Nanotech makes cancer drug 20,000x stronger, without side effects

In a major step toward improving cancer treatment, researchers at Northwestern University have redesigned the molecular structure of a widely used chemotherapy drug, making it far more soluble, potent, and less toxic to the body.

The scientists built a new form of the drug using spherical nucleic acids (SNAs), a type of nanostructure that embeds the drug directly into DNA strands coating tiny spheres. This re-engineering turned a weak, poorly dissolving chemotherapy drug into a highly targeted cancer-fighting agent that spares healthy tissue.

A Dramatic Boost Against Leukemia

The new therapy was tested in animals with acute myeloid leukemia (AML), a fast-growing and hard-to-treat blood cancer. Compared with the standard chemotherapy version, the SNA-based drug entered leukemia cells 12.5 times more efficiently, destroyed them up to 20,000 times more effectively, and slowed cancer progression 59-fold — all without detectable side effects.

This success highlights the growing promise of structural nanomedicine, a field that precisely controls the composition and architecture of nanomedicines to improve how they interact with the human body. With seven SNA-based treatments already in clinical testing, researchers believe this approach could pave the way for new vaccines and therapies for cancers, infections, neurodegenerative disorders, and autoimmune diseases.

[…]

For this study, Mirkin’s team revisited 5-fluorouracil (5-Fu), a long-standing chemotherapy drug known for its limited efficiency and harsh side effects. Because it affects healthy cells as well as cancerous ones, 5-Fu can cause nausea, fatigue, and in rare cases, heart complications.

Mirkin explained that the issue lies not in the drug itself but in its poor solubility. Less than 1% dissolves in many biological fluids, meaning most of it never reaches its intended targets. When a drug cannot dissolve well, it clumps together or remains solid, preventing the body from absorbing it effectively.

“We all know that chemotherapy is often horribly toxic,” Mirkin said. “But a lot of people don’t realize it’s also often poorly soluble, so we have to find ways to transform it into water soluble forms and deliver it effectively.”

How Spherical Nucleic Acids Transform Drug Delivery

To overcome this limitation, the researchers turned to SNAs — globular nanoparticles surrounded by dense shells of DNA or RNA. Cells readily recognize these structures and pull them inside. In this case, Mirkin’s team chemically incorporated the chemotherapy molecules into the DNA strands themselves, creating a drug that cancer cells naturally absorb.

“Most cells have scavenger receptors on their surfaces,” Mirkin explained. “But myeloid cells overexpress these receptors, so there are even more of them. If they recognize a molecule, then they will pull it into the cell. Instead of having to force their way into cells, SNAs are naturally taken up by these receptors.”

Once inside, enzymes break down the DNA shell, releasing the chemotherapy payload directly into the cancer cell. This structural redesign completely changed how 5-Fu interacted with leukemia cells, dramatically increasing its effectiveness.

Precision Targeting With Minimal Harm

In mouse models, the new therapy nearly eliminated leukemia cells in the blood and spleen while significantly extending survival time. Because the SNAs selectively targeted AML cells, healthy tissues remained unharmed.

[…]

Story Source:

Materials provided by Northwestern University. Note: Content may be edited for style and length.


Journal Reference:

  1. Taokun Luo, Young Jun Kim, Zhenyu Han, Jeongmin Hwang, Sneha Kumari, Vinzenz Mayer, Alex Cushing, Roger A. Romero, Chad A. Mirkin. Chemotherapeutic Spherical Nucleic Acids. ACS Nano, 2025; DOI: 10.1021/acsnano.5c16609

Source: Nanotech makes cancer drug 20,000x stronger, without side effects | ScienceDaily

Epic and Google agree to settle their lawsuit and change Android’s fate globally

Just when we thought Epic v. Google might be over, just one Supreme Court rejection away from a complete victory for Epic, both sides have agreed to settle Tuesday evening. And if Judge James Donato, who ordered Google to crack open Android for third-party stores, agrees to the changes, it might turn Epic’s victory into a lasting global one.

Previously, Judge Donato agreed to some of Epic’s biggest demands. He issued a permanent injunction that will force Google to carry rival app stores within its own Google Play Store, and give those rival stores access to the full catalog of Google Play apps, to restore competition to the Android marketplace. The injunction also forced Google to stop requiring developers to use Google Play Billing, after a jury found the company had illegally tied its app store to its payments system.

But those changes only applied to the United States, only lasted for three years, and didn’t change how much Google would charge in app store fees.

Now, instead, Google is agreeing to reduce its standard fee to 20 percent or 9 percent, depending on the kind of transaction and when an app was first installed. It’s agreeing to create a new program in the very next version of Android where alternative app stores can register with Google and (theoretically) become first-class citizens that users can easily install. And it appears to be agreeing to offer “Registered App Stores” and lower fees around the world, not just in the US, lasting through June 2032 — six and a half years instead of just three.

[…]

The details of how, when, and where Google would charge its fees are complicated, and depend on when the app was installed. The “new service fee model would apply to new installs,” Google spokesperson Dan Jackson tells The Verge, and the proposal suggests it would only apply to apps installed after October 2025.

The details also seem to be somewhat tailored to the needs of a game developer like Epic Games. Google can charge 20 percent for an in-app purchase that provides “more than a de minimis gameplay advantage,” for example, or 9 percent if the purchase does not. And while 9 percent sounds like it’s also the cap for apps and in-app subscriptions sold through Google Play, period, the proposal notes that that amount doesn’t include Google’s cut for Play Billing if you buy it through that payment system.

That cut will be 5 percent, Jackson tells The Verge, confirming that “This new proposed model introduces a new, lower fee structure for developers in the US and separates the service fee from fees for using Google Play Billing.” (For reference, Google currently charges 15 percent for subscriptions, 15 percent of the first $1M of developer revenue each year and 30 percent after that, though it also cuts special deals with some big developers.)

If you use an alternative payment system, Google might still get a cut: “the Google Play store is free to assess service fees on transactions, including when developers elect to use alternative billing mechanisms,” the proposal reads. But it sounds like that may not happen in practice: “If the user chooses to pay through an alternative billing system, the developer pays no billing fee to Google,” Jackson tells The Verge.

According to the document, Google would theoretically even be able to get its cut when you click out to an app developer’s website and pay for the app there, as long as it happens within 24 hours.

[…]

“Starting with a version of the next major Android release through June 30, 2032, Google will modify future versions of the Android operating system so that a user can install a Registered App Store from a website by clicking on a single store install screen using neutral language. This will also grant the permission to the store to install apps,” the proposal reads.

The proposed modified injunction keeps many of Epic’s other wins in place, including ones that are already in effect today: it has to stop sharing money or perks with phonemakers, carriers, and app developers in exchange for Google Play exclusivity or preinstallation, and let developers communicate with their customers about pricing outside the Play Store.

Google and Epic say they will discuss this proposal with the judge on Thursday, November 6th.

