Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Roughly how much cash is in your pocket/wallet/purse right now?

  • None: why do I need cash anymore, grandpa?
  • Just enough for random small transactions
  • Enough for regular errands (grocery, fuel, etc.)
  • An unreasonably large amount
  • Normally none, but whatever amount my non-app-using acquantice paid me back for dinner
  • I'm all-in on crypto, you insensitive fiat-currency-loving clod!

[ Results | Polls ]
Comments:9 | Votes:34

posted by janrinok on Sunday April 26, @01:36AM   Printer-friendly

The Dumbest Hack of the Year Exposed a Very Real Problem:

In the wee hours of the night last April, someone stopped at roughly 20 street intersections across Silicon Valley and launched an unprecedented cyberattack that would eventually spread to multiple states, embarrassing local officials and prompting them to question their security practices. Authorities suspect the unknown culprit took advantage of weak and publicly available default passwords to wirelessly upload custom recordings that played whenever a pedestrian pressed a crosswalk button.

Instead of the normal recordings telling people to either wait or cross the street, pedestrians heard the spoofed voices of billionaire tech CEOs. A fake Mark Zuckerberg said at one Menlo Park intersection that people would not be able to stop AI from "forcefully" being inserted "into every facet of your conscious experience." At another, he celebrated "undermining democracy." At a different intersection, an altered Elon Musk described President Donald Trump as "actually really sweet and tender and loving," while on a nearby street his faked voice whined about being "so alone."

Government emails and text messages obtained by WIRED through public records requests show how the cities of Menlo Park, Redwood City, Palo Alto, and later Seattle and Denver scrambled to respond to the crosswalk button tampering. The communications, along with interviews with security experts and former employees of the button manufacturer, highlight how governments and the company had overlooked vulnerabilities in a widespread technology.

In Redwood City, then-city manager Melissa Diaz quizzed staff about who should be blamed for the incident. "We need to understand who should be accountable for the security of these systems and what we can do to hold either staff or the external responsible party accountable," she wrote in an email to colleagues in the days after the hack.

Nick Mathiowdis, Redwood City's current communications manager, tells WIRED that staff have been addressing the issue based on "lessons learned and evolving best practices," but declines to share details to avoid encouraging further hacks.

Edward Fok, a veteran Federal Highway Administration cybersecurity official who briefly investigated the hacking before retiring as DOGE swept through the government , says cities need to do a better job ensuring that cybersecurity clauses are baked into contracts with suppliers and installers of technology, especially as AI tools and powerful sensors are increasingly integrated into transportation infrastructure.

Redwood City, for example, had contractually required its button installation and maintenance vendor to "use reasonable diligence and best judgment" at the time of the hack but had not specified anything about passwords or digital security.

In an unsigned statement to WIRED, the highway administration said that it previously issued a technical advisory outlining "security measures to make sure ideological idiots are not jeopardizing Americans' safety when utilizing our crosswalks."

The police investigation into the hacked buttons in Silicon Valley has run cold. Authorities couldn't figure out who was behind the scheme because the buttons don't track who uploads audio, and surveillance footage from the area wasn't helpful, according to Redwood City police lieutenant Jeff Clements.

Greenville, Texas-based Polara Enterprises has been a leading supplier of crosswalk push buttons for decades. Some have the ability for cities to upload custom audioclips via Bluetooth to give pedestrians, including those who are blind or visually impaired, extra cues like the street and direction they are crossing.

Official online manuals and videos aimed at the thousands of technicians maintaining the buttons across the country describe how Bluetooth-enabled Polara models ship with a default password of "1234" and are configurable through a publicly available app . About eight months before last year's button hacking spree, a physical security vlogger who goes by the name Deviant Ollam posted a YouTube video pointing out how easy it would be to tamper with the buttons. "I'm not encouraging anyone to try completely guessable passwords and upload their own content because, remember, that would be bad. That would probably be a crime or something. Talk to your lawyers," he said in the video.


Original Submission

posted by janrinok on Saturday April 25, @08:54PM   Printer-friendly

The Smash program focuses on processing, not mining:

The United States has spent years trying to rebuild its rare earth supply chain, but mining alone hasn’t fixed the core problem. Processing remains the sticking point, and as Data Centre Dynamics reports, that’s where the Defense Advanced Research Projects Agency is placing a high-risk bet.

“So the challenge is processing, not mining,” said Julian McMorrow, Smash lead and program manager at DARPA’s Microsystems Technology Office. “We want to develop technologies to take the industry from wasting over 99 percent of its feedstock to making use of the entire feedstock.”

Traditional mining wastes enormous amounts of material during refinement. More than two tons of ore and 13 tons of water can produce just one kilogram of copper, leaving most of the original material discarded.

