains

  Weather-related stressors on healthy brain development has become an important topic in recent years. Notably, prenatal stress exposure to natural disasters may disrupt child neurodevelopment, with recent research exploring its impact on child brain morphology. Prenatal exposure to extreme weather events, such as ambient heat, may also affect child brain morphology. The basal ganglia, while historically related to motor ability, has gained increasing attention for its role in various non-motor functions, such as emotion regulation. Leveraging an existing cohort with and without prenatal exposure to Superstorm Sandy (SS), a category 3 hurricane at its peak, this study aims to investigate how prenatal exposure to both a natural disaster and extreme ambient heat impacts this important subcortical region.

[…]

Conclusions: Prenatal exposure to SS impacted child brain development. Extreme heat amplified this risk via increased and reduced brain volume from different basal ganglia subregions. Alongside promoting initiatives to combat climate change, increasing awareness of the potential dangers of exposure to extreme climate events for pregnant individuals is vital for protecting long-term child brain development.

Source: Prenatal exposure to extreme ambient heat may amplify the adverse impact of Superstorm Sandy on basal ganglia volume among school-aged children – PubMed

Google just landed a huge blow to custom ROMs

Earlier this year, Google announced it would develop the Android OS fully in private to simplify its development process. By focusing its efforts on a single internal branch, Google aimed to streamline work that was previously split. The news initially spooked some in the Android development community, but the controversy quickly subsided. The impact was minimal, as Google was already developing most of Android behind closed doors and promised that source code releases would continue. Now, however, a recent omission from Google has rekindled fears that the company might stop sharing source code for new Android releases. Google has stated these concerns are unfounded, but other new changes make it harder for the custom ROM community to thrive on Pixel devices.

Is AOSP going away? Google says no

As promised, Google published the source code for Android 16 this week, allowing independent developers to compile their own builds of the new operating system. This source code was uploaded to the Android Open Source Project (AOSP), as usual, under the permissive Apache 2.0 license.

However, multiple developers quickly noticed a glaring omission from the Android 16 source code release: the device trees for Pixel devices were missing. Google also failed to upload new driver binaries for each Pixel device and released the kernel source code with a squashed commit history. Since Google has shared the device trees, driver binaries, and full kernel source code commit history for years, its omission in this week’s release was concerning.

These omissions led some to speculate this week that Google was taking the first step in a plan to discontinue AOSP. In response, Google’s VP and GM of Android Platform, Seang Chau, refuted these claims. He addressed the speculation in a post on X, stating that “AOSP is NOT going away.”

[…]

he more significant issue, however, is the impact this decision will have on developers who build custom ROMs — the community term for hobbyist forks of AOSP. Nolen Johnson, a long-time contributor and reviewer for the LineageOS project, says the process of building these ROMs for Pixel phones will become “painful” moving forward.

Previously, Google made it simple for developers to build AOSP for Pixel devices, but that support is now gone. Developers simply had to “pull the configurations [that] Google created,” add their customizations, and then build. Now, however, they will need to take the old device trees that Google released for Android 15 and “blindly guess and reverse engineer from the prebuilt [binaries] what changes are needed each month.”

This is because making a full Android build for a device — not just a GSI — requires a device tree. This is a “collection of configuration files that define the hardware layout, peripherals, proprietary file listings, and other details for a specific device, allowing the build system to build a proper image for that device.” While Google previously handled this work, developers must now create their own device trees without access to the necessary proprietary source code.

Furthermore, Google’s decision to squash the kernel source code’s commit history also hinders custom development. The Pixel’s kernel source code was often used as a “reference point for other devices to take features, bug fixes, and security patches from,” but with the history now reduced to a single commit, this is no longer feasible.

While Google is under no obligation to release device trees, provide driver binaries, or share the full kernel commit history (in fact, it’s one of the few device makers to do these things), it has done so for years. The company’s reason for doing so was because the Pixel was treated as a reference platform for AOSP, so developers needed an easy way to build for it.

[…]

Source: AOSP isn’t dead, but Google just landed a huge blow to custom ROMs

Net Neutrality: What happened during the July 12 Internet-Wide Day of Action protest, why did the internet go down?

