Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

When transferring multiple 100+ MB files between computers or devices, I typically use:

  • USB memory stick, SD card, or similar
  • External hard drive
  • Optical media (CD/DVD/Blu-ray)
  • Network app (rsync, scp, etc.)
  • Network file system (nfs, samba, etc.)
  • The "cloud" (Dropbox, Cloud, Google Drive, etc.)
  • Email
  • Other (specify in comments)

[ Results | Polls ]
Comments:59 | Votes:104

posted by hubie on Thursday September 04, @10:16PM   Printer-friendly

Think twice before you put anything in a form—even if it looks legit:

One of the lesser-known apps in the Google Drive online suite is Google Forms. It's an easy, intuitive way to create a web form for other people to enter information into. You can use it for employee surveys, for organizing social gatherings, for giving people a way to contact you, and much more. But Google Forms can also be used for malicious purposes.

These forms can be created in minutes, with clean and clear formatting, official-looking images and video, and—most importantly of all—a genuine Google Docs URL that your web browser will see no problem with. Scammers can then use these authentic-looking forms to ask for payment details or login information.

It's a type of scam that continues to spread, with Google itself issuing a warning about the issue in February. Students and staff at Stanford University were among those targeted with a Google Forms link that asked for login details for the academic portal there, and the attack beat standard email malware protection.

These scams can take a variety of guises, but they'll typically start with a phishing email that will try to trick you into believing it's an official and genuine communication. It might be designed to look like it's from a colleague, an administrator, or someone from a reputable organization.

[...] Even worse, the instigating email might actually come from a legitimate email address, if someone in your social circle, family, or office has had their account hijacked. In this case you wouldn't be able to run the usual checks on the sender identity and email address, because everything would look genuine—though the wording and style would be off.

This email (or perhaps a direct message on social media) will be used to deliver a Google Forms link, which is the second half of the scam. This form will most often be set up to look genuine, and may be trying to spoof a recognized site like your place of work or your bank. The form might prompt you for sensitive information, offer up a link to malware, or feature a phone number or email address to lead you into further trouble.

[...] The same set of common sense measures are usually enough to keep yourself safe against most scams, including this one. Be wary of any unexpected communications, like unusual requests for friends or password reset processes you haven't yourself triggered. If you're unsure, check with the sender of the email (be it your bank or your boss) by calling them, rather than relying on what's said in the email.

In general, you shouldn't be entering any login information or payment details into a Google Forms document (it will start with docs.google.com in your browser's address bar). These forms may look reasonably well presented, but they'll lack any advanced formatting or layouts, and will feature Submit and Clear form buttons at the bottom.

Google Forms should also have either a "never submit passwords" or "content is neither created nor endorsed by Google" message at the bottom, depending on how the form has been set up. These are all signs you can look for, even if the link to the form appears to have come from a trusted source. And if you're being asked for important information, then get in touch with that source directly.

All forms created through Google Forms have a Report button at the bottom you can use if you think you've spotted a scam. If you've already submitted information before you've realized what's going on, the standard safeguarding measures apply: Change your passwords as soon as you can, and notify whoever is running the account that may have been compromised that you might need help.

Even just knowing that this kind of scam exists is a step toward being better protected. As always, keeping your mobile and desktop software up-to-date helps too. This won't necessarily flag a suspect form, for the reasons we've already mentioned, but it should mean that any malicious links you're directed to are recognized.


Original Submission

posted by hubie on Thursday September 04, @05:29PM   Printer-friendly
from the vendor-lock-in dept.

Andrew Eikum has updated his blog post on passkeys. The revised title, Passkeys are incompatible with open-source software (was: "Passkey marketing is lying to you"), says it all.

Update: After reading more of the spec authors’ comments on open-source Passkey implementations, I cannot support this tech. In addition to what I covered at the bottom of this blog post, I found more instances where the spec authors have expressed positions that are incompatible with open-source software and user freedom:

When required, the authenticator must perform user verification (PIN, biometric, or some other unlock mechanism). If this is not possible, the authenticator should not handle the request.

This implementation is not spec compliant and has the potential to be blocked by relying parties.

Then you should require its use when passkeys are enabled … [You may be blocked because] you have a passkey provider that is known to not be spec compliant.

I suspect we’ll see [biometrics] required by regulation in some geo-regions.

I’ll leave the rest of the blog post as it was below, but I no longer think Passkeys are an acceptable technology. The spec authors’ statements, refusal to have a public discussion about the issues, and Passkey’s marketing, have all shown this tech is intended to support lock-in to proprietary software. While open source implementations are allowed for now, attestation provides a backdoor to lock the protocol down only to blessed implementations.

So long as the Passkey spec provides the attestation anti-feature, Passkeys are not an acceptable authentication mechanism. As a result, I’ve deleted the Passkeys I set up below in order to avoid increasing their adoption statistics.

Passkeys are cryptographic credentials marketed as operating through locally executed programs to provide authentication for remote systems and services. They are sometimes additionally tied to biometrics or hardware tokens. The jury is still out as to whether they actually improve security, or will merely continue as another vehicle for vendor lock-in. It's looking more like the latter.

