Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
IFL Science is reporting on a breakthrough in quantum superposition:
States in quantum superposition are notoriously fragile, but researchers in China have reported creating such a state that lasted for a whopping 23 minutes and 20 seconds. While this record-breaking result is exciting in itself, the team believes that it could open new ways to high-precision measurements and even information processing for quantum computers – possibly even allowing scientists to probe the limits of physical theories.
A yet-to-be peer-reviewed study by scientists at the University of Science and Technology of China involved cooling 10,000 ytterbium atoms to just a few thousandths of a degree above absolute zero and trapping them using light. Each atom was precisely controlled and placed into a superposition of two distinct spin states. This is known as a "quantum cat" state.
In the famous Schrödinger's cat thought experiment, we see a cat closed in a box with a poison activated by a random quantum process. Without opening the box, we cannot ascertain the state of the cat, so it is both alive and dead, two contradictory states in the non-quantum reality we experience. In the quantum world, quantum cat states are superpositions where a quantum state can exist in several ways at once, although it's impossible to tell which one it really is, so it's effectively all of them at once.
In the recent experiment, it is the length of this quantum cat state that is astounding. In nature, the superposition will collapse into one or the other in a fraction of a second, but here it persisted for 1,400 seconds. The team thinks that with a better vacuum system, it can be made to last even longer.
"It's a big deal because they're making this beautiful cat state in an atomic system and it's stable," Barry Sanders, from the University of Calgary, who was not involved in the study, told New Scientist. "A probe gets jiggled and pushed and nudged and prodded, and then by seeing what happens, you learn about the things that interact with it."
The research shows that there are lots of different elements that can be used for these devices. It doesn't have to be ytterbium, although they did show that this particular setup with the ytterbium atoms is extremely sensitive to measuring magnetic fields, with exciting applications.
This is not the only recent record-breaking event when it comes to quantum cat experiments. Last year, researchers successfully placed the heaviest macroscopic object in superposition. It was a crystal weighing just 16 micrograms, but it shows that the field is truly breaking new ground into what is possible.
A preprint paper describing the experiment and the result is available on the ArXiv.
Asian hornet's unique buzz may hold secret to containing invasive species:
Asian hornets buzz at a unique frequency that could be the key to controlling their spread, scientists have found, as the invasive species experiences a record year in the UK.
Researchers have said this is "great news", as the hornet nests can now be more quickly found and distinguished from those of other species, meaning their threat to bees and other pollinators could be contained.
Vespa velutina dismember and eat bees, and have thrived in France, where they have caused concern because of the number of insects killed. They sit outside honeybee hives and capture bees as they enter and exit, and chop up the smaller insects and feed their thoraxes to their young. Just one Asian hornet can hunt down and eat 30 to 50 honeybees in a day.
Their numbers have soared in recent years in the UK. There were 57 sightings in 2023, more than double the previous seven years combined, and 2024 broke that record with 71 confirmed sightings.
This year, that number has already been surpassed; the National Bee Unit is reporting 73 Asian hornet sightings and 28 nests in 2025 to date – more than double the 28 recorded sightings in the same period last year. The large wasps overwintered in the UK for the first time in 2023-24, which means they could be in the country for good.
Scientists, beekeepers and the government have battled hard to keep hornet numbers down, running a national hornet-spotting campaign so their nests can be identified and destroyed. But despite this, their numbers continue to increase, putting native pollinators at risk.
Now, scientists at the University of Southampton have made a breakthrough, establishing for the first time the frequency and volume of the sound from their nests. This means detection and removal of the creatures could become faster and easier.
They have established the fundamental frequency of Asian hornet nests to be 125 hertz and the loudness in the region of 51 decibels, which is comparable to a normal conversation.
The new research means the sound can be used to distinguish them from the nests and hives of other wasps and bees. This will be particularly useful in September and October, when the nests peak.
Acoustic engineering graduate Sophie Gray, who undertook the research, said: "We observed and measured two Asian hornet nests and a European hornet nest in Jersey before they were destroyed. We found that the fundamental frequency is 125 hertz and that the nest can be detected from about 20 metres away with a directional microphone.