[…]

Source: Epic and Google agree to settle their lawsuit and change Android’s fate globally | The Verge

Of course, you have no idea what Google will charge to add an appstore. Apple’s costs are in the millions of dollars.

Post-heist reports reveal the password for the Louvre’s video surveillance was ‘Louvre,’ and suddenly the dumpster-tier opsec of videogame NPCs seems a lot less absurd

The air of criminal mystique has been dispelled somewhat in the weeks following the October 18 heist that saw $102 million of crown jewels stolen from the Louvre in broad daylight. The suspects fumbled an entire crown during their escape, before trying and failing to light their mechanical lift on fire as a diversionary tactic. Arsène Lupin would be appalled.

How exactly, then, did the most renowned gallery in France find itself pillaged by a cadre of buffoons in high visibility vests? Reporting from French newspaper Libération indicates the theft is less of an anomaly than we might expect, as the Louvre has suffered from over a decade of glaring security oversights and IT vulnerabilities.

(Image credit: Cass Marshall via Bluesky)

As Rogue cofounder and former Polygon arch-jester Cass Marshall notes on Bluesky, we owe a lot of videogame designers an apology. We’ve spent years dunking on the emptyheadedness of game characters leaving their crucial security codes and vault combinations in the open for anyone to read, all while the Louvre has been using the password “Louvre” for its video surveillance servers.

That’s not an exaggeration. Confidential documents reviewed by Libération detail a long history of Louvre security vulnerabilities, dating back to a 2014 cybersecurity audit performed by the French Cybersecurity Agency (ANSSI) at the museum’s request. ANSSI experts were able to infiltrate the Louvre’s security network to manipulate video surveillance and modify badge access.

“How did the experts manage to infiltrate the network? Primarily due to the weakness of certain passwords which the French National Cybersecurity Agency (ANSSI) politely describes as ‘trivial,'” writes Libération’s Brice Le Borgne via machine translation. “Type ‘LOUVRE’ to access a server managing the museum’s video surveillance, or ‘THALES’ to access one of the software programs published by… Thales.”

(Image credit: Starbreeze)

The museum sought another audit from France’s National Institute for Advanced Studies in Security and Justice in 2015. Concluded two years later, the audit’s 40 pages of recommendations described “serious shortcomings,” “poorly managed” visitor flow, rooftops that are easily accessible during construction work, and outdated and malfunctioning security systems.

Later documents indicate that, in 2025, the Louvre was still using security software purchased in 2003 that is no longer supported by its developer, running on hardware using Windows Server 2003.

When the safeguards for France’s crown jewels are two decades out of date, maybe we could all afford to go a little easier on the absurdity of hacking minigames, password post-it notes and extremely stealable keycards. Heists, it seems, aren’t actually all that hard.

Source: Post-heist reports reveal the password for the Louvre’s video surveillance was ‘Louvre,’ and suddenly the dumpster-tier opsec of videogame NPCs seems a lot less absurd | PC Gamer

Hacking Buttons Back Into The Car Stereo

To our younger readers, a car without an all-touchscreen “infotainment” system may look clunky and dated, but really, you kids don’t know what they’re missing. Buttons, knobs, and switches all offer a level of satisfying tactility and feedback that touchscreens totally lack. [Garage Builds] on YouTube agrees; he also doesn’t like the way his aftermarket Kenwood head unit looks in his 2004-vintage Nissan. That’s why he decided to take matters into his own hands, and hack the buttons back on.

Rather than source a vintage stereo head unit, or try and DIY one from scratch, [Garage Builds] has actually hidden the modern touchscreen unit behind a button panel. That button panel is actually salvaged from the stock stereo, so the looks fit the car. The stereo’s LCD gets replaced with a modern color unit, but otherwise it looks pretty stock at the end.

Adding buttons to the Kenwood is all possible thanks to steering-wheel controls. In order to make use of those, the touchscreen head unit came with a little black box that translated the button press into some kind of one-wire protocol that turned out to be an inverted and carrier-less version of the NEC protocol used in IR TV remotes. (That bit of detective work comes from [michaelb], who figured all this out for his Ford years ago, but [Garage Builds] is also sharing his code on GitHub.)

Having the protocol, it simply becomes a matter of grabbing a microcontroller to scan the stock buttons and output the necessary codes to the Kenwood head unit. Of course now he has extra buttons, since the digital head unit has no tape or CD changer to control, nor AM/FM radio to tune. Those get repurposed for the interior and exterior RGB lighting [Garage Builds] has ̶i̶n̶f̶l̶i̶c̶t̶e̶d̶  mounted on this ̶p̶o̶o̶r̶ lovely car. (There’s no accounting for taste. Some of us love the look and some hate it, but he’s certainly captured an aesthetic, and now has easy control of it to boot.) [Garage Builds] has got custom digital gauges to put into the dash of his Nissan, and some of the extra buttons have been adapted to control those, too.

The whole car is actually a rolling hack as you can see from the back catalog of the [Garage Builds] YouTube channel, which might be worth a look if you’re in the intersection of the “electronics enthusiast” and “gearhead” Venn Diagram.

There’s no accounting for taste, but we absolutely agree with him that making everything black rectangles is the death of industrial design.

This isn’t the first time we’ve seen retro radios hacked together with micro-controllers; take a look at this one from a 1970s Toyota. Now that’s vintage!

Source: Hacking Buttons Back Into The Car Stereo | Hackaday

Billy B-Assistant AI Fish

The Billy Bass Assistant is a Raspberry Pi–powered voice assistant embedded inside a Big Mouth Billy Bass Animatronic. It streams conversation using the OpenAI Realtime API, turns its head, flaps it’s tail and moves his mouth based on what he is saying.

This project is still in BETA. Things might crash, get stuck or make Billy scream uncontrollably (ok that last part maybe not literally but you get the point). Proceed with fishy caution.

Billy Bathroom
Billy UI
Billy UI Mobile

Features

  • Realtime conversations using OpenAI Realtime API
  • Personality system with configurable traits (e.g., snark, charm)
  • Physical button to start/interact/intervene
  • 3D-printable backplate for housing USB microphone and speaker
  • Support for the Modern Billy hardware version with 2 motors as well as the Classic Billy hardware version (3 motors)
  • Lightweight web UI:
    • Adjust settings and persona of Billy
    • View debug logs
    • Start/stop/restart Billy
    • Export/Import of settings and persona
    • Hostname and Port configuration
  • MQTT support:
    • sensor with status updates of Billy (idle, speaking, listening)
    • billy/say topic for triggering spoken messages remotely
    • Raspberry Pi Safe Shutdown command
  • Home Assistant command passthrough using the Conversation API
  • Custom Song Singing and animation mode

Source: billy-b-assistant (Github)

72% of game developers say Steam is effectively a PC gaming monopoly

Steam’s longstanding dominance in the PC gaming market often raises questions about how close it is to exercising monopoly power. Although the storefront does not meet the technical definition of a monopoly, many developers are concerned about their reliance on Valve’s platform.