Smash explores a parallel processing model that attempts to extract nearly everything from a shovel of dirt at once. That concept borrows ideas from industries such as petroleum refining, where multiple outputs are separated efficiently from a single input.

The program also reflects concerns about relying on a single major site such as the Mountain Pass mine which once dominated global rare earth output but struggled when refining costs became uncompetitive.

DARPA notes that concentrating production in one location creates vulnerability if disruptions occur. A distributed model using varied feedstocks, including mining waste and recycled materials, could cut that exposure.

Smash will run as a 48-month effort split into two phases. The first will focus on proof-of-concept experiments, while the second will move toward working prototypes suitable for industrial mining environments.

Even if the technology succeeds in laboratory settings, scaling it economically could be tricky. Achieving profitability while maintaining strict environmental and labor standards will be the real test.


Original Submission

posted by janrinok on Saturday April 25, @04:08PM   Printer-friendly

A stubborn misconception is hampering the already hard work of quantum readiness:

With growing focus on the existential threat quantum computing poses to some of the most crucial and widely used forms of encryption, cryptography engineer Filippo Valsorda wants to make one thing absolutely clear: Contrary to popular mythology that refuses to die, AES 128 is perfectly fine in a post-quantum world.

AES 128 is the most widely used variety of the Advanced Encryption Standard , a block cipher suite formally adopted by NIST in 2001. While the specification allows 192- and 256-bit key sizes, AES 128 was widely considered to be the preferred one because it meets the sweet spot between computational resources required to use it and the security it offers. With no known vulnerabilities in its 30-year history, a brute-force attack is the only known way to break it. With 2 128 or 3.4 x 10 38 possible key combinations, such an attack would take about 9 billion years using the entire Bitcoin mining resources as of 2026.

Over the past decade, something interesting happened to all that public confidence. Amateur cryptographers and mathematicians twisted a series of equations known as Grover's algorithm to declare the death of AES 128 once a cryptographically relevant quantum computer (CRQC) came into being. They said a CRQC would halve the effective strength to just 2 64 , a small enough supply that—if true—would allow the same Bitcoin mining resources to brute force it in less than a second (the comparison is purely for illustration purposes; a CRQC almost certainly couldn't run like clusters of Bitcoin ASICs and more importantly couldn't parallelize the workload as the amateurs assume).

On Monday Valsorda finally channelled years' worth of frustration fueled by the widely held misunderstanding into a blog post titled Quantum Computers Are Not a Threat to 128-bit Symmetric Keys .

"There's a common misconception that quantum computers will 'halve' the security of symmetric keys, requiring 256-bit keys for 128 bits of security," he wrote. "That is not an accurate interpretation of the speedup offered by quantum algorithms, it's not reflected in any compliance mandate, and risks diverting energy and attention from actually necessary post-quantum transition work."

That's the easy part of the argument. The much harder part is the math and physics that explains it. At its highest level it comes down to a fundamental difference in the way a brute-force search works on classical computers versus the way it works using Grover's algorithm. Classical computers can perform multiple searches simultaneously, a capability that allows large tasks to be broken into smaller pieces to complete the overall job faster. Grover's algorithm, by contrast, requires a long-running serial computation, where each search is done one at a time.

"What makes Grover special is that as you parallelize it, its advantage over non-quantum algorithms gets smaller," Valsorda said in an interview. He continued:

Imagine it with small numbers, let's say there are 256 possible combinations to a lock, A normal attack would take 256 tries. You decide it's too long, so you get three friends and you each do 64 tries. "That's the classical parallelization. With Grover you could in theory do √256)=16 tries in a row, but if that's still too long and you again look for help from three friends. Each has to do √256/4)=8 tries.

So in total you do 8*4=32 tries, which is more than the 16 you would have done alone! Asking for help to parallelize the attack made the attack slower overall. Which is not the case for classical attacks.

Of course the numbers are way larger, but if we apply any reasonable constraint on the attacker (like having to finish a run in 10 years), the total work becomes so much more than 2 64 .

Also, 2 64 was never the right number, because that pretends you can do AES as a single operation on a single qubit. This is somewhat orthogonal. The combination of these two observations turn the actual cost into 2 104 give or take, which is well beyond the threshold for security.

Sophie Schmieg, a senior cryptography engineer at Google, explained it this way:

With a normal brute force search, if I interrupt it halfway through, I have roughly a 50% chance of it already being successful. So I can have two computers doing the search, each over 50% of the keys, and be done in half the time. But with Grover's, if I interrupt halfway through, the probability of getting the correct answer is only 25%. So instead of using two computers on half of the search space, I now need four.