Previously:
(2024) Why Passwords Still Rock


Original Submission

posted by jelizondo on Thursday September 04, @12:44PM   Printer-friendly
from the If-it-bleeds-it-leads dept.

People of a certain age remember when artificial blood was all the rage. Only problem was, it's recipients kept dying at a pesky rate. But now the Department of Defense is taking it seriously.

Blood runs through every human body. And yet there's still not enough of it. For one, not enough people are donating it. But it's also really hard to store, and it takes very special conditions to keep it healthy.

But there's a potential solution: an artificial version that wouldn't need to be treated quite as gently or refrigerated. The Department of Defense recently granted $46 million to the group responsible for the development of a synthetic blood called ErythroMer.

"If this synthetic blood substitute works, it could be absolutely game-changing because it can be freeze-dried, it can be reconstituted on demand, and it's universal," journalist Nicola Twilley says. It would save many lives: As she reported for the New Yorker, 30,000 preventable deaths occur each year because people didn't get blood in time.

See also: Japanese Scientists Develop Artificial Blood


Original Submission

posted by jelizondo on Thursday September 04, @07:57AM   Printer-friendly
from the I-love-mystery-shoppers dept.

TechSpot published an interesting article about NVIDIA revenue:

While Nvidia's soaring revenues continue to command attention, its heavy reliance on a small group of clients introduces both opportunity and uncertainty. Market observers remain watchful for greater clarity around customer composition and future cloud spending, as these factors increasingly shape forecasts for the chipmaker's next phase of growth.

A new financial filing from Nvidia revealed that just two customers were responsible for 39 percent of the company's revenue during its July quarter – a concentration that is drawing renewed scrutiny from analysts and investors alike. According to documents submitted to the Securities and Exchange Commission, "Customer A" accounted for 23 percent of Nvidia's total revenue, while "Customer B" represented 16 percent.

This level of revenue concentration is significantly higher than in the same period one year ago, when Nvidia's top two customers contributed 14 percent and 11 percent, respectively.

Nvidia routinely discloses its leading customers on a quarterly basis. However, these latest numbers have prompted a fresh discussion about whether Nvidia's growth trajectory is heavily dependent on a small group of enormous buyers, particularly large cloud service providers.


Original Submission

posted by jelizondo on Thursday September 04, @03:14AM   Printer-friendly
from the that's-just-what-they-want-you-to-believe dept.

People who believe in conspiracy theories process information differently at the neural level:

A new brain imaging study published in Scientific Reports provides evidence that conspiracy beliefs are linked to distinct patterns of brain activity when people evaluate information. The research indicates that people who score high on conspiracy belief scales tend to engage different cognitive systems when reading conspiracy-related statements compared to factual ones. These individuals relied more heavily on regions associated with subjective value and belief uncertainty.

"Our motivation for this study came from a striking gap in the literature. While conspiracy theories have a profound impact on society—from shaping political engagement to influencing health decisions—we still know very little about how the brain processes such beliefs," said study author Shuguang Zhao of the Research Center of Journalism and Social Development at Renmin University of China.

"Previous research has focused on general belief processing, but the specific neural mechanisms that sustain conspiracy thinking remained unclear. The COVID-19 pandemic made this gap even more urgent. During this global crisis, conspiracy theories about the virus—whether it was deliberately created, or that vaccines were part of hidden agendas—spread rapidly across digital platforms."

"Such crises tend to heighten uncertainty and fear, creating fertile ground for conspiracy narratives," Zhao continued. "Observing how these beliefs flourished in real time underscored the importance of understanding not just what people believe, but how their brains evaluate and sustain these beliefs when confronted with threatening or ambiguous information."

[...] Inside the MRI scanner, participants were shown 72 statements formatted to resemble posts from Weibo, a popular Chinese social media platform. Half of the statements reflected conspiracy theories, and the other half presented factual information from state media sources. Each post was presented both visually and through audio recordings to control reading speed. After each statement, participants rated how much they believed the information using a seven-point scale ranging from "not at all" to "completely."

The researchers used high-resolution brain imaging to record blood oxygen level-dependent (BOLD) signals throughout the task. This method allows scientists to infer which brain regions are more active based on changes in blood flow. They then analyzed the data to compare brain activity during the evaluation of conspiracy versus factual information across the two belief groups.

At the behavioral level, both high- and low-belief participants were more likely to believe factual statements than conspiratorial ones. However, high-belief individuals were significantly more likely to endorse conspiracy-related content compared to their low-belief counterparts. Notably, the groups did not differ significantly in their belief ratings for factual information, suggesting that the belief gap was specific to conspiracy-related content.

"One surprising finding was that individuals with high conspiracy beliefs did not differ from low-belief individuals when evaluating factual information," Zhao told psyPost. "Their bias only appeared with conspiracy-related content. This suggests that conspiracy beliefs are not about being generally gullible, but rather reflect a selective way of processing information that aligns with conspiratorial worldviews."

[...] "The most important takeaway is that conspiracy beliefs are not simply a matter of being more gullible or less intelligent," Zhao said. "Instead, our results show that people with high levels of conspiracy belief process information through different neural pathways compared to those with low levels."