"We also recorded European hornets and honeybees to determine if we can differentiate the frequency. The fundamental frequency of the European hornet is about 110 hertz and honeybees about 210 hertz. It was great news to discover that the frequency is unique for each species, so they are distinguishable."
The species first came to Europe in 2004, when the hornets were spotted in France, and it is thought they were accidentally transported in cargo from Asia. They have since spread rapidly across western Europe.
Visionary tech pioneer and philanthropist Dame Stephanie Shirley has died at the age of 91.
The boundary-breaking entrepreneur arrived in London at the age of five, just weeks before the outbreak of World War Two, and went on to become a computer industry and women's rights pioneer in the 1950s and 1960s.
She founded the software company Freelance Programmers in 1962, which shook up the tech industry by almost exclusively hiring women, and in later life donated almost £70m to help those with autism and to IT projects.
She was very smart and truly formidable, even adopting the name "Steve" to help her in a male-dominated tech world.
She died on 9 August, her family said in an Instagram post on Monday.
CalyxOS is an Android distribution that claims a focus on privacy and security. So when an announcement from the project begins by saying ""we want to assure you that we have no reason to believe the security of CalyxOS and its signing keys have been compromised"", chances are that good things are not happening.
In this case, it would appear that Nicholas Merrill, one of the founders of the project, has left for unclear reasons, and CalyxOS is responding by pausing all releases — and security updates — while its release process, signing keys, and security protocols are reworked. The result will be no updates for ""four to six months"". The project is recommending that its users ""should uninstall the OS"" and wait for an all-clear signal. CalyxOS may have its work cut out for it when the time comes to try to convince those users to come back.
As you know, we announced a recent leadership transition. When senior personnel have access to signing keys and leave a team, it is security best practice to update signing keys and conduct audits. So in accordance with that, we are using this transition period to update our security protocols, including updating the signing keys and taking other steps to further protect our users.
In the past, security audits have been conducted for parts of CalyxOS, such as the Seedvault project, but not for the entire project. As more and more people across the globe started using this tool, we intend to conduct a broader security audit and publish the reports for the public to review.
As mentioned in our community letter below, we estimate that this audit and the implementation of new security protocols and signing keys will take four to six months, but we will endeavor to complete this process as soon as possible. However, for the time being, current CalyxOS users will not be able to receive further security software updates until our new security protocols are in place.
Without security updates, we can only be honest that this does not guarantee the level of security we strive for, especially when global threats to privacy and human rights are at a critical moment. That is why in the meantime we have posted the recommendation that people who are running CalyxOS should uninstall the OS and follow our community channels for updates, including when the latest version of CalyxOS becomes available again.
[...] We also understand that many community members have expressed interest in having an installation option/images for CalyxOS available again. Due to the overwhelming feedback from our community, we've decided to make the images publicly available once more. Please be aware that this decision is not a recommendation to migrate to CalyxOS now.
[ED. note:] CalyxOS is an Android-based operating system for select smartphones, foldables and tablets with mostly free and open-source software. It is produced by the Calyx Institute as part of its mission to "defend online privacy, security and accessibility."
Americans, Be Warned: Lessons From Reddit's Chaotic UK Age Verification Rollout
Age verification has officially arrived in the UK thanks to the Online Safety Act (OSA), a UK law requiring online platforms to check that all UK-based users are at least eighteen years old before allowing them to access broad categories of "harmful" content that go far beyond graphic sexual content. EFF has extensively criticized the OSA for eroding privacy, chilling speech, and undermining the safety of the children it aims to protect. Now that it's gone into effect, these countless problems have begun to reveal themselves, and the absurd, disastrous outcome illustrates why we must work to avoid this age-verified future at all costs:
Perhaps you've seen the memes as large platforms like Spotify and YouTube attempt to comply with the OSA, while smaller sites—like forums focused on parenting, green living, and gaming on Linux—either shut down or cease some operations rather than face massive fines for not following the law's vague, expensive, and complicated rules and risk assessments.