In a survey of over 300 executives from large US and UK game companies, 72% either slightly or strongly agreed that Steam constitutes a monopoly over PC games. Furthermore, 88% said that at least three-quarters of their revenue came from Steam, while 37% reported that the platform accounted for 90% of their total revenue.

Steam is by far the largest PC game distribution service, having recently exceeded 41 million concurrent users. Many customers are so adamant about only purchasing games through Steam that the industry’s largest publishers, including EA, Ubisoft, and even Microsoft, have tried – and failed – to withhold their titles from the service.

Still, Steam does not technically control the entire market. The Epic Games Store and the Windows Store are attempting to compete using free game giveaways, Microsoft’s Game Pass subscription service, and lower sales commissions, but they remain far less popular than Steam. Meanwhile, alternative storefronts such as GOG and itch.io have carved out a niche by focusing on indie and retro titles. Moreover, some of the most popular PC games, such as Fortnite, Minecraft, League of Legends, and World of Warcraft, are not available on Steam.

Despite these caveats, Steam has previously drawn accusations of using its dominant market position to control pricing – a key sign of monopoly power. Last year, a class-action lawsuit started by Wolfire Games decried the store’s standard 30 percent revenue cut and alleged that Steam discouraged companies from lowering prices on stores that took smaller sales commissions.

Atomik Research conducted the recent survey on behalf of Rokky, a company that helps game publishers minimize the impact of grey market key resellers on prices. In addition to opinions on Steam, developers also answered questions about the PC market’s biggest challenges.

The increasing popularity of free-to-play games such as Fortnite, DOTA 2, Counter-Strike 2, Call of Duty: Warzone, and Roblox topped the list of concerns for 40% of respondents. Approximately a third mentioned market saturation and discoverability, echoing data that suggests there aren’t enough players for the thousands of new titles released on Steam each year. A similar portion of survey respondents also expressed concerns regarding subscription services.

Source: 72% of game developers say Steam is effectively a PC gaming monopoly | TechSpot

A monopoly is still a monopoly if there are other players in the market, especially if they are so much smaller. However should there be only a small amount of equal players in the market, the dangers are the same, due to risks of collusion and price fixing as well as only having one other competitor to watch.

DHS wants more biometric data from more people – even from citizens

If you’re filing an immigration form – or helping someone who is – the Feds may soon want to look in your eyes, swab your cheek, and scan your face. The US Department of Homeland Security wants to greatly expand biometric data collection for immigration applications, covering immigrants and even some US citizens tied to those cases.

DHS, through its component agency US Citizenship and Immigration Services, on Monday proposed a sweeping expansion of the agency’s collection of biometric data. While ostensibly about verifying identities and preventing fraud in immigration benefit applications, the proposed rule goes much further than simply ensuring applicants are who they claim to be.

First off, the rule proposes expanding when DHS can collect biometric data from immigration benefit applicants, as “submission of biometrics is currently only mandatory for certain benefit requests and enforcement actions.” DHS wants to change that, including by requiring practically everyone an immigrant is associated with to submit their biometric data.

“DHS proposes in this rule that any applicant, petitioner, sponsor, supporter, derivative, dependent, beneficiary, or individual filing or associated with a benefit request or other request or collection of information, including U.S. citizens, U.S. nationals and lawful permanent residents, and without regard to age, must submit biometrics unless DHS otherwise exempts the requirement,” the rule proposal said.

DHS also wants to require the collection of biometric data from “any alien apprehended, arrested or encountered by DHS.”

It’s not explicitly stated in the rule proposal why US citizens associated with immigrants who are applying for benefits would have to have their biometric data collected. DHS didn’t answer questions to that end, though the rule stated that US citizens would also be required to submit biometric data “when they submit a family-based visa petition.”

Give me your voice, your eye print, your DNA samples

In addition to expanded collection, the proposed rule also changes the definition of what DHS considers to be valid biometric data.

“Government agencies have grouped together identifying features and actions, such as fingerprints, photographs, and signatures under the broad term, biometrics,” the proposal states. “DHS proposes to define the term ‘biometrics’ to mean ‘measurable biological (anatomical, physiological or molecular structure) or behavioral characteristics of an individual,'” thus giving DHS broad leeway to begin collecting new types of biometric data as new technologies are developed.

The proposal mentions several new biometric technologies DHS wants the option to use, including ocular imagery, voice prints and DNA, all on the table per the new rule.

[…]

Source: DHS wants more biometric data – even from citizens • The Register

Body Illusion Helps Unlock Memories

A new study suggests that briefly changing the way people see their own bodies can make it easier to recall autobiographical memories, including some from early childhood.

Published in Scientific Reports, part of the Nature journal group, the research is the first to show that adults can access early memories more effectively after temporarily viewing themselves with a childlike version of their own face.

How the “Enfacement Illusion” Reconnects Mind and Body

Neuroscientists at Anglia Ruskin University (ARU) in Cambridge led the study, which involved 50 adult volunteers. The experiment used what is known as an “enfacement illusion,” a technique that helps people feel as though another face they see on a screen is actually their own reflection.

Each participant watched a live video of their own face that was digitally modified with an image filter to resemble how they might have looked as a child. As participants moved their heads, the on-screen image mirrored their movements, creating the sensation that the childlike face was truly theirs. A control group experienced the same setup but viewed their unaltered adult faces.

After completing the illusion, participants were asked to take part in an autobiographical memory interview designed to prompt recollections from both their early life and the previous year.

A Clear Boost in Childhood Memory Recall

Researchers measured how much detail participants included when describing their episodic autobiographical memories. These are the kinds of memories that allow a person to mentally relive past experiences and “travel back in time” within their own mind.

The findings revealed that people who saw the younger version of themselves remembered significantly more detailed events from childhood than those who saw their regular adult face. The results provide the first evidence that subtle changes in bodily self-perception can influence how deeply we access distant memories.

[…]

“All the events that we remember are not just experiences of the external world, but are also experiences of our body, which is always present.

“We discovered that temporary changes to the bodily self, specifically, embodying a childlike version of one’s own face, can significantly enhance access to childhood memories. This might be because the brain encodes bodily information as part of the details of an event. Reintroducing similar bodily cues may help us retrieve those memories, even decades later.”

Reimagining the Self to Revisit the Past

Senior author Professor Jane Aspell, head of the Self & Body Lab at Anglia Ruskin University, added: “When our childhood memories were formed, we had a different body. So we wondered: if we could help people experience aspects of that body again, could we help them recall their memories from that time?

“Our findings suggest that the bodily self and autobiographical memory are linked, as temporary changes to bodily experience can facilitate access to remote autobiographical memories.