Updated July 14: The Internet-Wide Day of Action to Save Net Neutrality on July 12 enjoyed a healthy turnout.Thousands of companies and some visible tech celebrities united against the FCC proposal called Restoring Internet Freedom, by which the new FCC chairman Ajit Pai hopes to loosen regulations for the ISPs and telecom companies that provide Internet service nationwide. The public has until mid-August to give comments to the FCC.

The protests took many forms. Organizations including the American Civil Liberties Union, Reddit, The Nation, and Greenpeace placed website blockers to imitate what would happen if the FCC loosened regulations. Other companies participating online displayed images on their sites that simulated a slowed-down Internet, or demanded extra money for faster access.

Haley Velasco/IDG
For the July 12 Internet-Wide Day of Action advocating net neutrality, sites including The Nation displayed images showing people what the web would be like if corporations operated it for a profit.

Tech giant Google published a blog post in defense of net neutrality. “Today’s open internet ensures that both new and established services, whether offered by an established internet company like Google, a broadband provider or a small startup, have the same ability to reach users on an equal playing field.”

net neutrality sheryl sandberg facebook post Melissa Riofrio/IDG
Facebook COO Sheryl Sandberg posted to her page about net neutrality as part of the July 12 Internet-Wide Day of Action.

Facebook joined in with Sheryl Sandberg posting her message on Facebook as well as Facebook CEO Mark Zuckerberg.“Keeping the internet open for everyone is crucial. Not only does it promote innovation, but it lets people access information that can change their lives and gives voice to those who might not otherwise be heard,” Sandberg said.

In Washington, FCC Commissioner Mignon Clyburn said in a statement that she supports a free and open internet. “Its benefits can be felt across our economy and around the globe,” she said. “That is why I am excited that on this day consumers, entrepreneurs and companies of all sizes, including broadband providers and internet startups, are speaking out with a unified voice in favor of strong net neutrality rules grounded in Title II. Knowing that the arc of success is bent in our favor and we are on the right side of history, I remain committed to doing everything I can to protect the most empowering and inclusive platform of our time.”

Sen. Ron Wyden, D-Ore., and Sen. Brian Schatz, D-Hawaii, wrote a letter to the FCC Tuesday – one day early — to make sure the FCC’s system was ready to withstand a cyberattack, as well as the large volume of calls expected Wednesday.

What led up to the protest

The July 12 Internet-Wide Day of Action strove to highlight how the web would look if telecom companies were allowed to control it for profit. Organizing groups such as Fight for the Future, Free Press Action Fund, and Demand Progress want their actions to call attention to the potential impact on everyday users, such as having to pay for faster internet access.

Where net neutrality stands: Under the Open Internet Order enacted by the FCC in 2015, internet service providers cannot block access to content on websites or apps, interfere with loading speeds, or provide favoritism to those who pay extra. However, FCC Chairman Ajit Pai, selected by President Trump in January, has been advocating a completely open internet, where the ISPs could control access or charge fees without regulation. A Senate bill that would relax regulations, called Restoring Internet Freedom (S.993), was introduced in May and was referred to the Committee on Commerce, Science, and Transportation.

What this protest is for: The July 12 protest, which organizers are calling the Internet-Wide Day of Action to Save Net Neutrality, will fight for free speech on the internet under Title II of FCC’s Communications Act of 1934. On that date, websites and apps that support net neutrality will display alerts to mimic what could happen if the FCC rolled back the rules.

Who will come together for the protest: More than 180 companies including Amazon, Twitter, Etsy, OkCupid, and Vimeo, along with advocacy groups such as the ACLU, Change.org, and Greenpeace, will join the protest and urge their users and followers to do the same.

Where the protest will take place: Sites that support net neutrality will call attention to their cause by simulating what users would experience if telecom companies were allowed to control web access. Examples will include a simulated “spinning wheel of death” (when a webpage or app won’t load), blocked notifications, and requests to upgrade to paid plans. Organizers are also calling on supporters to stage in-person protests at congressional offices and post protest selfies on social media with the tag #savethenet.

Who opposes the protest: FCC Chairman Ajit Pai and large telecom companies, such as Verizon and Comcast, want to relax net neutrality rules. Some claim that an unregulated internet will allow for more competition in the marketplace, as well as oversight of privacy and security measures.