So if you look at coreseconds, the classical algorithms cost what they cost, independent of how many computers you use in parallel. You can increase cores and your time goes down by the corresponding amount. But with the quantum algorithm, coreseconds are not independent of the parallelization strategy. Having more cores does not reduce the time by the same amount, to the point that if you went to the maximally parallel instance where each QC has to check only a single key, you need 2 128 QCs, and not 2 64 , i.e. you're no better than classical.

Valsorda's post provides a more mathematically detailed explanation, as does this video .

Valsorda listed a litany of sources that support the assertion that AES is perfectly acceptable in a post-quantum world, including from the National Institute of Standards and Technology ( here , here , and here ), the German Federal Office for Information Security ( here ), and Samuel Jaques, an assistant professor in the Department of Combinatorics and Optimization at the University of Waterloo ( here ).

The exception to these recommendations is spelled out in the NSA's version 2 of the Commercial National Security Algorithm Suite, which mandates AES 256. Valsorda said requirements for 256-level security were in place even in the predecessor algorithm suite, and weren't specific to quantum readiness. "As far as I can tell, its intention is to avoid the very same fragmentation introduced by security levels by picking one oversized primitive for all settings."

He further said 256-bit AES is also warranted in certain cases, such as to avoid the possibility of collisions, in which two keys randomly end up equal because of the birthday paradox .

So the next time you hear someone say quantum computing reduces the security of AES by a factor of two, kindly remind them that's a superstition that's distracting engineers from the real and considerable work in preparing the world for the advent of CRQC. It's a tall enough order updating asymmetric algorithms known to be vulnerable to Shor's algorithm , which breaks them in polynomial time, specifically cubic time , a massive advantage compared with the exponential time provided by today's classical computers.

"Conflating necessary and unnecessary changes will cause needless churn and take resources away from the urgent updates," Valsorda argued. "We're lucky we can leave the symmetric cryptography (sub-)systems untouched; we should take that blessing and focus on the work that actually needs doing, which is plenty."


Original Submission

posted by janrinok on Saturday April 25, @11:22AM   Printer-friendly

https://www.techdirt.com/2026/04/23/france-keeps-breaking-the-internet-to-stop-piracy-even-though-its-not-working/

Back in 2011 and 2012, one of the central technical objections that helped kill SOPA and PIPA was about DNS blocking. Engineers, internet architects, and cybersecurity experts all lined up to explain, in painstaking detail, why blocking at the DNS layer was a terrible idea. It would break the fundamental architecture of how the internet works. It would have massive collateral damage. It would undermine security protocols designed to protect users from exactly the kind of DNS manipulation that the bill proposed. And it wouldn't even stop piracy, because anyone who actually wanted to get around DNS blocking could do so easily.

Congress, to its rare credit, actually listened to the technical experts (and widespread protests) and shelved the legislation. But the entertainment industry never gave up on the idea. They just went jurisdiction-shopping. And France, which has never met a maximalist copyright enforcement scheme it didn't love, has been more than happy to oblige.

As recently reported by TorrentFreak, a Paris Court of Appeal validated DNS blocking orders requiring Google, Cloudflare, and Cisco to block access to pirate sites through their own DNS resolvers. This goes beyond traditional ISP resolvers, which France has been ordering blocked for years — this targets third-party resolvers — the ones that millions of people specifically choose to use because they offer better privacy, better security, and better reliability than their ISP's default DNS.

But, of course, in France (and to the usual crew of Hollywood lobbyists), "better privacy, security, and reliability" can only mean one thing: used for piracy.

The court rejected all five appeals, and in doing so, articulated a legal principle so sweeping that it has no natural stopping point.

In this case, French pay-TV provider Canal+ went to court under Article L. 333-10 of the "French Sport Code," which lets rightsholders request "all proportionate measures" against "any online entity in a position to help" block access to pirate sites. Canal+ argued that because users were simply switching to third-party DNS resolvers to circumvent ISP-level blocking, those resolvers should be conscripted into the blocking regime too.

Cloudflare and Cisco pushed back, arguing that their DNS resolvers serve a "neutral and passive function" — they translate domain names into IP addresses and that's it. They compared their role to a phone book. The court's response boiled down to: we don't care.

The DNS resolution service allows its users, via the translation of a domain name into an IP address, to access websites on which sports competitions are broadcast in violation of rights-holders' rights, and in particular to circumvent the blocking of those sites by ISPs.

The court found that the "neutral and passive" nature of DNS resolvers is "simply irrelevant to Article L. 333-10." The law isn't about liability at all — it only cares whether a service can help block access to pirate sites, which DNS resolvers clearly can. If you are technically capable of blocking access, you must.

Google, meanwhile, tried a different argument: that DNS blocking through third-party resolvers isn't effective because users can just switch to a VPN or yet another resolver. The court wasn't moved by that either:

Any filtering measure can be circumvented, and this possibility does not render the measures in question ineffective.