[…]

Journal Reference:

  1. Utkarsh Gupta, Peter Bright, Alex Clarke, Waheeb Zafar, Pilar Recarte-Perez, Jane E. Aspell. Illusory ownership of one’s younger face facilitates access to childhood episodic autobiographical memories. Scientific Reports, 2025; 15 (1) DOI: 10.1038/s41598-025-17963-6

Source: Scientists find mind trick that unlocks lost memories | ScienceDaily

Cavities could be prevented by a gel that restores tooth enamel

[…] developed a gel containing a modified version of a protein that they manipulated to act like amelogenin, a protein that helps guide the growth of our enamel when we are infants.

Experiments that involved pasting the gel onto human teeth under a microscope in solutions containing calcium and phosphate – the primary building blocks of enamel – show that it creates a thin and robust layer that stays on teeth for a few weeks, even during brushing.

The gel fills holes and cracks, creating a scaffold that uses the calcium and phosphate to promote the organised growth of new crystals in the enamel below the gel layer, even when so much was gone that the underlying dentine below was exposed.

“The gel was able to grow crystals epitaxially, which means it’s in the same crystallographic orientation as existing enamel,” says Mata.

That orientation means that the new growth – which reached up to 10 micrometres thick – is integrated into the underlying natural tissue, rebuilding the structure and properties of enamel. “The growth actually happens within a week,” says Mata. The process also worked when using donated saliva, which also naturally contains calcium and phosphate, rather than just in the solution the team used that comprised these chemicals.

 

Electron microscopy images of a tooth with demineralised enamel showing eroded crystals (left) and a similar demineralised tooth after a 2-week gel treatment showing epitaxially regenerated enamel crystals (right)

Electron microscopy images of a tooth with demineralised enamel showing eroded crystals (left) and a similar demineralised tooth after two weeks of treatment with the gel, showing epitaxially regenerated enamel crystals (right)

Professor Alvaro Mata, University of Nottingham

 

A similar approach was reported in 2019, but that produced thinner coatings, and the recovery of the architecture of inner layers of enamel was only partial.

Clinical trials in people are set for early next year. Mata has also launched a company called Mintech-Bio and hopes to have a first product out towards the end of 2026, which he sees dentists using.

 

Journal reference:

Nature Communications DOI: 10.1038/s41467-025-64982-y

Source: Cavities could be prevented by a gel that restores tooth enamel | New Scientist

Ukraine First To Demo Open Source Security Platform To Help Secure Power Grid

[A massive power outage in April left tens of millions across Spain, Portugal, and parts of France without electricity for hours due to cascading grid failures, exposing how fragile and interconnected Europe’s energy infrastructure is. The incident, though not a cyberattack, reignited concerns about the vulnerability of aging, fragmented, and insecure operational technology systems that could be easily exploited in future cyber or ransomware attacks.] This headache is one the European Commission is focused on. It is funding several projects looking at making electric grids more resilient, such as the eFort framework being developed by cybersecurity researchers at the independent non-profit Netherlands Organisation for Applied Scientific Research (TNO) and the Delft University of Technology (TU Delft).

TNO’s SOARCA tool is the first ever open source security orchestration, automation and response (SOAR) platform designed to protect power plants by automating the orchestration of the response to physical attacks, as well as cyberattacks, on substations and the network, and the first country to demo it will be the Ukraine this year. At the moment, SOAR systems only exist for dedicated IT environments. The researchers’ design includes a SOAR system in each layer of the power station: the substation, the control room, the enterprise layer, the cloud, or the security operations centre (SOC), so that the SOC and the control room work together to detect anomalies in the network, whether it’s an attacker exploiting a vulnerability, a malicious device being plugged into a substation, or a physical attack like a missile hitting a substation. The idea is to be able to isolate potential problems and prevent lateral movement from one device to another or privilege escalation, so an attacker cannot go through the network to the central IT management system of the electricity grid. […]

The SOARCA tool is underpinned by CACAO Playbooks, an open source specification developed by the OASIS Open standards body and its members (which include lots of tech giants and US government agencies) to create standardized predefined, automated workflows that can detect intrusions and changes made by malicious actors, and then carry out a series of steps to protect the network and mitigate the attack. Experts largely agree the problem facing critical infrastructure is only worsening as years pass, and the more random Windows implementations that are added into the network, the wider the attack surface is. […] TNO’s Wolthuis said the energy industry is likely to be pushed soon to take action by regulators, particularly once the Network Code on Cybersecurity (NCCS), which lays out rules requiring cybersecurity risk assessments in the electricity sector, is formalized.

Source: Ukraine First To Demo Open Source Security Platform To Help Secure Power Grid

Music festivals to collect data with RFID wristbands. Also, randomly, fascinating information about data Flitsmeister collects.

This summer, Dutch music festivals will use RFID wristbands to collect visitor data. The technology has been around for a while, but the innovation lies in its application. The wristbands are anonymous by default, but users can activate them to participate in loyalty programs or unlock on-site experiences.Visitor privacy is paramount; overly invasive tracking is avoided.

This is according to Michael Guntenaar, Managing Director at Superstruct Digital Services, in the Emerce TV video ‘Data is the new headliner at dance festivals’. Superstruct is a network of approximately 80 large festivals (focused on experience and brand identity) spread across Europe and Australia. ID&T, known for events such as Sensation, Mysteryland, and Defqon.1, joined Superstruct in September 2021. Tula Daans, Data Analyst Brand Partnerships at ID&T, also joined on behalf of ID&T.

Festivals use various data sources, primarily ticket data (age, location, gender/gender identity), but also marketing data (social media), consumption data (food and drinks), and post-event surveys.

For brand partnerships, surveys are sent to visitors after the event to gauge whether they saw brands, what they thought of them, and thus gain insight into brand perception. Deliberately, no detailed feedback is requested during the festival to avoid disturbing the visitor experience, says Guntenaar.

The Netherlands is a global leader in data collection. Defqon.1 is mentioned as a breeding ground for experiments with data and technology, due to its technically advanced team and highly engaged target group.

[…]

In a second video, ‘Real-time mobility info in a complex data landscape’, Jorn de Vries, managing director at Flitsmeister, talks about mobility data and the challenges and opportunities within this market. The market for mobility data, which ranges from traffic flows to speed camera notifications, is busy with players like Garmin, Google, Waze, and TomTom.

Nevertheless, Flitsmeister still sees room for growth, because mobility is timeless and brings challenges, such as the desire to get from A to B quickly, efficiently, green, and cheaply. Innovation is essential to maintain a place in this market, says De Vries.

Flitsmeister has a large online community of almost 3 million monthly active users. This community has grown significantly over the years, even after introducing paid propositions. What distinguishes Flitsmeister from global players such as Google and Waze, according to De Vries, is their local embeddedness, with marketing and content that aligns with the language and use cases of users in the Benelux. They also collaborate with governments through partnerships, allowing them to offer specific local services, such as warnings for emergency services. Technically, competitors might be able to do this, says De Vries, but it probably isn’t a high priority because it’s local; Flitsmeister, however, believes that you have to dare to go all the way to properly serve a market, even if this requires investments that are only relevant for the Netherlands. Another example of local embeddedness is their presence on almost every radio station.