Why this protest matters: The July 12 protest is projected to be one of the largest digital protests ever planned, with more than 50,000 people, sites, and organizations participating. If successful, it would be reminiscent of a 2012 blackout for freedom of speech on the internet to protest the Stop Online Piracy Act and the PROTECT IP Act, and an internet slowdown in 2014 to demand discussions about net neutrality.

Source: Net Neutrality: What happened during the July 12 Internet-Wide Day of Action protest | PCWorld

Mohawk Networks published a list of participants and conseqences on the 11th of July

So No, Yahoo / Mashable, you got it completely wrong in your article

 

‘We’re done with Teams’: German state hits uninstall on Microsoft. So do Denmark and NL.

In less than three months’ time, almost no civil servant, police officer or judge in Schleswig-Holstein will be using any of Microsoft’s ubiquitous programs at work.

Instead, the northern state will turn to open-source software to “take back control” over data storage and ensure “digital sovereignty”, its digitalisation minister, Dirk Schroedter, told AFP.

“We’re done with Teams!” he said, referring to Microsoft’s messaging and collaboration tool and speaking on a video call — via an open-source German program, of course.

The radical switch-over affects half of Schleswig-Holstein’s 60,000 public servants, with 30,000 or so teachers due to follow suit in coming years.

The state’s shift towards open-source software began last year.

The current first phase involves ending the use of Word and Excel software, which are being replaced by LibreOffice, while Open-Xchange is taking the place of Outlook for emails and calendars.

Over the next few years, there will also be a switch to the Linux operating system in order to complete the move away from Windows.

[…]

“The geopolitical developments of the past few months have strengthened interest in the path that we’ve taken,” said Schroedter, adding that he had received requests for advice from across the world.

“The war in Ukraine revealed our energy dependencies, and now we see there are also digital dependencies,” he said.

The government in Schleswig-Holstein is also planning to shift the storage of its data to a cloud system not under the control of Microsoft, said Schroedter.

[…]

Source: ‘We’re done with Teams’: German state hits uninstall on Microsoft

In an interview with Danish broadsheet newspaper Politiken [Danish], Caroline Olsen, the country’s Minister for Digital Affairs, said she is planning to lead by example and start removing Microsoft software and tools from the ministry. The minister told Jutland’s Nordyske [🇩🇰 Danish, but not paywalled] the plan is that half the staff’s computers – including her own – would have LibreOffice in place of Microsoft Office 365 in the first month, with the goal of total replacement by the end of the year.

English-language site The Local is also carrying the story. The move follows similar ones by the city governments of Copenhagen and Aarhus.

Given that earlier this year, US President Donald Trump was making noises about taking over Greenland, an autonomous territory of Denmark, it seems entirely understandable for the country to take a markedly increased interest in digital sovereignty – as Danish Ruby guru David Heinemeier Hansson explained just a week ago.

[…]

The more pressing problem tends to be groupware – specifically, the dynamic duo of Outlook and Exchange, as Bert Hubert told The Register earlier this year. Several older versions go end-of-life soon, along with Windows 10. Modernizing is expensive, which makes migrating look more appealing.

A primary alternative to Redmond, of course, is Mountain View. Google’s offerings can do the job. In December 2021, the Nordic Choice hotel group was hit by Conti ransomware, but rather than pay to regain access to its machines, it switched to ChromeOS.

The thing is, this is jumping from one US-based option to another. That’s why France rejected both a few years ago, and we reported on renewed EU interest early the following year. Such things may be why French SaaS groupware offering La Suite numérique is looking quite complete and polished these days.

EU organizations can host their own cloud office suite thanks to Collabora’s CODE, which runs LibreOffice on an organization’s own webservers – easing deployment and OS migration.

[…]

Source: Danish department determined to dump Microsoft

Not content to wait for open letters to influence the European Commission, Dutch parliamentarians have taken matters into their own hands by passing eight motions urging the government to ditch US-made tech for homegrown alternatives.

With each IT service our government moves to American tech giants, we become dumber and weaker…

The motions were submitted and all passed yesterday during a discussion in the Netherlands’ House of Representatives on concerns about government data being shipped overseas. While varied, they all center on the theme of calling on the government to replace software and hardware made by US tech companies, acquire new contracts with Dutch companies who offer similar services, and generally safeguard the country’s digital sovereignty.