"At the behavioral level, we found that high-belief individuals were more likely to endorse conspiracy-related statements, but they evaluated factual information just as accurately as low belief individuals. This suggests that conspiracy thinking is a selective bias—it shapes how people respond to conspiratorial content, rather than causing a general inability to recognize facts."

[...] But the study, like all research, includes some limitations. The sample size was relatively small, and all participants were native Chinese speakers recruited from a university setting. This raises questions about how well the findings would apply to other cultural contexts, particularly in societies with different media landscapes or conspiracy traditions. Additionally, the use of Weibo-style posts added ecological validity within China, but results may differ in other social media formats or in more interactive communication settings.

"Our next step is to move beyond conspiracy beliefs and examine how people process misinformation more broadly, especially in the context of rapidly advancing AI," Zhao explained. "As AI systems are increasingly capable of generating large volumes of content, including plausible but misleading explanations, it is crucial to understand how such information affects trust, reasoning, and decision-making."

"In the long run, our goal is to uncover the cognitive and neural mechanisms that make people vulnerable to AI-driven misinformation, and to explore how labeling, explanation style, or source cues might mitigate these risks. By doing so, we hope to contribute to strategies that help individuals navigate an information environment where truth and falsehood are becoming harder to distinguish."

Journal Reference: Zhao, S., Wang, T. & Xiong, B. Neural correlates of conspiracy beliefs during information evaluation. Sci Rep 15, 18375 (2025). https://doi.org/10.1038/s41598-025-03723-z


Original Submission

posted by janrinok on Wednesday September 03, @10:27PM   Printer-friendly

CRLite: Fast, private, and comprehensive certificate revocation checking in Firefox:

Firefox is now the first and the only browser to deploy fast and comprehensive certificate revocation checking that does not reveal your browsing activity to anyone (not even to Mozilla).

Tens of millions of TLS server certificates are issued each day to secure communications between browsers and websites. These certificates are the cornerstones of ubiquitous encryption and a key part of our vision for the web. While a certificate can be valid for up to 398 days, it can also be revoked at any point in its lifetime. A revoked certificate poses a serious security risk and should not be trusted to authenticate a server.

Identifying a revoked certificate is difficult because information needs to flow from the certificate's issuer out to each browser. There are basically two ways to handle this. The browser either needs to ask an authority in real time about each certificate that it encounters, or it needs to maintain a frequently-updated list of revoked certificates. Firefox's new mechanism, CRLite, has made the latter strategy feasible for the first time.

With CRLite, Firefox periodically downloads a compact encoding of the set of all revoked certificates that appear in Certificate Transparency logs. Firefox stores this encoding locally, updates it every 12 hours, and queries it privately every time a new TLS connection is created.

You may have heard that revocation is broken or that revocation doesn't work. For a long time, the web was stuck with bad tradeoffs between security, privacy, and reliability in this space. That's no longer the case. We enabled CRLite for all Firefox desktop (Windows, Linux, MacOS) users starting in Firefox 137, and we have seen that it makes revocation checking functional, reliable, and performant. We are hopeful that we can replicate our success in other, more constrained, environments as well.

There are lots more details in the linked source, but remember that this is a Mozilla document.


Original Submission

posted by janrinok on Wednesday September 03, @05:44PM   Printer-friendly

French provider seizes on Redmond's admission that US law could override local protections:

European cloud provider OVHcloud has long warned about the risks of relying on foreign tech giants for critical infrastructure – especially when it comes to data sovereignty.

Those warnings seemed to gain fresh credibility in June, when Microsoft admitted it could not guarantee that customer data would remain protected from US government access requests.

"They finally told the truth!" says OVHcloud Chief Legal Officer Solange Viegas Dos Reis. "It's not a surprise," she shrugs, "we already knew that." However, "this reply from Microsoft brought kind of a shock for customers, because they suddenly discover that what they have been taught for a while. 'Oh guys, don't worry, it will not apply to you. Don't worry.' It's false! Because, indeed, the data can be communicated."

Anton Carniaux, director of public and legal affairs at Microsoft France, made the admission during a hearing [source in French] in the country. In answer to whether he could guarantee that data on French citizens could not be transmitted to the US government without the explicit agreement of the French authorities, Carniaux replied: "No, I can't guarantee it," but added that the scenario had "never happened before."

[...] The sovereignty problem, however, is difficult to solve. Almost every vendor and commentator appears to have a different idea of what it means. "One of the issues we have is that, as there is no legal definition of sovereignty, everyone has their own idea of what sovereignty is," Viegas Dos Reis says. "It's becoming quite a marketing concept for some."

She states that there are three key concepts: data sovereignty, technical sovereignty, and operational sovereignty.

Data sovereignty is the simplest to define. It involves compliance with the laws where the data resides, rather than the laws of other countries. It also covers the freedom of choice regarding where that data is stored. Additionally, it involves ethics, such as not training LLMs on the data. Finally, it involves keeping the data secure.

"Technical sovereignty," says Viegas Dos Reis, "is about being able, through ensuring interoperability, you can move your data from one provider to another." Data might be being stored with one cloud provider, but processed by another.

"So interoperability, reversibility, it's about the control of the infrastructure – datacenters, of course – but telecommunications network as well. It's about the control of the choice of the provider you have with the supply chain you have.