As long as DNS blocking stops some subset of users from reaching pirate sites, the court ruled, it's "proportionate." Under that line of thinking, any measure that inconveniences even a fraction of would-be pirates is legally justified, no matter how much collateral damage it causes for everyone else.

And if you think that principle has any limit, Canal+ has made it quite clear that they don't think it does:

Canal+ said in a statement that the rulings are "more than a victory," forming part of "a global approach that will be reinforced by the progressive deployment of complementary measures, including IP blocking."

Canal+ has already been getting courts to order VPN providers to block as well. So now we have ISP DNS blocking mandated, third-party DNS resolver blocking mandated, VPN blocking mandated — and, per the TorrentFreak article, direct automated IP address blocking is coming too. They will not stop until the entire internet is broken.


Original Submission

posted by janrinok on Saturday April 25, @06:38AM   Printer-friendly

Physicists witness pinpricks of darkness moving faster than the speed of light ‪—‬ without breaking the laws of relativity:

For the first time, researchers have detected empty voids moving faster than the speed of light — and they blazed past that cosmic speed limit without breaking the laws of relativity.

A recent study shows the voids' acceleration. Researchers used recent advances in ultrafast electron microscopy to measure voids in phonon-polariton waves zooming around inside a thin flake of boron nitride. Phonon-polaritons are quasiparticles formed from photons (quantized light) coupled with tiny vibrations, and they act like light and sound waves combined.

Waves are often visualized as a single squiggle, but in many applications, imagining them as a lake could give a better idea of what's going on. Lakes are full of waves and ripples that interfere with each other. If the waves interact when they're at their maximum height, they combine to create an even higher wave. But if they make contact when they're at their lowest points, they create deeper troughs than they would on their own.

Sometimes, waves cancel each other out, creating points where the waves' magnitude drops to zero. In a lake, this would make a temporary whirlpool (a vortex) that moves around that empty point, also called a singularity. These singularities are found throughout nature and mathematics and, since the 1970s, have been theorized to move faster than light speed in some instances, according to a recent statement from the Technion-Israel Institute of Technology.

Einstein's theory of special relativity states that the speed of light in a vacuum ‪—‬ 299,792,458 meters per second, or about 186,000 miles per second ‪—‬ is the fastest speed information, matter and energy can travel through space. So how do singularities move faster than light speed? Because singularities are empty points of nothingness, they contain no information, no matter and no energy. They are tiny voids, so they don't have to obey the cosmic speed limit.

These voids don't just exceed the speed of light ‪—‬ they blaze past it. When two singularities encounter each other, they can sometimes exponentially speed up toward each other until their velocities approach infinity just before they cancel each other out. However, the faster they go, the harder it is to observe them. The recent study, published March 25 in the journal Nature, shows researchers doing just that.

"Our discovery reveals universal laws of nature shared by all types of waves, from sound waves and fluid flows to complex systems such as superconductors ," Ido Kaminer , an electrical and computer engineering professor at the Technion-Israel Institute of Technology and a member of the research team, said in the statement.

The study's results apply to more than just tiny whirlpools; the null points act enough like particles that scientists can study them to better understand particle interactions. To do this, researchers need to know where the comparison breaks down. The new study shows the voids' need for speed is a point where the singularities stop acting like particles, since particles obey the cosmic speed limit that voids ignore.

In addition, the team's new techniques for observing very small, very fast things could light up some previously unexplored pockets across multiple scientific disciplines.

"We believe these innovative microscopy techniques will enable the study of hidden processes in physics, chemistry, and biology, revealing for the first time how nature behaves in its fastest and most elusive moments," Kaminer added.

Journal Reference:
Bucher, T., Gorlach, A., Niedermayr, A., et al. Superluminal correlations in ensembles of optical phase singularities, Nature 2026 651:8107 (DOI: 10.1038/s41586-026-10209-z)


Original Submission

posted by hubie on Saturday April 25, @01:56AM   Printer-friendly

https://distrowatch.com/dwres.php?resource=showheadline&story=20169

The latest Linux Mint monthly newsletter looks ahead to the next version of Mint and some key changes which will be happening in the project. One of the significant changes is a longer development cycle for new Mint versions.

"Linux Mint will adopt a longer development lifecycle. The next release is planned for Christmas 2026. Linux Mint will use the same installer as LMDE (i.e. live-installer). What hasn't been decided yet is the release strategy itself: the length of the cycle, whether minor releases are frozen (like the point releases in Mint 22.x) or backported/semi-rolling (as in LMDE), and whether we will introduce alpha releases."