The Flitsmeister app now consists of eight main uses. In addition to the well-known speed cameras and track control, it includes warnings for emergency services (ambulance, fire brigade, Rijkswaterstaat vehicles) who are informed early when such a vehicle approaches with blue lights. The app also provides traffic jam information and warnings for incidents, stationary vehicles, and roadworks. Flitsmeister tries to give warnings for the start of traffic jams earlier than the flashing signs above the road, because they are not bound by the gantries where these signs are located.

Navigation is an added feature. In addition, there is paid parking at the end of the journey. Flitsmeister also has links with so-called smart traffic lights, where they receive data about the status of the light and share data with the intersection to optimize it. This can, for example, lead to a green light if you approach an intersection at night and there is no other traffic. More than 1500 smart intersections in the Netherlands are already equipped. Flitsmeister also receives data from matrix signs, including red crosses, arrows, and adjusted maximum speeds.

Privacy is a crucial topic when bringing consumers and data together. Flitsmeister has seen privacy from the start as a Unique Selling Point (USP) if handled correctly. Especially in countries like Germany, this is more active than in the Benelux, and privacy-friendly companies have a plus in the eyes of the consumer. Large players such as Google and Waze have the same legal playing field as Flitsmeister, but differ in what they want, can, and do.

Flitsmeister does collect live GPS data that provides a lot of insight into traffic movements. They are working with Rijkswaterstaat and their parent company Bmobile on pilots, including on the A9, where they combine loop data in the asphalt with their real-time data. This provides a more accurate and cost-efficient picture than road loops alone, which are expensive to maintain and measure limitedly. This combination allows them to provide relevant information, even between the road loops, leading to more accurate and cost-efficient traffic information.

Flitsmeister also works with data that detects real-time situations and provides early advice. They are doing pilots with ‘trigger based rerouting’, where users are proactively rerouted if a reported incident on their route is likely to affect their travel time, even if the travel time has not yet changed at that moment. The challenge here is that people must be receptive to this and understand the rationale behind the rerouting.

Although there is a lot of talk about connected vehicle data, Flitsmeister’s focus is more on strengthening the relationship with the driver than with the vehicle itself. Jorn de Vries believes that the driver will ultimately lead, as the need for mobility comes from the individual and the vehicle facilitates this.

The video Data is the new headliner at dance festivals can be watched for free. The collection Customer data: trends, innovation and future will be supplemented in the coming months and can be viewed for free after registration.

Source: Kagi Translate |(Emerce TV): music festivals want to collect data with RFID wristbands

Symbolic Strength More Important Than Facts When It Comes To Misinformation

Why do some people endorse claims that can easily be disproved? It’s one thing to believe false information, but another to actively stick with something that’s obviously wrong.

Our new research, published in the Journal of Social Psychology, suggests that some people consider it a “win” to lean in to known falsehoods.

We are social psychologists who study political psychology and how people reason about reality. During the pandemic, we surveyed 5,535 people across eight countries to investigate why people believed COVID-19 misinformation, like false claims that 5G networks cause the virus.

The strongest predictor of whether someone believed in COVID-19-related misinformation and risks related to the vaccine was whether they viewed COVID-19 prevention efforts in terms of symbolic strength and weakness. In other words, this group focused on whether an action would make them appear to fend off or “give in” to untoward influence.

This factor outweighed how people felt about COVID-19 in general, their thinking style and even their political beliefs.

Our survey measured it on a scale of how much people agreed with sentences including “Following coronavirus prevention guidelines means you have backed down” and “Continuous coronavirus coverage in the media is a sign we are losing.” Our interpretation is that people who responded positively to these statements would feel they “win” by endorsing misinformation – doing so can show “the enemy” that it will not gain any ground over people’s views.

When meaning is symbolic, not factual

Rather than consider issues in light of actual facts, we suggest people with this mindset prioritize being independent from outside influence. It means you can justify espousing pretty much anything – the easier a statement is to disprove, the more of a power move it is to say it, as it symbolizes how far you’re willing to go.

When people think symbolically this way, the literal issue – here, fighting COVID-19 – is secondary to a psychological war over people’s minds. In the minds of those who think they’re engaged in them, psychological wars are waged over opinions and attitudes, and are won via control of belief and messaging. The U.S. government at various times has used the concept of psychological war to try to limit the influence of foreign powers, pushing people to think that literal battles are less important than psychological independence.

By that same token, vaccination, masking or other COVID-19 prevention efforts could be seen as a symbolic risk that could “weaken” one psychologically even if they provide literal physical benefits. If this seems like an extreme stance, it is – the majority of participants in our studies did not hold this mindset. But those who did were especially likely to also believe in misinformation.

In an additional study we ran that focused on attitudes around cryptocurrency, we measured whether people saw crypto investment in terms of signaling independence from traditional finance. These participants, who, like those in our COVID-19 study, prioritized a symbolic show of strength, were more likely to believe in other kinds of misinformation and conspiracies, too, such as that the government is concealing evidence of alien contact.

In all of our studies, this mindset was also strongly associated with authoritarian attitudes, including beliefs that some groups should dominate others and support for autocratic government. These links help explain why strongman leaders often use misinformation symbolically to impress and control a population.

Why people endorse misinformation

Our findings highlight the limits of countering misinformation directly, because for some people, literal truth is not the point.

For example, President Donald Trump incorrectly claimed in August 2025 that crime in Washington D.C. was at an all-time high, generating countless fact-checks of his premise and think pieces about his dissociation from reality.

But we believe that to someone with a symbolic mindset, debunkers merely demonstrate that they’re the ones reacting, and are therefore weak. The correct information is easily available, but is irrelevant to someone who prioritizes a symbolic show of strength. What matters is signaling one isn’t listening and won’t be swayed.

In fact, for symbolic thinkers, nearly any statement should be justifiable. The more outlandish or easily disproved something is, the more powerful one might seem when standing by it. Being an edgelord – a contrarian online provocateur – or outright lying can, in their own odd way, appear “authentic.”

Some people may also view their favorite dissembler’s claims as provocative trolling, but, given the link between this mindset and authoritarianism, they want those far-fetched claims acted on anyway. The deployment of National Guard troops to Washington, for example, can be the desired end goal, even if the offered justification is a transparent farce.

Is this really 5-D chess?

It is possible that symbolic, but not exactly true, beliefs have some downstream benefit, such as serving as negotiation tactics, loyalty tests, or a fake-it-till-you-make-it long game that somehow, eventually, becomes a reality. Political theorist Murray Edelman, known for his work on political symbolism, noted that politicians often prefer scoring symbolic points over delivering results – it’s easier. Leaders can offer symbolism when they have little tangible to provide.