But even Reddit, a site that prizes anonymity and has regularly demonstrated its commitment to digital rights, was doomed to fail in its attempt to comply with the OSA. Though Reddit is not alone in bowing to the UK mandates, it provides a perfect case study and a particularly instructive glimpse of what the age-verified future would look like if we don't take steps to stop it.
[..] The OSA defines "harmful" in multiple ways that go far beyond pornography, so the obstacles the UK users are experiencing are exactly what the law intended. Like other online age restrictions, the OSA obstructs way more than kids' access to clearly adult sites. When fines are at stake, platforms will always default to overcensoring. So every user in the country is now faced with a choice: submit their most sensitive data for privacy-invasive analysis, or stay off of Reddit entirely. Which would you choose?
[...] Even when the workarounds inevitably cease to function and the age-checking procedures calcify, age verification measures still will not achieve their singular goal of protecting kids from so-called "harmful" online content. Teenagers will, uh, find a way to access the content they want. Instead of going to a vetted site like Pornhub for explicit material, curious young people (and anyone else who does not or cannot submit to age checks) will be pushed to the sketchier corners of the internet—where there is less moderation, more safety risk, and no regulation to prevent things like CSAM or non-consensual sexual content. In effect, the OSA and other age verification mandates like it will increase the risk of harm, not reduce it.
TFA goes on to highlight the details on what's considered "harmful content" (r/rickroll - really?), how this leads to overcensoring, the backlash that ensued, how the age-verification tech doesn't really work, and a warning for what may be coming.
Previously: Online Safety Act Storm Cloud Approaching Rapidly
Related:
James Lovell, one of the original Apollo astronauts in the infant NASA under President Eisenhower, died yesterday (August 9) at age 97. And here I thought outer space was supposed to be bad for you!
He flew on Gemini 7 and 12. Lovell, along with Commander Frank Borman and Lunar Module Pilot William Anders, were the first people to ever orbit the moon. Commander Lovell was to return to the moon, slated to walk on it this time on Apollo 13, but an oxygen tank exploded. They were incredibly lucky to return alive. It was chronicled in Lovell's book Lost Moon (with co-writer Jeffery Kruger) and the "based on a true story" movie Apollo 13.
The mishap happened a couple weeks after my eighteenth birthday. The news of the accident and their miraculous news outdid all other news, even the Vietnam war and the protests against it.
A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware.
The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker.
"When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a specially crafted archive, instead of user specified path," reads the WinRAR 7.13 changelog.
[Editor's Comment: It affects Windows only--JR]
"Unix versions of RAR, UnRAR, portable UnRAR source code and UnRAR library, also as RAR for Android, are not affected."
[...] RomCom (also tracked as Storm-0978, Tropical Scorpius, or UNC2596) is a Russian hacking group linked to ransomware and data-theft extortion attacks, along with campaigns focused on stealing credentials.
- Links in article:
https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5
https://www.win-rar.com/
https://www.bleepingcomputer.com/news/security/firefox-and-windows-zero-days-exploited-by-russian-romcom-hackers/
https://www.bleepingcomputer.com/news/security/new-romcom-malware-variant-snipbot-spotted-in-data-theft-attacks/
https://www.bleepingcomputer.com/news/security/hacker-uses-new-rat-malware-in-cuba-ransomware-attacks/
https://www.bleepingcomputer.com/news/security/industrial-spy-data-extortion-market-gets-into-the-ransomware-game/
The BBC is running a very interesting story about Perrier and other "natural" waters not being quite what they claim to be. While some might see it as only a technicality on what "natural" means, some aspects of it point to larger, and more frightening problems:
France's multi-billion euro mineral water companies are under the spotlight because of climate change and growing concerns about the industry's environmental impact.
At issue is whether some world-famous brands, notably the iconic Perrier label, can even continue calling themselves "natural mineral water".
A decision in the Perrier case is due in the coming months. It follows revelations in the French media about illicit filtration systems that have been widely used in the industry, apparently because of worries about water contamination, after years of drought linked to climate change.
[...] The issue was not one of public health. The treated water was by definition safe to drink.
The problem was that under EU law, "natural mineral water" – which sells at a huge premium over tap water – is supposed to be unaltered between the underground source and the bottle. That is the whole point of it.