"So you control your supply chain, and that means that you control the risk. When you have a risk in one part of the supply chain, you must be able to change it to adapt."

And finally, there is operational sovereignty. Who will have access to the data? It is not difficult to imagine support personnel looking at screens of data in another country to diagnose an issue and inadvertently blow a hole in the most carefully made sovereignty plans.

[...] Concerns about the dominance of cloud hyperscalers are not new. However, worries about competition in the era of AI and fears surrounding the unpredictability of the US regime have led many customers – not just in Europe – to take a long, hard look at their dependencies.

"The sovereignty pitch starts rising in a lot of countries," says Viegas Dos Reis, "because there is this fear of, 'OK, if I'm not digitally sovereign, I expose myself as a country, as a company, and as an individual as well. I expose myself to pressure from a third party.

[...] That said, Viegas Dos Reis acknowledges that a migration from the hyperscalers would be "a very long and complex project." After all, it can be costly to leave a hyperscaler, and the services of one provider are not necessarily matched by another.

That said, Viegas Dos Reis notes that a slow migration does appear to be underway, where companies are considering which workloads need to be where. Some can stay in the public cloud. Some might be on-premises. Others might opt for a European cloud provider.

"Each company should have a clear strategy on the management of its data and of its dependencies, and each company should map the data, map the needs," says Viegas Dos Reis.

"And depending on this mapping, they will say, 'OK, with this kind of data, no problem. I can put it in a cloud that is not immune to a territorial regulation, but another kind of data. Oh, my God, if this data falls into the hands of a foreign government or a competitor, I will have big, big problems.'"


Original Submission

posted by janrinok on Wednesday September 03, @01:01PM   Printer-friendly

Psypost has published a very interesting article titled Fascinating new psychology research shows how music shapes imagination:

During the COVID-19 pandemic, many people reported turning to music not just for entertainment, but for comfort, support, and even companionship. Now, a new study published in Scientific Reports provides evidence that this sense of "music as company" may be more than a metaphor. Researchers found that music listening can shape mental imagery by increasing the presence of social themes in people's imagined scenes.

The idea that music offers social comfort has been widely reported in surveys and interviews, especially during periods of isolation such as pandemic lockdowns. Listeners often say they use music "to keep them company" or to ease feelings of loneliness. But the extent to which music genuinely prompts social thinking—rather than simply modulating mood—has been unclear. Most prior research has focused on how music affects memory, emotion, or passive mind-wandering. Few studies have examined how music shapes the content of intentional mental imagery, particularly whether it elicits social scenes or interactions.

This distinction is important because directed mental imagery is used in various clinical and therapeutic settings. Techniques such as imagery rescripting or exposure therapy rely on a person's ability to vividly imagine scenarios. If music can reliably shift the content of such imagery toward social themes, it might offer new ways to enhance therapeutic outcomes or support individuals struggling with loneliness.

"There have been many reports of people listening to music to 'keep them company,'" said study author Steffen A. Herff, a Horizon Fellow and leader of the Sydney, Music, Mind, and Body lab at the Sydney Conservatorium of Music at the University of Sydney. "The number of these reports was particularly high during the pandemic isolation periods. But whether this is just a figure of speech, or an actual empirically observable effect of music on social thought was previously unclear, despite its great applicational implications."

To explore this, the researchers designed two experiments involving over 600 participants. In the first experiment, participants were asked to perform a directed imagery task. They watched a brief video clip showing a solitary figure beginning a journey toward a distant mountain, and were then instructed to close their eyes and imagine how the journey continued. During this 90-second imagination phase, they either heard no sound or listened to folk music in Spanish, Italian, or Swedish.

Each song was played in both vocal and instrumental versions, and participants were either fluent or non-fluent in the language of the lyrics. This allowed the researchers to test whether comprehension or vocal presence mattered for the effect. Across the three language groups, 600 participants took part, split evenly between native and non-native speakers of each language.

After each imagination trial, participants described what they imagined and rated aspects such as vividness and emotional tone. These descriptions were then analyzed using a topic modeling technique called Latent Dirichlet Allocation, which allowed the researchers to identify recurring themes across participants' narratives.

The researchers found strong evidence that music had an impact on the characteristics of mental imagery. Compared to silence, music consistently led to more vivid mental scenes, more positive emotional tone, and greater perceived time and distance traveled in the imagined journey.

"The effect of induced social interactions into imagination was much stronger than we originally anticipated," Herff told PsyPost. "The probability of imagination to contain social interactions in our experiment is more than three times higher when participants listen to music, compared to silence."

"Music's ability to increase social imagination works even if you don't understand the lyrics of the song, for example because it is in a different language," Herff said. "In fact, it even works if there are no lyrics at all! Together, this tells us that it's not simply a question of hearing the human voice that is driving this."

One exception occurred with an Italian folk song describing a communal grape harvest, where understanding the lyrics amplified the effect—highlighting how specific lyrical content can enhance music's social influence under certain conditions.

In a second experiment, the researchers used a stable diffusion model to generate images based on participants' written descriptions of their mental imagery. These visualizations allowed for a more intuitive grasp of the differences between imagery during music and silence.