Randy Stein is Associate Professor of Marketing, California State Polytechnic University, Pomona and Abraham Rutchick is Professor of Psychology, California State University, Northridge. This article is republished from The Conversation under a Creative Commons license. Read the original article.

Source: Symbolic Strength More Important Than Facts When It Comes To Misinformation | Techdirt

Linux finally cracks 3% on Steam – 50% more users in 1 year. Maybe people are getting really really pissed at Microsoft.

In isolation, the numbers aren’t all that impressive. Linux usage is at 3.05 percent, up 0.37 percentage points from last month. However, it’s a significant uptick compared to the October 2024 results, which showed Linux usage at exactly two percent, up a mere 0.13 percentage points. It’s also up about 0.4 percentage points from the August survey numbers.

Yes, only a bit over one percentage point in a year – but compared to the total user numbers, that’s roughly a 50 percent jump. Adding half again to your market share in a year isn’t bad going. Keep this up and soon, you’re talking real mon— oh, wait, free software. Never mind.

Coupled with this is another bit of analysis of the Steam-on-Linux market from Linux gaming site Boiling Steam, which reported that by the end of October 2025, Windows games’ compatibility on Linux is at an all-time high. It buries the lede a little, but it gets there eventually:

the amount of games that refuse to launch is … getting very close to just 10%. This means that close to 90% of Windows games manage to launch on Linux.

Now, to be fair, just because a game launches doesn’t mean it runs well enough to play – it might start but still be unplayable for all sorts of reasons: being unusably slow, suffering from stutter or lag, showing graphics corruption, or constantly crashing. We’ve also read that some multiplayer games use anti-cheat measures that run at a low level and talk directly to the Windows OS – something emulation probably can’t fix in the foreseeable future. Even so, though, being able to run is a good start. It can be the point where a vendor starts troubleshooting what’s wrong, as opposed to telling customers something simply isn’t compatible.

This can’t simply be attributed to the Steam Deck. The Register reported on that way back in 2021, so it’s no longer new and shiny. There is other, newer SteamOS gadgetry, though. In January, Lenovo announced the first handheld officially licensed to ship with Valve’s SteamOS, the Lenovo Legion Go S. However, that officially went on sale back in May, so it’s a little too early to judge its impact.

It’s almost as if something happened earlier in October to make loads of people try out Linux. What an enduring mystery for the ages

Source: Linux finally cracks 3% on Steam • The Register

Or maybe something to do with: No account? No Windows 11 for you, says Microsoft

Manufacturer Remotely Bricks Smart Vacuum After Its Owner Blocked It From Collecting Data

“An engineer got curious about how his iLife A11 smart vacuum worked and monitored the network traffic coming from the device,” writes Tom’s Hardware.

“That’s when he noticed it was constantly sending logs and telemetry data to the manufacturer — something he hadn’t consented to.” The user, Harishankar, decided to block the telemetry servers’ IP addresses on his network, while keeping the firmware and OTA servers open. While his smart gadget worked for a while, it just refused to turn on soon after… He sent it to the service center multiple times, wherein the technicians would turn it on and see nothing wrong with the vacuum. When they returned it to him, it would work for a few days and then fail to boot again… [H]e decided to disassemble the thing to determine what killed it and to see if he could get it working again…

[He discovered] a GD32F103 microcontroller to manage its plethora of sensors, including Lidar, gyroscopes, and encoders. He created PCB connectors and wrote Python scripts to control them with a computer, presumably to test each piece individually and identify what went wrong. From there, he built a Raspberry Pi joystick to manually drive the vacuum, proving that there was nothing wrong with the hardware. From this, he looked at its software and operating system, and that’s where he discovered the dark truth: his smart vacuum was a security nightmare and a black hole for his personal data.

First of all, it’s Android Debug Bridge, which gives him full root access to the vacuum, wasn’t protected by any kind of password or encryption. The manufacturer added a makeshift security protocol by omitting a crucial file, which caused it to disconnect soon after booting, but Harishankar easily bypassed it. He then discovered that it used Google Cartographer to build a live 3D map of his home. This isn’t unusual, by far. After all, it’s a smart vacuum, and it needs that data to navigate around his home. However, the concerning thing is that it was sending off all this data to the manufacturer’s server. It makes sense for the device to send this data to the manufacturer, as its onboard SoC is nowhere near powerful enough to process all that data. However, it seems that iLife did not clear this with its customers.

Furthermore, the engineer made one disturbing discovery — deep in the logs of his non-functioning smart vacuum, he found a command with a timestamp that matched exactly the time the gadget stopped working. This was clearly a kill command, and after he reversed it and rebooted the appliance, it roared back to life.

Source: Manufacturer Remotely Bricks Smart Vacuum After Its Owner Blocked It From Collecting Data

Innovative paint cools homes and harvests fresh water from air

Researchers at the University of Sydney and commercial start-up Dewpoint Innovations have created a nano-engineered polymer coating that not only reflects up to 97% of the sun’s rays, but also passively collects water. In tests, it was able to keep indoors up to 6 °C (~11 °F) cooler than the air outside.

That temperature differential results in water vapor condensing on the surface – like the fogging on a cold mirror – producing a steady trickle of droplets.

In trials on the roof of the Sydney Nanoscience Hub, the coating captured dew more than 30% of the year, generating as much as 390 mL of water per square meter (roughly 13 fluid ounces per 10.8 square feet) daily. This might not sound like a lot, but a 12-sq-m (about 129-sq-ft) section of treated roof could produce around 4.7 L (around 1.25 US gallons) of water per day under optimal conditions.

Most houses have a lot more roof than that. “Over an average residential roof,” reads the Dewpoint website, “you can expect enough water per day to cover your basic water needs.” That’s in addition, mind you, to the rainwater you’d be collecting as well, since you do need to have a typical rainwater collection system installed to capture the dew. In Sydney for example, assuming an average annual rainfall around 1 m (3.3 ft), The Tank Factory tells us we could expect to collect somewhere around 6 times more rainwater than condensation – but that equation would certainly look very different in drier areas.

[…]

The team has recently finished up a six-month outdoor trial, with panels featuring the polymer paint-like coating set up on the roof of the Sydney Nanoscience Hub building. During this period, minute-by-minute data was collected on the coating’s cooling and water collection abilities, and found that dew could be collected over 32% of the year, suggesting water could be harvested from the air during periods without rain. What’s more, the coating withstood the challenging test of the harsh Australian sun, and showed no signs of degradation over the six months.

Painted tiles being tested on the roof of the Sydney Nanoscience Hub
Painted tiles being tested on the roof of the Sydney Nanoscience Hub
University of Sydney

Most commercial white paints – especially those designed for exterior walls and roofs – use titanium dioxide as the primary pigment, which reflects UV light. However, while this novel coating may look like white paint on the surface, it gets its sun-shielding power through structure. The porous coating is made of polyvinylidene fluoride-co-hexafluoropropene (PVDF-HFP), so reflects the sun through microscopic pores. Those tiny air pockets scatter sunlight in all directions without glare and without the need of UV-absorbing chemicals that can degrade over time. The result is a self-cooling, weather-resistant film that was able to sustain its high performance throughout the lengthy testing phase.