[...] Complicating matters for Perrier and its parent company Nestlé – as well as President Emmanuel Macron's government – is the charge that executives and ministers conspired to keep the affair quiet, covered up reports of contamination, and re-wrote the rules so that Perrier could continue using micro-filtration.
[...] The analysis made by Haziza and other hydrologists is that there is now a clear link between deeper and surface aquifers. Contaminants (farm chemicals or human waste) that drain off the land in the increasingly frequent flash floods, can now make their way into the lower aquifers.
At the same time, the effects of long-term drought and over-pumping mean these lower aquifers contain less volume, so any contamination will be more concentrated, the experts say.
After seeking advice on health topics from ChatGPT, a 60-year-old man who had a "history of studying nutrition in college" decided to try a health experiment: He would eliminate all chlorine from his diet, which for him meant eliminating even table salt (sodium chloride). His ChatGPT conversations led him to believe that he could replace his sodium chloride with sodium bromide, which he obtained over the Internet.
Three months later, the man showed up at his local emergency room. [...] His distress, coupled with the odd behavior, led the doctors to run a broad set of lab tests, revealing multiple micronutrient deficiencies, especially in key vitamins. But the bigger problem was that the man appeared to be suffering from a serious case of "bromism." That is, an excess amount of the element bromine had built up in his body.
[...] Bromide sedatives vanished from the US market by 1989, after the Food and Drug Administration banned them, and "bromism" as a syndrome is today unfamiliar to many Americans. (Though you can still get it by drinking, as one poor guy did, two to four liters of cola daily [!], if that cola contains "brominated vegetable oil." Fortunately, the FDA removed brominated vegetable oil from US food products in 2024.)
[...] In this case, over the man's first day at the hospital, he grew worse and showed "increasing paranoia and auditory and visual hallucinations." He then attempted to escape the facility.
[...] In the end, the man suffered from a terrifying psychosis and was kept in the hospital for three full weeks over an entirely preventable condition.
[...] The doctors who wrote up this case study for Annals of Internal Medicine: Clinical Cases note that they never got access to the man's actual ChatGPT logs. He likely used ChatGPT 3.5 or 4.0, they say, but it's not clear that the man was actually told by the chatbot to do what he did. Bromide salts can be substituted for table salt—just not in the human body. They are used in various cleaning products and pool treatments, however.
[...] The current free model of ChatGPT appears to be better at answering this sort of query. When I asked it how to replace chloride in my diet, it first asked to "clarify your goal," giving me three choices:
- Reduce salt (sodium chloride) in your diet or home use?
- Avoid toxic/reactive chlorine compounds like bleach or pool chlorine?
- Replace chlorine-based cleaning or disinfecting agents?
ChatGPT did list bromide as an alternative, but only under the third option (cleaning or disinfecting), noting that bromide treatments are "often used in hot tubs."
IFL Science has a funny report about a robotic crab confronted by real crabs:
Wavy Dave the robot crustacean has been showing scientists how male fiddler crabs respond when they see a fellow crab waving. Famous for their enormous claws, the team made Wavy Dave blend in by giving him a huge claw of his own, only for it to get ripped off by a male crab.
Before he was struck down, Wavy Dave's experiments revealed that male crabs would wave for longer when the robot crab was waving. They didn't pick up their speed, however. It could be that the robot's waving was a signal to them that a female might be around, but without actually laying eyes on her, they didn't put in their all.
"Our findings reveal the subtle ways in which these crabs adjust their behaviour to compete in a dynamic environment, investing more in signalling when it is likely to be most profitable," said study author Dr Joe Wilde in a release sent to IFLScience. "We know many animals adjust their sexual displays if rivals are nearby, but less is known about how they react to the actual displays themselves."
Fiddler crabs live in burrows and when it's time to make baby fiddler crabs, the males will stand outside their burrows and try to woo a female by waving their impressive claws. Females are most drawn to the males that wave at speed and have particularly big claws, so competition is stiff. So, how do the crabs respond to that competition?