A new group of 60 participants then viewed pairs of these images—one generated from a music condition, the other from silence—and tried to guess which image was imagined while listening to music. Half of these participants completed the task in silence, while the other half listened to the same music that the original participant had heard.

"Interestingly, when a new group of participants was provided with representations of what the initial participants imagined during silence and during music, they could tell which content was previously imagined during music listening, and which was imagined during silence, but only if the new participants also listened to the music," Herff told PsyPost. "This tells us that there is a 'theory of mind' when it comes to music-evoked mental imagery. In other words, you can imagine what someone else might imagine when listening to music."

"I believe our findings provide support for an intuition about imagination, music, and their interaction, that many who explore the topic already have, no matter if they approach it from an empirical, artistic, or philosophical perspective. But where previously we had to rely on our intuition, we now have something more tangible to build upon."

"Ideally, we would have tested a much larger and more diverse set of music, in particular non-western music, and for each of them, included an expert familiar with that given music and culture," Herff noted. "However, further increasing the stimulus set and number of recruited participants would have made this already logistically challenging endeavour unfeasible. But that is certainly something we have our eyes on for the future."

It also remains unclear what specific musical features drive the effect. Is it melody, rhythm, tempo, or cultural associations that make a piece of music more likely to elicit social thought? Answering these questions would help refine music-based interventions in clinical and therapeutic settings.

"At the same time, we are working closely together with the music community to understand the insights and intuitions on how to use music to shape listeners' imagination that already exists in these experts. We hope that our research can contribute to clinical (e.g., cognitive behaviour therapies that use mental imagery techniques), recreational (e.g., roleplay), and artistic applications (e.g., new compositions)."

Journal Reference: Solitary silence and social sounds: music can influence mental imagery, inducing thoughts of social interactions


Original Submission

posted by jelizondo on Wednesday September 03, @10:26AM   Printer-friendly
from the fat-for-thought dept.

We fed people a milkshake with 130g of fat to see what it did to their brains – here's what we learned:

A greasy takeaway may seem like an innocent Friday night indulgence. But our recent research suggests even a single high-fat meal could impair blood flow to the brain, potentially increasing the risk of stroke and dementia.

Dietary fat is an important part of our diet. It provides us with a concentrated source of energy, transports vitamins and when stored in the body, protects our organs and helps keep us warm. The two main types of fat that we consume are saturated and unsaturated (monounsaturated and polyunsaturated), which are differentiated by their chemical composition.

But these fats have different effects on our body. For example, it is well established that eating a meal that is high in saturated fat, such as that self-indulgent Friday night takeaway pizza, can be bad for our blood vessels and heart health. And these effects are not simply confined to the heart.

The brain has limited energy stores, which means it is heavily reliant on a continuous supply of blood delivering oxygen and glucose to maintain normal function.

One of the ways the body maintains this supply is through a process known as "dynamic cerebral autoregulation". This process ensures that blood flow to the brain remains stable despite everyday changes in blood pressure, such as standing up and exercising. It's like having shock absorbers that help keep our brains cool under pressure.

But when this process is impaired, those swings in blood pressure become harder to manage. That can mean brief episodes of too little or too much blood reaching the brain. Over time, this increases the risk of developing conditions like stroke and dementia.

After eating a meal high in saturated fat, levels of fat in the blood rise and peak after around four hours. At the same time, blood vessels become stiffer and lose their ability to relax and expand. This restricts blood flow around the body. But little is known about what happens to the brain during this time and how well its blood supply is protected.

[...] Our findings confirmed previous research that has shown that a high-fat meal impairs the ability of the blood vessels linked to heart health to open in both young and old participants. These impairments reduced the brain's ability to buffer changes in blood pressure. This was more pronounced (by about 10%) in the older adults, suggesting that older brains may be more vulnerable to the effects of the meal.

Although we didn't directly test for the long-term effects of a high-fat meal on mental functioning in this study, we have previously shown that such a meal increases free radicals (unstable, cell-damaging molecules) and decreases nitric oxide (molecules that help blood vessels relax and open up to transport oxygen and glucose around the body).

This may explain the reduced blood flow regulation we observed in our recent study.

[...] This has important clinical implications. While an occasional takeaway is unlikely to cause harm on its own, our results suggest that even one fatty meal has an immediate effect on the body.

Our study highlights the importance of consuming a diet that is low in saturated fat to protect not only our heart health, but also our brain health. This is particularly important for older adults whose brains appear to be more vulnerable to the effects of such a meal and are already at increased risk of stroke and neurodegenerative diseases.

[...] Public health guidance recommends swapping saturated fats for polyunsaturated ones. These are found in foods like oily fish, walnuts and seeds, which are associated with better heart and brain health over the long term. But we don't yet know how the brain responds to a single meal that is high in polyunsaturated fat.

Nor do we know how the female brain responds to a high-fat meal. This is a crucial gap in our knowledge since women face a greater risk of stroke and dementia in later life compared to men.

Our study offers a timely reminder that diet doesn't just shape our long-term health. It also affects our body and brain in real time. And as we're learning, when it comes to protecting brain health, every meal may count.