Original Submission

posted by hubie on Friday April 24, @09:08PM   Printer-friendly

MIT scientists create a detailed map of exactly what happens in the brains of C. elegans worms:

Animal behavior reflects a complex interplay between an animal's brain and its sensory surroundings. Only rarely have scientists been able to discern how actions emerge from this interaction. A new open-access study in Nature Neuroscience by researchers in The Picower Institute for Learning and Memory at MIT offers one example by revealing how circuits of neurons within C. elegans nematode worms respond to odors and generate movement as they pursue of smells they like and evade ones they don't.

"Across the animal kingdom, there are just so many remarkable behaviors," says study senior author Steven Flavell, associate professor in the Picower Institute and MIT's Department of Brain and Cognitive Sciences and an investigator of the Howard Hughes Medical Institute. "With modern neuroscience tools, we are finally gaining the ability to map their mechanistic underpinnings."

By the end of the study, which former graduate student Talya Kramer PhD '25 led as her doctoral thesis research, the team was able to show exactly which neurons in the worm's brain did which of the jobs needed to sense where smells were coming from, plan turns toward or away from them, shift to reverse (like old-fashioned radio-controlled cars, C. elegans worms turn in reverse), execute the turns, and then go back to moving forward. Not only did the study reveal the sequence and each neuron's role in it, but it also demonstrated that worms are more skillful and intentional in these actions than perhaps they've received credit for. And finally, the study demonstrated that it's all coordinated by the neuromodulatory chemical tyramine.

[...] The surveillance enabled Kramer, Flavell, and their colleagues to observe that the worms weren't just ambling randomly until they happened to get where they'd want to be. Instead, the worms would execute turns with advantageous timing and at well-chosen angles. The worms seemed to know what they were doing as they navigated along the gradients of the odors.

Inside their heads, patterns of electrical activity among a cohort of 10 neurons (indicated by flashing green light tied to the flux of calcium ions in the cells), revealed the sequence of neural activation that enabled the worms to execute these sensible sensory-guided motions: forward, then into reverse, then into the turn, and then back to forward. Particular neurons guided each of these steps, including detecting the odors, planning the turn, switching into reverse, and then executing the turns.

A couple of neurons stood out as key gears in the sequence. A neuron called SAA proved pivotal for integrating odor detection with planning movement, as its activity predicted the direction of the eventual turn. Several neurons were flexible enough to show different activity patterns depending on factors such as where the odors were and whether the worm was moving forward or in reverse.

And if the neurons are indeed turning and shifting gears, then the neuromodulator tyramine (the worm analog of norepinephrine) was the signal essential to switch their gears. After the worms started moving in reverse, tyramine from the neuron RIM enabled other neurons in the sequence to change their activity appropriately to execute the turns. In several experiments the scientists knocked out RIM tyramine and saw that the navigation behaviors and the sequence of neural activity largely fell apart.

Journal Reference: Kramer, T.S., Wan, F.K., Pugliese, S.M. et al. Neural sequences underlying directed turning in Caenorhabditis elegans. Nat Neurosci (2026). https://doi.org/10.1038/s41593-026-02257-5


Original Submission

posted by hubie on Friday April 24, @04:22PM   Printer-friendly
from the might-want-to-pair-it-with-a-vibe-coded-liability-lawyer-LLM dept.

Schematik is a program that aims to help people vibe code for physical devices. Hopefully, it won't blow anything up:

Samuel Beek knew he had a problem when he blew every fuse in his house. The culprit was an electric door opener he had built himself, guided by instructions for wiring and piecing together a device drummed up by ChatGPT . Turns out, the chatbot wasn't so great at distinguishing between wet and dry connections, so the device he had built sent out a surge of misallocated power that zapped everything else. Oops.

Beek, based in Amsterdam , admits he is not a hardware guy. But he had that itch and now really just wanted to make something that wouldn't explode.

"That's the difference: Your fuses blow out, or you have a solid product," Beek says. "That was kind of a learning experience for me to be more careful, but also to build AI that deeply understands what it's talking about."

He switched his requests to Anthropic's Claude, then rejiggered that into an assistant program he calls Schematik and has described, over and over again, as " Cursor for Hardware."

The idea of Schematik is essentially vibe coding for physical devices. Tell the program what you want to make, and it will suggest just about everything you need to build it out in the real world and share links to where you can buy the individual wires and pieces. Then, it will serve as a guide for putting it all together. Beek plans to make money off it eventually and is working on getting investors. (It just got $4.6 million from venture capitalist firm Lightspeed Venture Partners.) But you can go use it to build something right now.

When Beek posted on X about the idea in February, it got lots of traction. Other tinkerers gave it a shot, describing what they wanted to make and then building it out. Marc Vermeeren , who leads branding at N8N, a European AI company, says he has made several devices, from an MP3 player to a Tamagotchi-style bot called Clawy that helped him manage Claude coding sessions. (Other people have created their own takes on the design, like a Clawy that looks like Paulie Walnuts from The Sopranos .)