As for what females made of Wavy Dave, Wilde reports they seemed to clock something was "a bit odd" about the robot crab. There were also males who didn't tolerate his presence, trying to fight him, and one male even succeeded in pulling off his claw. After that, the trial had to be abandoned so they could reboot Wavy Dave.
"When the crab attacked Wavy Dave, I felt 75% excited (because the attack showed us that the crabs were interacting with the robot as they would each other, which was the dream), and 25% heartbroken (the bond forged between a researcher and his Bluetooth robotic crab is a strong one)," Wilde told IFLScience.
The biomimetic robot was a pipedream of Wilde's during lockdown when 3D scans of fiddler crabs' impressive claws became freely available. He had printed his own claw and taught himself enough robotics to make Wavy Dave, eventually developing an app that would enable him to control the waving via Bluetooth.
Thanks to funding from the Natural Environment Research Council GW4+ Doctoral Training Partnership, Wavy Dave became a reality, and has provided intriguing insights into the flexibility of fiddler crabs' sexual displays when they see a rival is nearby, however shifty looking he may be.
"For me, the most fascinating takeaway is the subtle complexity of the behavioural changes we see in response to the robotic rival," Wilde told IFLScience. "It highlights the types of behavioural adjustments wild animals perform in order to stay competitive in these kinds of social contexts.
Japanese Scientists Develop Artificial Blood:
A critical component of healthcare, blood transfusions play a vital role in saving lives around the globe every day. Maintaining an adequate blood supply, though, is no easy task, particularly in low- and middle-income countries (LMIC). The demand for O–negative blood — the universal donor type — often exceeds supply and donations have a limited shelf life. Looking to address the issue are a group of Japanese scientists led by Hiromi Sakai at Nara Medical University. They've developed a new type of artificial blood that can be used in patients of any blood type.
The artificial blood is created by extracting hemoglobin — a protein containing iron that facilitates the transportation of oxygen in red blood cells — from expired donor blood. It is then encased in a protective shell to create stable, virus-free artificial red blood cells. As these artificial cells have no blood type, there is no need for compatibility testing. The synthetic blood can reportedly be stored for up to two years at room temperature and five years under refrigeration. That is a significant improvement over donated red blood cells, which can only be stored under refrigeration for a maximum of 42 days.
Small-scale studies began in 2022. Three groups of four healthy male volunteers aged 20 to 50 received a single intravenous injection of hemoglobin vesicles — artificial oxygen carriers that mimic the structure of red blood cells — in increasing amounts, up to 100 milliliters. While some participants experienced mild side effects, there were no significant changes in vital signs, including blood pressure. Building on that success, Sakai announced that his team was accelerating the process last July. In March, it started administering between 100 and 400 milliliters of the artificial blood cell solution to volunteers.
If no side effects are confirmed, the trial will shift to examining the treatment's efficacy and safety. It aims to put the artificial red blood cells into practical use by around 2030. While these studies are taking place, Professor Teruyuki Komatsu of Chuo University's Faculty of Science and Engineering is also working on the development of artificial oxygen carriers, using albumin-encased hemoglobin to stabilize blood pressure and treat conditions like hemorrhage and stroke. So far, animal studies have shown promising results. As a result, researchers are now eager to move to human trials.
https://www.msn.com/en-us/news/world/ar-AA1JUyYS
https://archive.ph/6Y1XA
A zoo in northern Denmark is asking pet owners to donate their unwanted guinea pigs, rabbits, chickens and even small horses – not to put them on display but to feed them to the zoo's predators.
The Aalborg Zoo wrote in a Facebook post that it is trying to "imitate the natural food chain of the animals".
"Chickens, rabbits and guinea pigs form an important part of the diet of our predators," it wrote in the post alongside an image of openmouthed, sharp-toothed lynx.
"That way, nothing goes to waste — and we ensure natural behavior, nutrition and well-being of our predators," the zoo added.
On its website, the zoo said the donated animals will be "gently euthanized" by trained staff before being served up as food. The zoo is home to carnivorous predators such as the Asiatic lion, European lynx and Sumatran tiger.