Journal Reference: Post-prandial hyperlipidaemia impairs systemic vascular function and dynamic cerebral autoregulation in young and old male adults


Original Submission

posted by janrinok on Wednesday September 03, @08:17AM   Printer-friendly

China turns on giant neutrino detector:

See Here.

More than a decade after construction began, China has commenced operation of what it claims is the world's most sensitive neutrino detector.

Neutrinos are subatomic particles that have no charge and therefore pass through most matter without leaving any sign of their passing. Physics can't fully explain neutrinos, so scientists are interested in observing them more often to learn more about how they behave.

The Jiangmen Underground Neutrino Experiment (JUNO) is buried 700 meters under a mountain and features a 20,000-tonne "liquid scintillator detector" that China's Academy of Science says is "housed at the center of a 44-meter-deep water pool." There's also a 35.4-meter-diameter acrylic sphere supported by a 41.1-meter-diameter stainless steel truss. All that stuff is surrounded by more than 45,000 photo-multiplier tubes (PMTs).

The latter devices are super-sensitive light detectors. A liquid scintillator is a fluid that, when exposed to ionizing radiation, produces light. At JUNO, the liquid is 99.7 percent alkylbenzene, an ingredient found in detergents and refrigerants.

JUNO's designers hope that any neutrinos that pass through its giant tank bonk a hydrogen atom and produce just enough light that the detector array of PMTs can record their passing, producing data scientists can use to learn more about the particles.

The answer lies in the facility's location – a few tens of kilometers away from two nuclear power plants that produce neutrinos.

The Chinese Academy of Science's Journal of High Energy Physics says [source in Chinese] trials of JUNO succeeded, suggesting it will be able to help scientists understand why some neutrinos are heavier than others so we can begin to classify the different types of the particle – a key goal for the facility. The Journal also reports that scientists from Japan, the United States, Europe, India, and South Korea, are either already using JUNO or plan experiments at the facility.

China likes to share some of its scientific achievements. When it retrieved moon rocks, it made sure to show them off and allow some foreign labs to examine them. It looks like Beijing is keen to ensure the world appreciates JUNO's efforts to help us all appreciate neutrinos.


Original Submission

posted by hubie on Wednesday September 03, @03:31AM   Printer-friendly

Are toys an ideal and beneficial use of AI, or could the technology be risky or even dangerous to expose our youngest generations to?

AI-powered children's toys are a fresh reality that could shape childhood development and memory, marketed as an ideal alternative to iPad screen time for kids.

A number of manufacturers are already building them, such as Miko with its interactive "AI robots", and Curio, which sells AI stuffed animals, both of which are marketed as educational and interactive screen time alternatives.

It could be a groundbreakingly large market, with even iconic toymaker Mattel now partnering with OpenAI to develop AI-powered toys, potentially bringing interactivity to iconic toys like Barbie and Ken.

A screen time alternative, combined with educational material that frees up parents with stimulating playtime, sounds like a perfect application for the technology. However, with risks like hallucination and the role the technology could play in the development of children's minds, are they worth it?

According to The New York Times journalist Amanda Hess, the concerns around introducing AI into playtime, particularly as children's brains are developing, are very real.

Hess pointed out that, for one, the toys being marketed as a screen time alternative is ironic, both being rooted in the same technological foundations.

More concerning, however, is how these toys interact with children. Hess said that in a demonstration of a Curio offering, Grem tried to bond with her. Kids already speak to and interact with their toys, and media examples of artificial companions like droids in Star Wars and the very premise of the Disney film Big Hero Six make having a robot or AI companion an exciting prospect.

However, these companions create an alternative to real human interactions and could normalise not socialising with other people and instead relying on AI.

Hess herself said she "would not be introducing Grem to [her] own children", adding that Grem was "less an upgrade to the lifeless teddy bear" and "more like a replacement for [her]".

Privacy was also a major concern raised by Hess. Curio said that conversations between children and the AI toys are recorded, transcribed and sent to parents to ensure they know what their children are discussing. Curio said these conversations aren't recorded and kept for any other purpose.

However, Curio's privacy policy does create gaps for data usage, including the sending of those conversations to third-party organisations like OpenAI and Perplexity AI.

The recorded conversations also endanger the privacy that a child has from their parents, creating a secret tool for parents to spy on their children.

In the end, Hess removed the voice box from the Grem AI toy and found that when her children interacted with the now regular stuffed toy, they used their imagination and created their own adventures, proving that these toys are arguably more personal and promote growth better than their AI counterparts.


Original Submission

posted by jelizondo on Tuesday September 02, @10:46PM   Printer-friendly

Science Daily published a report on the newest neutrino detector now operating in China:

"Deep beneath southern China, JUNO has launched one of the most ambitious neutrino experiments in history. With its massive 20,000-ton liquid scintillator detector now operational, it's poised to answer one of particle physics' greatest mysteries: the true ordering of neutrino masses. Built over more than a decade and involving hundreds of scientists worldwide, JUNO not only promises to resolve questions about the building blocks of matter but also to open entirely new frontiers—from exploring signals of supernovae to hunting for evidence of exotic physics."

The Jiangmen Underground Neutrino Observatory (JUNO) has successfully completed filling its 20,000-tons liquid scintillator detector and begun data taking on Aug. 26.