Original Submission

posted by hubie on Friday April 24, @11:32AM   Printer-friendly

Prego's Connection Keeper is a screen-free voice recorder designed to capture and preserve dinner table conversation:

As if there weren't already enough devices listening in on everything being said in your home, Prego, the pasta and pizza sauce brand, is releasing a device designed to record everything said around the dinner table for posterity. The Connection Keeper, which looks like an oversized pasta jar lid, was created in collaboration with StoryCorps, the nonprofit organization focused on preserving the stories of Americans in a collection housed at the Library of Congress' American Folklife Center. There's no AI, Wi-Fi, or Bluetooth, but you can optionally upload recordings to StoryCorps' website to make them easier to share with family.

Prego says the goal of the device is to encourage families to make memories through conversation during dinner instead of staring at their phones — but only for a small number of families. The company is only planning to make less than 100 of them. The Connection Keeper will be available for purchase online starting on April 27th for $20 as part of a bundle that includes the device, a jar of Prego sauce, spaghetti noodles, and a deck of cards featuring conversation prompts and ideas.

Using the device is as easy as plopping the Connection Keeper down in the middle of everyone at the table and pressing one button to start recording. Using a pair of microphones, it captures CD-quality audio to a 16GB microSD card for up to eight hours when fully charged.

When dinner's over, the recordings can be transferred to a computer over USB-C and then uploaded to a dedicated microsite created by StoryCorps where they're preserved and accessible only by the uploader, unless they choose to share them with other StoryCorps users or the general public. You even have the option to archive them within the Library of Congress, which makes them public automatically, so hopefully your family talks about more than just stealing brainrots.

The recordings can be accessed on a smartphone through the StoryCorps app, but Prego intentionally left phones out of the rest of the process to discourage their use at the table. It's also why the Connection Keeper lacks a screen. The goal was to minimize interactions with the device so family members instead focused on talking with each other.


Original Submission

posted by hubie on Friday April 24, @06:51AM   Printer-friendly

Dud contracts, proprietary designs, and zero-experience supplier make for quite the mess:

The NASA Office of Inspector General, the aerospace agency’s auditor, fears that work on next-generation spacesuits won’t finish in time to use them for the planned Artemis III Moon landing mission in 2028.

In a report [PDF] published on Monday, the Inspector General points out that NASA kicked off its quest for next-gen spacesuits with 2022’s Exploration Extravehicular Activity Services (xEVAS) program, which called for private suppliers to develop two suits: one to handle microgravity at the International Space Station (ISS) and another to wear on the moon.

NASA allocated $3.1 billion to the contracts and selected Axiom Space and Collins Aerospace to work on the project. The latter dropped out in 2024 after deciding it couldn’t hit the required deadlines.

The report says NASA’s delivery dates “were overly optimistic and ultimately proved unachievable” and warns that past experience of spacesuit development suggests Axiom Space won’t have even demo suits ready before 2031.

That’s bad because NASA’s plans call for a moon landing in 2028, while the ISS will end its mission in 2030.

The Office of Inspector General blames the xEVAS contracts for the mess.

“NASA’s choice to use a firm-fixed-price, service-based acquisition strategy for xEVAS aligns with the Agency’s strategic decision to shift the risk of cost overruns to the contractor, as well as help foster a commercial space economy,” the report notes. “However, in this case, the firm-fixed-price contract approach conflicted with the developmental nature of next-generation spacesuits, which carry higher levels of technical, financial, and schedule risk.”

[...] NASA might have a way out of this because it can appoint new suppliers under xEVAS, and three companies – SpaceX, Genesis Engineering Solutions, and ILC Dover – are already working on suitable spacesuits.

But if Axiom Space doesn’t succeed, the report warns NASA may need to revert to its current spacesuits which are much less capable than those planned for use in future, and therefore “significantly adjust its lunar plans.”

Those plans currently call for 2027’s Artemis III to test docking in space, and for 2028’s Artemis IV mission to land astronauts on the Moon.

Work on the vehicle that will make that landing is under way, with SpaceX and Blue Origin competing to win the gig. There’s no guarantee either company will be ready for 2028. And as another recent Office of Inspector General report found, both designs have potential flaws.


Original Submission

posted by hubie on Friday April 24, @02:05AM   Printer-friendly

Good news for those working with Windows, bad news for Paragon Software:

The feature list for Linux kernel 7.1 is taking shape, and a standout addition has already landed: a new read-write NTFS driver.

Now that kernel 7.0 is out, the all-seeing Eye of Torvalds has shifted its gaze to the future kernel 7.1, which is likely to appear in a couple of months. One standout feature has already been merged: a new in-kernel read-write driver for Windows' default disk format, NTFS. Linus referred to it as the ntfs resurrection from Namjae Jeon. Some of the more excitable Linux blogs are getting breathless about this – but in our humble opinion, they're missing the real message.