The zoo's public request has drawn lively debate online with some protesting the idea of turning pets into prey, and others praising the zoo's efforts to maintain natural feeding behaviors.
Deputy director of Aalborg Zoo, Pia Nielsen, said in an emailed statement the initiative has been in place for years and is common practice in Denmark.
"For many years at Aalborg Zoo, we have fed our carnivores with smaller livestock. When keeping carnivores, it is necessary to provide them with meat, preferably with fur, bones, etc to give them as natural a diet as possible," Nielsen said.
"Therefore, it makes sense to allow animals that need to be euthanized for various reasons to be of use in this way."
"In Denmark, this practice is common, and many of our guests and partners appreciate the opportunity to contribute. The livestock we receive as donations are chickens, rabbits, guinea pigs, and horses."
Carnivores fill a central niche in ecosystems, Nielsen added, saying they play a crucial role in the balance of nature.
It's not the first time that Denmark's zoos have come under scrutiny for the way they feed their animals and control populations. In 2014, the Copenhagen Zoo in the Danish capital euthanized a healthy young giraffe named Marius to avoid inbreeding, despite a petition trying to stop the move. Its carcass was used partly for research and partly to feed carnivores at the zoo – lions, tigers, and leopards.
Weeks later, public criticism flared again when the zoo euthanized four of those lions, to make way for a new male in hopes to breed a new generation of cubs.
Personalized pricing has spread across many industries. Here's how consumers can avoid it:
Recently, Delta Air Lines announced it would expand its use of artificial intelligence to provide individualized prices to customers. This move sparked concern among flyers and politicians. But Delta isn’t the only business interested in using AI this way. Personalized pricing has already spread across a range of industries, from finance to online gaming.
Customized pricing – where each customer receives a different price for the same product – is a holy grail for businesses because it boosts profits. With customized pricing, free-spending people pay more while the price-sensitive pay less. Just as clothes can be tailored to each person, custom pricing fits each person’s ability and desire to pay.
[...] Third, many computer pricing algorithms look at your location, since location is a good proxy for income. I was once in Botswana and needed to buy a plane ticket. The price on my computer was about $200. Unfortunately, before booking I was called away to dinner. After dinner my computer showed the cost was $1,000 − five times higher. It turned out after dinner I used my university’s VPN, which told the airline I was located in a rich American neighborhood. Before dinner I was located in a poor African town. Shutting off the VPN reduced the price.
Last, often to get a better price in face-to-face negotiations, you need to walk away. To do this online, put something in your basket and then wait before hitting purchase. I recently bought eyeglasses online. As a cash payer, I didn’t have my credit card handy. It took five minutes to find it, and the delay caused the site to offer a large discount to complete the purchase.
See also:
YouTube to gauge US users’ ages with AI after UK and Australia add age checks:
YouTube announced on Tuesday that it will begin to use artificial intelligence to estimate the ages of users in the US, in order to show them age-appropriate content.
The rollout of the new feature comes one day after Australia’s government announced it would ban children under 16 from using YouTube and less than a week after the UK implemented sweeping age checks on content on social networks.
YouTube’s AI age verification on its home turf indicates it is putting into place a form of compliance with the Australian and UK requirements, despite its persistent opposition to age-check requirements.
[...] When YouTube determines a user is teen or pre-teen, the site will disable personalized advertising, activate digital wellbeing features and put stricter content filters as well as behavioral restrictions into place.
YouTube’s AI will assess a user’s age via multiple behavioral factors, including what kind of videos the user searches for, the categories of videos they watch, and how long the account has been active, per its blogpost.
“This technology will allow us to infer a user’s age and then use that signal, regardless of the birthday in the account, to deliver our age-appropriate product experiences and protections,” Beser wrote, adding that the company had used the technology in other markets before introducing it in the US.
If the AI’s estimation is incorrect, YouTube says it will allow a user to verify their age with a credit card, a government ID or a selfie.
These are the conference events to keep an eye on. You can even stream a few:
The security industry is hitting Vegas hard this week with three conferences in Sin City that bring the world's largest collection of security pros together for the annual summer camp.