“With each IT service our government moves to American tech giants, we become dumber and weaker,” Dutch MP Barbara Kathmann, author of four of the motions, told The Register. “If we continue outsourcing all of our digital infrastructure to billionaires that would rather escape Earth by building space rockets, there will be no Dutch expertise left.”

Kathmann’s measures specifically call on the government to stop the migration of Dutch information and communications technology to American cloud services, the creation of a Dutch national cloud, the repatriation of the .nl top-level domain to systems operating within the Netherlands, and for the preparation of risk analyses and exit strategies for all government systems hosted by US tech giants. The other measures make similar calls for eliminating the presence of US tech companies in government systems and the preference of local alternatives.

“We have identified the causes of our full dependency on US services,” Kathmann told us. “We have to start somewhere – by pausing all thoughtless migrations to American hyperscalers, new opportunities open up for Dutch and European providers.”

The motions passed by the Dutch parliament come as the Trump administration ratchets up tensions with a number of US allies – the EU among them. Nearly 100 EU-based tech companies and lobbyists sent an open letter to the European Commission this week asking it to find a way to divest the bloc from systems managed by US companies due to “the stark geopolitical reality Europe is now facing.”

[…]

Source: Time to ditch US tech for homegrown options, says Dutch parliament

The only question is, how did the retards in charge of procurement allow themselves to buy 100% US and closed source vendor lock-in in the first place, gutting the EU software development market?

Tiny human hearts grown in pig embryos for the first time

Researchers have reported growing hearts containing human cells in pig embryos for the first time. The embryos survived for 21 days, and in that time their tiny hearts started beating. The findings were presented this week at the annual meeting of the International Society for Stem Cell Research in Hong Kong.

[…]

Pigs are a suitable donor species because the size and anatomy of their organs are comparable with those of humans, says Lai Liangxue

[…]

In their study, which has not been peer reviewed, Lai and his team reprogrammed human stem cells to bolster their ability to survive in a pig, by introducing genes that prevent cell death and enhance cell growth. They then generated pig embryos in which two specific genes that have key roles in heart development were knocked out. A handful of human stem cells were introduced into the pig embryos at the morula stage, soon after fertilization — a point at which the embryo consists of a ball of about a dozen cells that are rapidly dividing. The embryos were then transferred to surrogate pigs.

The team found that the embryos grew for up to 21 days, after which they did not survive. Lai says it’s possible the human cells disrupted the function of the pig hearts.

[…]

Source: Tiny human hearts grown in pig embryos for the first time

Nintendo will record your Gamechat audio and video

Last month, ahead of the launch of the Switch 2 and its GameChat communication features, Nintendo updated its privacy policy to note that the company “may also monitor and record your video and audio interactions with other users.” Now that the Switch 2 has officially launched, we have a clearer understanding of how the console handles audio and video recorded during GameChat sessions, as well as when that footage may be sent to Nintendo or shared with partners, including law enforcement. Before using GameChat on Switch 2 for the first time, you must consent to a set of GameChat Terms displayed on the system itself. These terms warn that chat content is “recorded and stored temporarily” both on your system and the system of those you chat with. But those stored recordings are only shared with Nintendo if a user reports a violation of Nintendo’s Community Guidelines, the company writes.

That reporting feature lets a user “review a recording of the last three minutes of the latest three GameChat sessions” to highlight a particular section for review, suggesting that chat sessions are not being captured and stored in full. The terms also lay out that “these recordings are available only if the report is submitted within 24 hours,” suggesting that recordings are deleted from local storage after a full day. If a report is submitted to Nintendo, the company warns that it “may disclose certain information to third parties, such as authorities, courts, lawyers, or subcontractors reviewing the reported chats.” If you don’t consent to the potential for such recording and sharing, you’re prevented from using GameChat altogether.

Nintendo is extremely clear that the purpose of its recording and review system is “to protect GameChat users, especially minors” and “to support our ability to uphold our Community Guidelines.” This kind of human moderator review of chats is pretty common in the gaming world and can even apply to voice recordings made by various smart home assistants. […] Overall, the time-limited, local-unless-reported recordings Nintendo makes here seem like a minimal intrusion on the average GameChat user’s privacy. Still, if you’re paranoid about Nintendo potentially seeing and hearing what’s going on in your living room, it’s good to at least be aware of it.