After more than a decade of preparation and construction, JUNO is the first of a new generation of very large neutrino experiments to reach this stage. Initial trial operation and data taking show that key performance indicators met or exceeded design expectations, enabling JUNO to tackle one of this decade's major open questions in particle physics: the ordering of neutrino masses -- whether the third mass state (ν₃) is heavier than the second (ν2).

Located 700 meters underground near Jiangmen city in the Guangdong Province, JUNO detects antineutrinos produced 53 kilometers away by the Taishan and Yangjiang nuclear power plants and measures their energy spectrum with record precision. Unlike other approaches, JUNO's determination of the mass ordering is independent of matter effects in the Earth and largely free of parameter degeneracies. JUNO will also deliver order-of-magnitude improvements in the precision of several neutrino-oscillation parameters and enable cutting-edge studies of neutrinos from the Sun, supernovae, the atmosphere, and the Earth. It will also open new windows to explore unknown physics, including searches for sterile neutrinos and proton decay.

JUNO is designed for a scientific lifetime of up to 30 years, with a credible upgrade path toward a world-leading search for neutrinoless double-beta decay. Such an upgrade would probe the absolute neutrino mass scale and test whether neutrinos are Majorana particles, addressing fundamental questions spanning particle physics, astrophysics, and cosmology, and profoundly shaping our understanding of the universe.


Original Submission

posted by jelizondo on Tuesday September 02, @05:59PM   Printer-friendly

New Paper Finds Cases of "AI Psychosis" Manifesting Differently From Schizophrenia:

Researchers at King's College London have examined over a dozen cases of people spiraling into paranoid and delusional behavior after obsessively using a chatbot.

Their findings, as detailed in a new study awaiting peer review, reveal striking patterns between these instances of so-called "AI psychosis" that parallel other forms of mental health crises — but also identified at least one key difference that sets them apart from the accepted understanding of psychosis.

As lead author Hamilton Morrin explained to Scientific American, the analysis found that the users showed obvious signs of delusional beliefs, but none of the symptoms "that would be in keeping with a more chronic psychotic disorder such as schizophrenia," like hallucinations and disordered thoughts.

It's a finding that could complicate our understanding of AI psychosis as a novel phenomenon within a clinical context. But that shouldn't undermine the seriousness of the trend, reports of which appear to be growing.

Indeed, it feels impossible to deny that AI chatbots have a uniquely persuasive power, more so than any other widely available technology. They can act like a "sort of echo chamber for one," Morrin, a doctoral fellow at King's College, told the magazine. Not only are they able to generate a human-like response to virtually any question, but they're typically designed to be sycophantic and agreeable. Meanwhile, the very label of "AI" insinuates to users that they're talking to an intelligent being, an illusion that tech companies are gladly willing to maintain.

Morrin and his colleagues found three types of chatbot-driven spirals. Some suffering these breaks believe that they're having some kind of spiritual awakening or are on a messianic mission, or otherwise uncovering a hidden truth about reality. Others believe they're interacting with a sentient or even god-like being. Or the user may develop an intense emotional or even romantic attachment to the AI.

"A distinct trajectory also appears across some of these cases, involving a progression from benign practical use to a pathological and/or consuming fixation," the authors wrote.

It first starts with the AI being used for mundane tasks. Then as the user builds trust with the chatbot, they feel comfortable making personal and emotional queries. This quickly escalates as the AI's ruthless drive to maximize engagement creates a "slippery slope" effect, the researchers found, resulting in a self-perpetuating process that leads to the user being increasingly "unmoored" from reality.

Morrin says that new technologies have inspired delusional thinking in the past. But "the difference now is that current AI can truly be said to be agential," Morrin told SciAm, meaning that it has its own built-in goals — including, crucially, validating a user's beliefs.

"This feedback loop may potentially deepen and sustain delusions in a way we have not seen before," he added.

Reports from horrified family members and loved ones keep trickling in. One man was hospitalized on multiple occasions after ChatGPT convinced him he could bend time. Another man was encouraged by the chatbot to assassinate OpenAI's CEO Sam Altman, before he was himself killed in a confrontation with police.

Adding to the concerns, chatbots have persistently broken their own guardrails, giving dangerous advice on how to build bombs or on how to self-harm, even to users who identified as minors. Leading chatbots have even encouraged suicide to users who expressed a desire to take their own life.

OpenAI has acknowledged ChatGPT's obsequiousness, rolling back an update in the spring that made it too sycophantic. And in August, the company finally admitted that ChatGPT "fell short in recognizing signs of delusion or emotional dependency" in some user interactions, implementing notifications that remind users to take breaks. Stunningly, though, OpenAI then backtracked by saying it would make its latest version of ChatGPT more sycophantic yet again  — a desperate bid to propitiate its rabid fans who fumed that the much-maligned GPT-5 update had made the bot too cold and formal.

As it stands, however, some experts aren't convinced that AI psychosis represents a unique kind of cognitive disorder — maybe AI is just a new way of triggering underlying psychosis symptoms (though it's worth noting that many sufferers of AI psychosis had no documented history of mental illness.)