[…]

Source: Innovative paint cools homes and harvests fresh water from air

Epic Games Goes down ahead of Fortnite Simpsons season, takes down all login services too

After a 5 hour scheduled downtime on just Fortnite for the launch of the Simpson collaboration on the 1st of November, the whole ecosystem went crashing down. Without login services, many of the games just cannot be played. This together with the IBM, Azure, AWS and Cloudflare crashes shows just how vulnerable you are when you are dependent on megalithic giants…
Nov 2, 2025
ResolvedThis incident has been resolved.
Nov 2, 03:20 UTC
UpdateWe are continuing to investigate this issue.
Nov 1, 21:08 UTC
InvestigatingWe’re investigating reports of players loading into matches without equipped Outfits, as well as other functionality issues like Locker loadouts, Party invites, and Friends Lists not working correctly.
We’re working to fix this ASAP and will let you know when we have.

Nov 1, 21:07 UTC
ResolvedThis incident has been resolved.
Nov 2, 03:20 UTC
InvestigatingWe’re investigating Fortnite login issues on all platforms. We’ll follow up here with an update once the issue is resolved.
Nov 1, 20:45 UTC
ResolvedThis incident has been resolved.
Nov 2, 03:20 UTC
InvestigatingWe’re investigating Fall Guys login issues on all platforms.

We’ll follow up here with an update once the issue is resolved.
Nov 1, 21:35 UTC

ResolvedThis incident has been resolved.
Nov 2, 03:19 UTC
InvestigatingWe are currently investigating this issue.
Nov 1, 22:02 UTC
ResolvedThis incident has been resolved.
Nov 2, 03:19 UTC
InvestigatingWe’re investigating Rocket League login issues on all platforms.

We’ll follow up here with an update once the issue is resolved.
Nov 1, 21:27 UTC

Nov 1, 2025
CompletedThe scheduled maintenance has been completed.
Nov 1, 20:43 UTC
In progressScheduled maintenance is currently in progress. We will provide updates as necessary.
Nov 1, 15:30 UTC
Scheduled⏰ Following the Welcome, Our Alien Overlords live event in Fortnite (Saturday, November 1st at 11 AM ET), Fortnite will go into downtime at 11:30 AM ET (3:30 PM UTC). The v38.00 update and the new Fortnite Season will release later the same day.
Oct 31, 15:07 UTC

Source: Epic Games Public Status

Porsche Files Patent App for Tunnel Mode, and It Sounds Like the Best Car Gimmick Yet

[…] The feature is exactly what it sounds like: It detects when you’re about to enter a tunnel, rolls down the windows, and downshifts while opening up the valves on the active exhaust. The whole idea is to let that heavenly flat-six sing as loud as it can while you and your passengers experience sore cheeks from all the smiling.

According to the patent application, which was first spotted by CarBuzz, there would actually be a second option for tunnel mode in convertibles. With the feature engaged, it would sense when a tunnel is coming up and prompt the driver to pull over so the roof can be lowered. Supposedly, it would also turn the heat on to counteract the cool breeze to make sure nothing stops you from hearing that howl at full tilt.

The patent filing makes a curious mention of Tunnel Mode for EVs. In that case, it sounds like a fake exhaust sound would be projected through the exterior speakers to make it seem like you’re in a gas car. Now, that’s kind of sad, but I’m not here to judge.

Tunnel Mode would supposedly tighten up the car’s steering while making the chassis behavior “sportier” for more enjoyable drives. That sounds nifty, considering everything returns to normal once you’re through the tunnel. You can be cruising with the steering and suspension in their comfort settings until you reach the sound tube, and after you’ve exited, the car’s camera system will relay the info so it’ll return to your previous configuration.

[…]

Source: Porsche Files Patent App for Tunnel Mode, and It Sounds Like the Best Car Gimmick Yet

Suspected Chinese snoops use 2017 unpatched Windows flaw to spy on EU politicians

Cyber spies linked to the Chinese government exploited a Windows shortcut vulnerability disclosed in March – but that Microsoft hasn’t fixed yet – to target European diplomats in an effort to steal defense and national security details.

Security firm Arctic Wolf attributed the espionage campaign to UNC6384 (aka Mustang Panda, Twill Typhoon), and in research published Thursday detailed how the suspected PRC spies used social engineering and the Windows flaw to deploy PlugX malware against personnel attending diplomatic conferences in September and October.

“This campaign demonstrates UNC6384’s capability for rapid vulnerability adoption within six months of public disclosure, advanced social engineering leveraging detailed knowledge of diplomatic calendars and event themes, and operational expansion from traditional Southeast Asia targeting to European diplomatic entities,” the Arctic Wolf Labs threat research team said.

[…]

Zero Day Initiative threat hunter Peter Girnus discovered and reported this flaw to Microsoft in March, and said it had been abused as a zero-day as far back as 2017, with 11 state-sponsored groups from North Korea, Iran, Russia, and China abusing ZDI-CAN-25373 for cyber espionage and data theft purposes.

Blame ZDI-CAN-25373

The attacks begin with phishing emails using very specific themed lures around European defense and security cooperation and cross-border infrastructure development. Those emails delivered a weaponized LNK file which exploited ZDI-CAN-25373 (aka CVE-2025-9491), a Windows shortcut vulnerability, to let the attackers secretly execute commands by adding whitespace padding within the LNK file’s COMMAND_LINE_ARGUMENTS structure.

The malicious files, such as one named Agenda_Meeting 26 Sep Brussels.lnk, use diplomatic conference themes as lures along with a decoy PDF document, in this case displaying a real European Commission meeting agenda on facilitating the free movement of goods at border crossing points between the EU and Western Balkan countries.

The LNK file, when executed, invokes PowerShell to decode and extract a tar (tape archive) archive containing three files to enable the attack chain via DLL side-loading, a malware delivery technique favored by several Chinese government crews, including Salt Typhoon.

DLL sideloading exploits the Windows DLL search order by tricking an application into loading a malicious DLL instead of the legitimate one.

The three files include a legitimate, but expired, Canon printer assistant utility with a valid digital signature issued by Symantec. Although the certificate expired in April 2018, Windows trusts binaries whose signatures include a valid timestamp, so this allows the attackers to bypass security tools and deliver malware using DLL sideloading.

The malicious DLL functions as a loader to decrypt and execute the third file in the archive, cnmplog.dat, which contains the encrypted PlugX payload.

PlugX, which has been around since at least 2008, is a Remote Access Trojan (RAT) that gives attackers all the remote access capabilities including command execution, keylogging, file uploading and downloading, persistent access, and system reconnaissance.