Source: Nintendo Warns Switch 2 GameChat Users: ‘Your Chat Is Recorded’ (arstechnica.com)

Apple thinks it can argue its’ way out of EU DMA with a single comma. No it can’t and this fight will cost it billions in Europe

It’s just a comma in a 66-page document. But a comma that will cost Apple billions of euros in Europe. Starting June 23, the Cupertino-based company will no longer be able to collect commissions on external transactions made from an iPhone or iPad. In other words, all app developers will be able to redirect their users to a website to make a purchase or subscribe to a service without paying Apple a single cent.

This bombshell, which comes just after an unfavorable ruling in the US, is the result of a months-long syntactic battle with the European Commission over the exact meaning of an article in the Digital Markets Act (DMA), designed to strengthen competition in the digital space. In late April, Apple had already been fined €500 million.

Enacted last year, the DMA bans the so-called anti-steering practice, which Apple has enforced since the launch of the App Store. This required developers to use its payment platform and pay it 15% or 30%. Officially, Apple has abandoned this, though Brussels still accuses it of maintaining “technical and commercial restrictions.”

However, Apple has not given up on collecting commissions. It initially set them at 12% or 27% for purchases made within seven days after redirection. It has since introduced a more complex system, with fees of up to 25% on transactions during the twelve months following installation or update of an app. According to the EU, these commissions not only go “beyond what is strictly necessary”—as noted a year ago—but they also violate the DMA.

A comma that changes everything?

The disagreement between Apple and Brussels centers on Article 5.4. In its English version, the article states that the gatekeeper—the term used by the Commission for the seven major tech companies subject to the DMA—“shall allow business users, free of charge, to communicate and promote offers, including under different conditions […], and to conclude contracts with those end users.”

This lengthy sentence creates ambiguity: what exactly does “free of charge” apply to? Apple claims it only applies to “communicate” and “promote,” meaning the right to insert redirect links in an app. But not to “conclude contracts,” meaning making purchases. Based on that, Apple argues it can still charge commissions on those external transactions.

The European Commission interprets it differently: contract conclusion must also be free of charge. It relies on the comma before the phrase “and to conclude contracts,” turning the sentence into an “enumeration.” “That ‘free of charge’ applies to all that is being enumerated after”, it explains in its detailed decision sent to Apple as part of the €500 million fine, which was made public last week.

“In other words, the price for app developers to pay [for external purchases] is zero,” writes the Commission. However, its case could be weakened by inconsistencies in the French and German translations of the text, which it acknowledges are “ambiguous.” Still, “other linguistic versions leave no room for interpretation,” notes Brussels.

Daily penalties of up to €47 million

To complicate matters further, the regulator acknowledges that Apple can be compensated for the initial acquisition of a customer by a developer. But this commission—whose rate must be determined by the company—can only apply within a “limited initial time window” after the first installation of an app.

Crucially, it only concerns the very first transaction, even if the user deletes and later reinstalls the app. “An end user can only be acquired once,” says the Commission. Apple contests this, arguing that “the value of the initial purchase is a poor measure of value delivered by App Store” since it only represents a “small fraction of acquisition value to developer”.

[…]

For a year now, it has adopted a very combative stance toward the DMA, aiming to concede as little as possible. But it faces daily penalties of up to €47 million. In April, European officials said they would not hesitate to apply them if necessary.

[…]

Source: A simple comma is going to cost Apple billions in Europe

Apple has been putting spanners in the works of the EU DMA since inception and has been pissing off developers, the EU and customers since then. The EU is toughening it’s stance – the spirit of the law is more important than a single comma in a huge document in Europe.