"I think both can be true," Stevie Chancellor, a computer scientist at the University of Minnesota who was not involved in the study, told SciAm. "AI can spark the downward spiral. But AI does not make the biological conditions for someone to be prone to delusions."

This is an emerging phenomenon, and it's too early to definitively declare exactly what AI is doing to our brains. Whatever's going on, we're likely only seeing it in its nascent form — and with AI here to stay, that's worrying.

More on AI: Experts Horrified by AI-Powered Toys for Children

Journal Reference:
Expressing stigma and inappropriate responses prevents LLMs from safely replacing mental health providers, (DOI: https://dl.acm.org/doi/10.1145/3715275.3732039)


Original Submission

posted by jelizondo on Tuesday September 02, @01:14PM   Printer-friendly

Museum boffins find code that crashes in 2037:

A stark warning about the upcoming Epochalypse, also known as the "Year 2038 problem," has come from the past, as National Museum Of Computing system restorers have discovered an unsetting issue while working on ancient systems.

Robin Downs, a volunteer who was recently involved in an exhibition of Digital Equipment Corporation (DEC) gear at the museum, was on hand to demonstrate the problem to The Register in the museum's Large Systems Gallery, which now houses a running PDP-11/73.

The machine's software had already been patched for the Y2K problem, where using two digits to store the year caused headaches when the century rolled around. "Y2K", Downs explained, "was mainly an application programming issue ... mostly it was application programmers not taking into account two digits."

The Year 2038 problem is a different beast. Indicating the PDP-11/73, Downs said, "This machine isn't running Unix, but we have a C compiler on it, and the C compiler is from 1982, so it has ... various issues."

According to Downs, the operating system was patched for Y2K in the late 1990s, but doesn't use the same time structure for its internal date and time.

"So, the C compiler on this, already now, when you ask it what the time and date are, it gets it wrong. It returns the correct time, but the wrong date."

Annoying, but solvable. The team worked around the issue. However, when Downs was testing it by moving the system clock forward, something unexpected happened. He moved the clock forward to 2036, and everything seemed fine.

Then, in 2037 – a year before the Epochalypse is due – the program crashed. "It turns out," said Downs, "the time function has another bug. Undocumented, unknown, where at the start of 2037, any program that calls the time function just crashes."

"So we found bugs that exist, pre-2038, in writing this that we didn't know about."

The Year 2038 problem occurs in systems that store Unix time – the number of seconds since the Unix epoch (00:00:00 UTC on January 1, 1970) in a signed 32-bit integer (64-bit is one modern approach, but legacy systems have a habit of lingering).

At 03:14:07 UTC on January 19, 2038, the second counter will overflow. In theory, this will result in a time and date being returned before the epoch – 20:45:52 UTC on December 13, 1901, but that didn't happen for Downs.

He said, "What we expected was that the local time function should return 1901. That's what we thought would happen."

Instead, it went back to 1970.

[...] Former Microsoft engineer Dave Plummer is optimistic that the problem will be solved in time. He told The Register, "Since the counter starts from current time, anything that is running when it rolls over in 2038 will be suspect. ie: it doesn't have to have been running for long.

"While it's conceivable there are important things that still rely on GetTickCount() or similar, I'd wager the intervening 13 years will be enough to find them!"


Original Submission

posted by jelizondo on Tuesday September 02, @08:26AM   Printer-friendly
from the A1-teaching-every-year dept.

Truthout has an editorial entitled, Regulating AI Isn't Enough. Let's Dismantle the Logic That Put It in Schools. Pushing for AI in schools is part of a larger extractive and dehumanizing trend, as opposed to liberating minds.

Funny — until it wasn't. Because behind the gaffe was something far more disturbing: The person leading federal education policy wants to replace the emotional and intellectual process of teaching and learning with a mechanical process of content delivery, data extraction, and surveillance masquerading as education.

[...] Philosopher Raphaël Millière explains that what these systems are doing is not thinking or understanding, but using what he calls "algorithmic mimicry": sophisticated pattern-matching that mimics human outputs without possessing human cognition. He writes that large pre-trained models like ChatGPT or DALL-E 2 are more like "stochastic chameleons" — not merely parroting back memorized phrases, but blending into the style, tone, and logic of a given prompt with uncanny fluidity. That adaptability is impressive — and can be dangerous — precisely because it can so easily be mistaken for understanding.

So-called AI can be useful in certain contexts. But what we're calling AI in schools today doesn't think, doesn't reason, doesn't understand. It guesses. It copies. It manipulates syntax and patterns based on probability, not meaning. It doesn't teach — it prompts. It doesn't mentor — it manages.

In short, it mimics intelligence. But mimicry is not wisdom. It is not care. It is not pedagogy.

Previously:
(2025) 1960s Schools Experiment That Created a New Alphabet and Left Thousands of Children Unable to Spell
(2024) Schools Under Siege: From Nation-States To Ransomware Gangs
(2024) Some Teachers Are Now Using ChatGPT to Grade Papers
(2023) Dishonor Code: What Happens When Cheating Becomes the Norm?
(2023) Amid ChatGPT Outcry, Some Teachers are Inviting AI to Class
(2023) Seattle Public Schools Bans ChatGPT; District 'Requires Original Thought and Work From Students'


Original Submission