This will not represent a massive shift in performance or anything like that. The existing in-kernel NTFS support is quite quick already. The real lesson to take from this is about clean, maintainable, thoroughly commented code, which means that one developer can take it over from another even decades later.

The Reg FOSS desk described the driver in October 2025, and we recapped its history back then. It's from Korean developer Namjae Jeon, formerly of Samsung but now working with Samba. He's on his way to being one of the Linux filesystem gurus: as we reported in 2022, back then he contributed the code to allow Linux to fix corrupted exFAT volumes, which we are sure by now has saved the data of many users of large flash storage media.

This is not a huge new Linux feature. As this archived copy of the Linux-NTFS Project web page shows, Linux got the ability to read NTFS volumes with kernel 2.1.74 in 1997. Just over a decade later, that was joined by the FUSE NTFS-3G driver, which is sponsored by Tuxera. Because it runs as a user-mode program, not inside the kernel, NTFS-3G isn't as fast and is a little more limited: you can't boot from it, for instance.

That changed in 2021, when Paragon Software donated a new read-write GPL NTFS driver to the kernel. After considerable effort and discussion, that made it into kernel 5.15 shortly before this vulture joined The Register team. Donating a large and complex driver to the Linux kernel isn't a one-off project, though: it needs to be constantly maintained, and within some six months, this started to become a problem.

Around that time, Namjae started work on modernizing the original 1990s read-only NTFS driver, adding write support as well as revising it to use modern kernel filesystem handling features such as large folios.

Now, it's in: the original NTFS driver has been replaced. When the next minor release of the kernel appears, it will be optional, and can be enabled with a Kconfig switch called NTFS_FS. For now, Paragon's NTFS3 driver will stay in-tree, but it looks likely that its days are now numbered.

The new driver should be slightly faster, and it already passes more compliance tests. The pull request says:

The new ntfs driver passes 326 xfstests, compared to 273 for ntfs3. All tests passed by ntfs3 are a complete subset of the tests passed by this implementation. Added support for fallocate, idmapped mounts, permissions, and more.

It took many months of work for Paragon to get its code accepted back when, as The Register documented at the time: after the original 27,000-line submission, Paragon refactored it into manageable chunks over four releases, which the following year led to its acceptance.

It could be that five years later, all that effort will be lost in time, like tears in rain.


Original Submission

posted by hubie on Thursday April 23, @09:21PM   Printer-friendly

It's an important step towards managing large and complex genetic data:

In time for World Quantum Day, teams from the Wellcome Sanger Institute and the universities of Oxford, Cambridge, and Melbourne encoded the full Hepatitis D virus genome into quantum hardware.

The genome was loaded onto an IBM quantum computer using its 156-qubit Heron processor.

Successfully encoding the sequence required compressing the genetic information into quantum states that could fit within available qubit limits.

Traditional computers have struggled to keep pace with the surge of genomic data, creating processing bottlenecks that limit how quickly scientists can analyze variation across populations. The move toward pangenomes, which combine sequences from many individuals, adds additional complexity.

Instead of relying on a single reference sequence, pangenomes branch into multiple paths representing genetic diversity. Finding useful patterns inside those branching paths quickly becomes computationally demanding, especially as datasets grow.

“Our goal has always been to push the boundaries of what’s possible in genomics,” said Dr Sergii Strelchuk of the University of Oxford. “When we work with pangenomes, the information is presented in a form of a tangled maze, but we are building quantum algorithms to help find the best path through this maze when regular tools, such as classic computers, just get hopelessly stuck.”

Quantum computing offers a possible path forward by representing many possible outcomes at once inside qubit states. That capability could allow certain genomic calculations to run far faster than classical approaches.

Researchers involved in the project are targeting a future benchmark of processing full human pangenomes up to 100 times faster than traditional tools. The Hepatitis D test does not deliver that speed itself but demonstrates a pathway toward achieving quantum advantage at larger scales.

Some scientists remain cautious about how quickly that transition could happen. As Science.org reports, until quantum systems handle larger genomes and perform full analyses, it's unknown whether they will outperform well-established classical methods.

Even with those limits, loading a complete genome into quantum hardware marks an impressive technical milestone. The next phase focuses on scaling the approach and turning experimental workflows into tools other researchers can use.


Original Submission

posted by hubie on Thursday April 23, @04:34PM   Printer-friendly
from the market-is-a-fickle-beast dept.