The week kicks off with BSides Las Vegas, which runs from Monday to Wednesday. Of the over 200 BSides security conventions held around the world every year, this one is the biggest and is being held at the Tuscany Hotel, although tickets are sold out.
BSides started as a conference for rejected Black Hat speakers, but those days are long gone. Now it has a range of talk tracks showcasing new research, and this year, passwords are a key theme, with a specific three-day schedule devoted to finding solutions to one of computing's oldest security challenges.
There is a series of live feeds on the conference's YouTube channel and, if you miss seeing the talks in real time, the videos should remain archived. At the password track on Monday at 1700 PT, there's a disturbing-sounding presentation on a custom rig used to crack 936 million passwords with 92 percent accuracy that should be worth tuning into.
[...] For anyone considering adding BSides to their schedule, it's worth a visit. While the smallest of the conventions, it's also one of the most offbeat and there are presentations on everything from building hacking hardware to commercial licensing problems in the industry. And, as is traditional, there's a Capture the Flag competition running and festivities in the evening.
[...] Black Hat: The opening keynote will be a farewell (sort of) address from Mikko Hyppönen, who, after a 34-year tenure at F-Secure hunting malware, is quitting the industry to work on drones. As he told The Register in June, the Ukraine war has spurred him into working on the technology, particularly since his home country, newly minted NATO member Finland, has a massive border with Russia.
The core of the talks is about unpleasant new hacks and vulnerabilities in hardware and software. It was at Black Hat in 2008 that the late Dan Kaminsky revealed a fundamental flaw in DNS that could have run riot through the internet's backbone. While there's nothing on that scale this year, there are sessions scheduled on an Apple zero-day, ways to bypass Windows Hello's authentication systems, and even a talk on satellite vulnerabilities and how to exploit them.
Elsewhere in the talk tracks, there is a key focus on AI, as with everything in the security business these days, but this isn't a cheerleading event and there are some skeptical sessions planned, as well as deep dives into flaws. Several speakers are giving talks on how to fool AIs into breaking safety guardrails or leak information and bots – their use and misuse – are a particular focus.
[...] DEF CON is the original hacker summer camp, started in 1993 in a few hotel rooms by an 18-year-old Jeff Moss with around 100 people. It now hosts tens of thousands of visitors paying more than $500 a head to listen to talks, take part in hacking and gaming competitions, and visit over 30 "villages" dedicated to everything from ham radio to military hacking demonstrations. Its talks are not live-streamed, but most get posted to YouTube eventually.
Once again, AI will feature heavily and the convention is host to the annual AI Cyber Challenge run by DARPA, a competition using the latest LLM models to find vulnerabilities, install fixes that don't break the system, and generate reports while under time pressure. Teams have been competing for months and the final event will see a winner, who will presumably be barraged with lucrative job offers.
[...] The bulk of the talks are pure hacking – vulnerabilities, interesting ways to crack systems, and war stories that advise on what not to do. With the exception of DARPA's competition, this is possibly the least AI-focused conference of the three and is much more about hacking existing systems with current technology.
Most of the villages have their own talks scheduled on everything from policy to privacy and industry-specific topics. There's a car hacking center that Tesla is fond of, the social engineering village is fascinating but also terrifying in showing how easy it is to play people, and the lock picking village is well worth a visit to meet some of the best in the business and get a tutorial.
[...] DEF CON is the fun convention for hackers, while Black Hat is becoming more of a sales and networking-led event, but still has very high-quality security talks and training, and BSides is useful to see what's up and coming in the security industry. The Reg will report on news as it happens, but if you've got any recommendations, feel free to add them to the comments section.
= Links in article:
https://www.youtube.com/@BsideslvOrg/streams
https://bsideslv.org/talks#7PHURF
https://bsideslv.org/talks#9FF3LX
https://www.theregister.com/2025/03/03/cybersecurity_jobs_market/
https://bsideslv.org/talks#UYXVAU
https://www.theregister.com/2025/06/04/mikko_hypponen_drone/
https://www.theregister.com/2023/08/12/black_hat_network/
https://aicyberchallenge.com/
https://www.youtube.com/watch?v=3n2cBSBIAP0