How Russian Spies Are Analyzing Data From China’s WeChat App

Russian counterintelligence agents are analyzing data from the popular Chinese messaging and social media app WeChat to monitor people who might be in contact with Chinese spies, according to a Russian intelligence document obtained by The New York Times.
The disclosure highlights the rising level of concern about Chinese influence in Russia as the two countries deepen their relationship. As Russia has become isolated from the West over its war in Ukraine, it has become increasingly reliant on Chinese money, companies and technology. But it has also faced what the document describes as increased Chinese espionage efforts.
The document indicates that the Russian domestic security agency, known as the F.S.B., pulls purloined data into an analytical tool known as “Skopishche” (a Russian word for a mob of people). Information from WeChat is among the data being analyzed, according to the document.
Read More
Russian intelligence officers are increasingly concerned about Chinese espionage as the two countries grow closer.
Secret Russian Intelligence Document Shows Deep Suspicion of China
June 7, 2025
How We Obtained and Vetted a Russian Intelligence Document
June 7, 2025
The document offers insights into the espionage tactics of two authoritarian governments that are preoccupied with surveillance.
According to the document, the system processes detailed data on WeChat users, including account logins, contact lists and message archives, some of which are extracted from phones seized from people of interest to Russia’s spy hunters.
The tool is used to scrutinize the data trail of “people using the Chinese messenger WeChat to talk to representatives of the PRC intelligence services,” the document says, using the abbreviation for the People’s Republic of China.
[…]
WeChat, owned by the Chinese tech giant Tencent, is one of the most widely used digital platforms in the world, mostly concentrated in China and among Chinese communities. It functions as an all-in-one tool that combines messaging, mobile payments, social networking and government services. The app has over 1.4 billion users globally, according to Tencent financial disclosures.
[…]
WeChat added some limited encryption features in 2016, according to Mona Wang, a research fellow at the University of Toronto’s Citizen Lab. But the security improvements still fall short of the encryption offered by other messaging apps like Signal or WhatsApp.
It is unclear why Chinese intelligence officers would use WeChat to communicate with sources, given its lack of end-to-end encryption. But sources or potential recruits may not know they are communicating with spies, who often pose as diplomats and strike up casual conversations at first.
[…]

Source: How Russian Spies Are Analyzing Data From China’s WeChat App – The New York Times

Bruteforcing the phone number of any Google user

A few months ago, I disabled javascript on my browser while testing if there were any Google services left that still worked without JS in the modern web. Interestingly enough, the username recovery form still worked!

This surprised me, as I used to think these account recovery forms required javascript since 2018 as they relied on botguard solutions generated from heavily obfuscated proof-of-work javascript code for anti-abuse.

[Technical report follows – nb Google has fixed this now]

Source: Bruteforcing the phone number of any Google user

Honda Tests a Reusable Rocket

In what seemed to be a development that came from nowhere, there’s a new entrant into the reusable launch systems competition – Honda. The giant Japanese industrial conglomerate recently launched a prototype reusable rocket up to 300m and landed it safely back on Earth.

[…]

Honda’s first test launch took place on June 17th. During the test, a prototype rocket that was 6.3m tall and 85 cm in diameter, with a wet weight of 1312 kg, launched 271.4 m into the air and landed 37 cm from its nominal landing spot after a 56.6 second flight. Data was collected throughout the test to inform the next round of testing.

This step is the equivalent to the famous “Grasshopper” experiments that SpaceX completed back in 2013, where the rocket would launch, hover and return to the ground. It was a necessary step on the path to reusable rocketry, and Honda is now only the fourth company to ever complete this feat.

[…]

SpaceX is famous for it’s work culture that is at least partly driven by fear of failure [and, a huge string of failures!], which probably won’t be the case for the Honda engineers who could simply shuffle off to other parts of the organization if their rocketry experiments fail. But, given Japan’s increasing presence in the growing space industry, it was only a matter of time before a Japanese champion would join the fray of the new RLV industry.

[…]

Source: Honda – Yes, Honda – Tests a Reusable Rocket

Meta, yandex caught spying on android users web activity using Covert Web-to-App Tracking via unprotected Localhost since 2017

https://localmess.github.io/

We disclose a novel tracking method by Meta and Yandex potentially affecting billions of Android users. We found that native Android apps—including Facebook, Instagram, and several Yandex apps including Maps and Browser—silently listen on fixed local ports for tracking purposes.

These native Android apps receive browsers’ metadata, cookies and commands from the Meta Pixel and Yandex Metrica scripts embedded on thousands of web sites. These JavaScripts load on users’ mobile browsers and silently connect with native apps running on the same device through localhost sockets. As native apps access programatically device identifiers like the Android Advertising ID (AAID) or handle user identities as in the case of Meta apps, this method effectively allows these organizations to link mobile browsing sessions and web cookies to user identities, hence de-anonymizing users’ visiting sites embedding their scripts.

This web-to-app ID sharing method bypasses typical privacy protections such as clearing cookies, Incognito Mode and Android’s permission controls. Worse, it opens the door for potentially malicious apps eavesdropping on users’ web activity.