Registrations of battery electric vehicles (BEVs) in Europe's key automotive markets surged by 51% in March as the Iran war pushed gasoline prices to multi-year highs, data published by research firm New Automotive and trade association E-Mobility Europe showed on Monday:

More than 224,000 new electric passenger cars were registered in March alone across 15 key EU + EFTA markets, the analysis found. These sales accounted for as much as 22% of all new passenger car sales across the key European markets.

In another sign that expensive gasoline is pushing drivers to EVs, European Union member states registered more than 500,000 new electric cars in the first quarter of 2026, a surge of 33.5% compared to the same period last year, the data showed.

New BEV registrations accelerated across every major EU market in the first quarter of 2026. Europe's five largest countries — Germany, France, Spain, Italy, and Poland — all recorded BEV growth above 40% year-to-date.

[...] Energy security was the catalyst for change in driver choice in recent weeks, analysts at New Automotive and E-Mobility Europe say.

Previously:


Original Submission

posted by hubie on Thursday April 23, @11:50AM   Printer-friendly

A postcard spy:

HNLMS Evertsen, a Dutch air-defense frigate part of the NATO carrier strike group centered on the French carrier Charles de Gaulle, has inadvertently revealed its position after receiving a postcard containing a hidden Bluetooth tracker. According to The Register, the Dutch Ministry of Defense posted instructions online to make it easier for family and friends to communicate with personnel aboard a navy ship, but didn't fully consider the ramifications for operational security (op-sec).

Bluetooth trackers like the Apple AirTag cost $29 a piece, but there are cheaper, generic versions available on Amazon that cost $10 for two trackers. By allowing a potential adversary to track the ship in real-time, it could put the vessel and the entire strike group at risk, as that information can be used for other operations against the fleet. The fact that it was mailed in meant that spies do not even need to go near the ship to place a tracker on the $585 million Navy ship.

Dutch journalist Just Vervaart, working for regional media network Omroep Gelderland, followed the directions posted on the Dutch government website and mailed a postcard with a hidden tracker inside. Because of this, they were able to track the ship for about a day, watching it sail from Heraklion, Crete, before it turned towards Cyprus. While it only showed the location of that one vessel, knowing that it was part of a carrier strike group sailing in the Mediterranean could potentially put the entire fleet at risk.

Navy officials reported that the tracker was discovered within 24 hours of the ship's arrival, during mail sorting, and was eventually disabled. Because of this incident, the Dutch authorities now ban electronic greeting cards, which, unlike packages, weren't x-rayed before being brought on the ship. This isn't the first time that operational security aboard naval ships has been compromised through carelessness. Just last month, a French officer aboard the Charles de Gaulle posted their running time and route on Strava. This revealed the carrier's location in the Mediterranean, as open-source intelligence could potentially identify the said officer and their position within the French Navy.

A more egregious incident was reported in 2024, when the USS Manchester, a US Navy littoral combat ship, was found to have an unauthorized Starlink terminal that sailors used to access the internet while at sea. The Wi-Fi network, called "STINKY," was eventually discovered by officers after six months of being installed on the ship's O-5 level weatherdeck, where it cannot be easily seen and could be mistaken for part of the ship's official equipment.

New technologies have always been a problem for many militaries and security forces, as seemingly innocent features like checking in on social media and posting on apps reveal personnel's locations, schedules, and habits. While this might not be an issue for most civilians, these data give intelligence agencies a treasure trove of open-source information they can use to infer or confirm data.


Original Submission

posted by jelizondo on Thursday April 23, @07:07AM   Printer-friendly
from the Math dept.

Here's one that's been making the rounds:

https://arxiv.org/abs/2603.21852

"A single two-input gate suffices for all of Boolean logic in digital hardware. No comparable primitive has been known for continuous mathematics: computing elementary functions such as sin, cos, sqrt, and log has always required multiple distinct operations. Here I show that a single binary operator, eml(x,y)=exp(x)-ln(y), together with the constant 1, generates the standard repertoire of a scientific calculator. This includes constants such as e, pi, and i; arithmetic operations including addition, subtraction, multiplication, division, and exponentiation as well as the usual transcendental and algebraic functions."

Discussion ideas:

1) Yes everyone knows there's not one, but two universal logic gates, anything made of NAND gates can be made of NOR gates and vice versa. So there's possibly at least one other "universal computation" for continuous math.

2) Who's playing with the idea of computer/microcontroller FPUs that use nothing but this operation, super optimized? I think this is funny to think about even if impractical.

3) Ditto analog computation. Analog opamp subtraction ain't rocket surgery, and old fashioned bipolar transistors can output logs and exponentials or you can use single chip devices to calculate logs and exponentials. I'm trying to wrap my head around using the AD633 universal multiplier... This could get expensive.

4) You can do this on a slide rule for educational purposes. You need a rule with LL scales or at least L and C/D. I have to think about this some more.


Original Submission