[…]

Android OS allows any installed app with the INTERNET permission to open a listening socket on the loopback interface (127.0.0.1). Browsers running on the same device also access this interface without user consent or platform mediation. This allows JavaScript embedded on web pages to communicate with native Android apps and share identifiers and browsing habits, bridging ephemeral web identifiers to long-lived mobile app IDs using standard Web APIs.

[…]

Additional risk: Browsing history leak

Using HTTP requests for web-to-native ID sharing (i.e. not WebRTC STUN or TURN) may expose users browsing history to third-parties. A malicious third-party Android application that also listens on the aforementioned ports can intercept the HTTP requests sent by the Yandex Metrica script and the first, now-unused, implementation of Meta’s communication channel by monitoring the Origin HTTP header.

We developed a proof-of-concept app to demonstrate the feasibility of this browsing history harvesting by a malicious third-party app. We found that browsers such as Chrome, Firefox and Edge are susceptible to this form of browsing history leakage in both default and private browsing modes. Brave browser was unaffected by this issue due to their blocklist and the blocking of requests to the localhost; and DuckDuckGo was only minimally affected due to missing domains in their blocklist.

[…]

According to BuiltWith, a website that tracks web technology adoption: Meta Pixel is embedded on over 5.8 million websites. Yandex Metrica, on the other hand, is present on close to 3 million websites. According to HTTP Archive, an open and public dataset that runs monthly crawls of ~16 million websites, Meta Pixel and Yandex Metrica are present on 2.4 million and 575,448 websites, respectively.

[…]

Disclosure

Our responsible disclosure to major Android browser vendors led to several patches attempting to mitigate this issue; some already deployed, others currently in development. We thank all participating vendors (Chrome, Mozilla, DuckDuckGo, and Brave) for their active collaboration and constructive engagement throughout the process. Other Chromium-based browsers should follow upstream code changes to patch their own products.

However, beyond these short-term fixes, fully addressing the issue will require a broader set of measures as they are not covering the fundamental limitations of platforms’ sandboxing methods and policies. These include user-facing controls to alert users about localhost access, stronger platform policies accompanied by consistent and strict enforcement actions to proactively prevent misuse, and enhanced security around Android’s interprocess communication (IPC) mechanisms, particularly those relying on localhost connections.

[…]

Scientists in Japan develop plastic that dissolves in seawater within hours | Reuters

https://www.reuters.com/sustainability/climate-energy/scientists-japan-develop-plastic-that-dissolves-seawater-within-hours-2025-06-04/

Researchers in Japan have developed a plastic that dissolves in seawater within hours, offering up a potential solution for a modern-day scourge polluting oceans and harming wildlife.


While scientists have long experimented with biodegradable plastics, researchers from the RIKEN Center for Emergent Matter Science and the University of Tokyo say their new material breaks down much more quickly and leaves no residual trace.

[…]

Aida said the new material is as strong as petroleum-based plastics but breaks down into its original components when exposed to salt. Those components can then be further processed by naturally occurring bacteria, thereby avoiding generating microplastics that can harm aquatic life and enter the food chain.

As salt is also present in soil, a piece about five centimetres (two inches) in size disintegrates on land after over 200 hours, he added.

The material can be used like regular plastic when coated, and the team are focusing their current research on the best coating methods, Aida said. The plastic is non-toxic, non-flammable, and does not emit carbon dioxide, he added.

Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump

A mystery whistleblower calling himself GangExposed has exposed key figures behind the Conti and Trickbot ransomware crews, publishing a trove of internal files and naming names.

The leaks include thousands of chat logs, personal videos, and ransom negotiations tied to some of the most notorious cyber-extortion gangs —believed to have raked in billions from companies, hospitals, and individuals worldwide.

It’s part of his “fight against an organized society of criminals known worldwide,” GangExposed told The Register via Signal chat. He claims that he’s not interested in the $10 million bounty that the Feds have put up for information about one key Conti leader that he’s already named, as well as a second that he says will soon be identified on Telegram.

“I take pleasure in thinking I can rid society of at least some of them,” GangExposed said. “I simply enjoy solving the most complex cases.”

After creating his latest Telegram channel on May 5 — GangExposed says two earlier accounts were shut down days ago — he published his first “revelation” and outed Stern, the leader of Trickbot and Conti, as 36-year-old Russian named Vitaly Nikolaevich Kovalev. Stern’s identity was later confirmed by German police.

I take pleasure in thinking I can rid society of at least some of them

A couple of days later, GangExposed claimed to identify another key Conti crim who goes by Professor as Vladimir Viktorovich Kvitko, a 39-year-old Russian national who reportedly relocated from Moscow to Dubai. According to chat logs and other communications leaked by GangExposed, Kvitko and other Conti leaders moved to Dubai in 2020 and set up shop in the United Arab Emirates to continue their cyberattacks against Western organizations.

“Kvitko maintains a modest lifestyle, with known property in Moscow and several vehicles registered to family members,” GangExposed posted. “Income mostly originates from RM RAIL Management Company and Rosselkhozbank. In contrast, other Conti leaders (e.g., ‘Target’) display significant luxury assets, including a Moscow City apartment, Ferrari, and 2 multiple Maybach vehicles.”

He also published a video of what GangExposed says is six Conti ransomware members on a private jet, celebrating the birthday of another key leader, Target. 

The US government has offered up to $10 million for information leading to the identification or location of five key Conti operators, including “Professor” and “Target.” GangExposed says he’s going to identify Target next.

“Essentially I burned $10 million when I published Professor,” he told The Register. “And I’m about to burn another $10 million when I publish Target.”

And on Thursday, he posted a whopping 15 photos of alleged Conti members along with a more detailed write-up of Conti’s lead sysadmin Defender, aka Andrey Yuryevich Zhuykov, and Mango, aka Mikhail Mikhailovich Tsaryov, a senior manager within the group.

This is no longer just a leak — it’s a high-stakes intelligence war

“This is no longer just a leak — it’s a high-stakes intelligence war,” FalconFeeds threat intel analysts posted on social media.

Who is GangExposed?

GangExposed calls himself an “independent anonymous investigator” without any formal IT background, and said he hasn’t had “a ‘real’ name in years.”

“My toolkit includes classical intelligence analysis, logic, factual research, OSINT methodology, stylometry (I am a linguist and philologist), human psychology, and the ability to piece together puzzles that others don’t even notice,” he said. “I am a cosmopolitan with many homes but no permanent base — I move between countries as needed. My privacy standards are often stricter than those of most subjects of my investigations.”

GangExposed says he obtained all of the data he leaked via “semi-closed databases, darknet services (for probing state records through corrupt officials), and I often purchase information. I have access to the leaked FSB border control database,” which he says was being sold on the darkweb for $250,000. 

He hopes his investigation can achieve three objectives. First, he wants to publicly identify all of the gangs’ key criminal participants — GangExposed puts this number at around 50 — see them sanctioned, and also named on Interpol’s wanted persons list.

Second, GangExposed says he wants to “disrupt their current enrichment schemes by exposing the organizers of the Blockchain Life forum, which serves as a breeding ground for fraudulent pyramid schemes.” 

Blockchain Life, according to the internal chat logs, was a scheme organized by Khitrov and Kovalev (aka Stern) that aimed to legitimize Trickbot’s and Conti’s illegally obtained cryptocurrency earnings

Finally, GangExposed says he wants to “deprive them of a safe haven in the UAE. The respected authorities of the UAE strictly uphold their laws, and while they lack extradition agreements for cybercriminals, I’ve managed to investigate and prove that Conti used the UAE specifically for carrying out attacks. In other words, they physically committed a series of crimes while being present there.”

Some security researchers think he could in fact be a disgruntled former ransomware criminal looking to burn his bosses or simply resurface the 2022 Conti leaks.

“The data we’ve reviewed provides strong indicators that the source behind the leak is either an ex-member or a disgruntled insider from within the group — given the level of access, context, and internal coordination reflected in the communications,” Technisanct founder and CEO Nandakishore Harikumar told The Register. Technisanct owns FalconFeeds.

Harikumar’s threat-intel group has analyzed all of GangExposed’s leaks, and shared a 34-page analysis with The Register about the massive data dump. He recommends that law enforcement pursue investigative leads from the newly disclosed personally identifiable information about key Conti leaders detailed in the leaks. ®

https://www.theregister.com/2025/05/31/gangexposed_coni_ransomware_leaks/