“This three-stage execution flow completes the deployment of PlugX malware running stealthily within a legitimate signed process, significantly reducing the likelihood of detection by endpoint security solutions,” the researchers wrote.

[…]

Source: Suspected Chinese snoops weaponize unpatched Windows flaw • The Register

‘Keep Android Open’ Campaign Pushes Back on Google’s Restrictions on installing your own software

A “Keep Android Open” campaign is pushing back on new rules from Google that will reportedly block users from sideloading apps on Android phones.

It’s unclear who’s running the campaign, but a blog post on the free Android app store F-Droid is directing users to visit the campaign’s website, which urges the public to lobby government regulators to intervene and stop the upcoming restrictions.

“Developers should have the right to create and distribute software without submitting to unnecessary corporate surveillance,” reads an open letter posted to the site.

In August, Google announced upcoming rules aimed at reducing the risk of malware infecting Android devices. It will require that all app installs on certified Android devices only occur if the developer has been verified by Google. For individual developers, this includes submitting an official ID, address, phone number, and paying a $25 fee.

Source: ‘Keep Android Open’ Campaign Pushes Back on Google’s Sideloading Restrictions | PCMag

Austria’s Ministry of Economy goes toward digital sovereignty, embraces Nextcloud

How do you modernize digital collaboration in government without losing control over your data?
Austria’s Federal Ministry for Economy, Energy and Tourism (BMWET) faced this challenge in 2024 – and decided to take a clear, pragmatic step toward digital sovereignty. Within just four months between Proof of Concept and rollout, the ministry went live with a secure Nextcloud environment, operated on its own infrastructure in Austria and designed to meet strict transparency and compliance requirements.

Why the ministry decided to act

The BMWET faced the challenge of modernizing its collaboration tools at a time when questions around data protection, compliance, and technological dependency were becoming increasingly relevant.
A risk analysis showed that relying entirely on cloud services from non-European providers would introduce significant legal and security uncertainties. Especially regarding the protection of sensitive information under GDPR and the upcoming NIS2 directive.

[…]

At the time of the project, BMWET was already in the process of adopting Microsoft 365 and Teams. Reversing that path wasn’t realistic. Instead, the ministry implemented a hybrid architecture: Nextcloud handles internal collaboration and secure data management, while Teams remains available for external meetings.

In collaboration with Nextcloud partner Sendent, Outlook integration ensured seamless email and calendar workflows, enabling employees to continue working with familiar tools while ensuring sensitive information stays within Austrian infrastructure.

A fast and well-coordinated rollout

From proof of concept to full deployment, the process took only a few months – an unusually fast timeline for a public sector ICT project. Working closely with Nextcloud and implementation partner Atos Austria, BMWET rolled out the new platform across 1,200 employees.

[…]

Source: Austria’s Ministry of Economy takes decisive steps toward digital sovereignty – Nextcloud

Samsung Electronics Unveils Tri-Fold Phone: Two Hinges, Tablet Screen

[…] The unveiled Tri-Fold Phone differed from typical foldable phones in that it had two hinges, joints, in the folding section. Its screen ratio was significantly longer horizontally than vertically, resembling a ‘small tablet PC.’ Compared to conventional foldable phones, it featured three external screens aligned side by side. However, the device could not be touched or tested directly; it was only visible through a glass display case.

On the 28th, Samsung Electronics unveils the physical model of the 'Tri-Fold Phone, right' at the APEC K-Tech showcase. /Courtesy of Park Ji-min
On the 28th, Samsung Electronics unveils the physical model of the ‘Tri-Fold Phone, right’ at the APEC K-Tech showcase. /Courtesy of Park Ji-min

The Tri-Fold Phone, which Samsung Electronics announced would be released within the year, was designed with a structure allowing the screen to be folded twice. The external screen features a display measuring approximately 6.5 inches, similar to the Galaxy Fold series, while the fully unfolded screen measures approximately 10 inches, comparable to a tablet. Considering the complex hinge structure and additional display components, the launch price is estimated to be over 3 million Korean won.

[…]

Source: Samsung Electronics Unveils Tri-Fold Phone: Two Hinges, Tablet Screen

Clearview AI faces criminal heat for ignoring EU data fines – wait: these creeps still exist?

Privacy advocates at Noyb filed a criminal complaint against Clearview AI for scraping social media users’ faces without consent to train its AI algorithms.

Austria-based Noyb (None of Your Business) is targeting the US company and its executives, arguing that if successful, individuals who authorized the data collection could face criminal penalties, including imprisonment.

The complaint focuses largely on Clearview’s apparent disregard for fines from France, Greece, Italy, the Netherlands, and the UK. Aside from the UK — where Clearview recently lost its appeal of a $10 million fine from the Information Commissioner’s Office — the company has yet to pay other fines totaling more than $100 million, Noyb claims.

“EU data protection authorities did not come up with a way to enforce its fines and bans against the US company, allowing Clearview AI to effectively dodge the law,” said Noyb in its announcement today.

Max Schrems, privacy lawyer and founder of Noyb, said: “Clearview AI seems to simply ignore EU fundamental rights and just spits in the face of EU authorities.”

The criminal complaint, filed with Austrian public prosecutors, hinges on Article 84 of the GDPR, which allows EU member states to seek proportionate punishments for data protection violations, including through criminal proceedings.

Clearview AI claims it has collected more than 60 billion images to help law enforcement agencies improve facial recognition tech.

Scraping data is not inherently illegal, however, Clearview’s sweeping collection of social media photos for commercial gain has repeatedly violated GDPR regulations across Europe.

Austria ruled the company’s practices illegal in 2023, though it imposed no fine.

Noyb is using a provision in Austria’s own implementation of the GDPR that allows criminal proceedings to be brought against managers of organizations that flout data protection laws.

“We even run cross-border criminal procedures for stolen bikes, so we hope that the public prosecutor also takes action when the personal data of billions of people was stolen – as has been confirmed by multiple authorities,” said Schrems.

Source: Clearview AI faces criminal heat for ignoring EU data fines • The Register

Physicists Built a Pixel So Small, Full HD Could Fit on a Bread Crumb

[…] In a recent Science Advances paper, researchers report the creation of the smallest pixel ever, using optical antennas that convert radiation into focused energy bits. The pixel measures just 300 by 300 nanometers—around 17 times smaller than a conventional OLED pixel, but with a similar brightness.

To put the size into context, a display with an area of just one square millimeter could fit a resolution of 1920 x 1080 pixels using the new technology. The tiny pixel also glows on its own, making it potentially revolutionary for the next generation of smart, portable devices.

[…]

the team identified a way to effectively block these unwanted structures, called filaments, from potentially destroying the pixel.  Specifically, they fabricated a thin, insulating layer with a tiny circular opening at its center and layered it over a gold optical antenna.

Smallest Pixel Diagram
A conceptual illustration of the nanoscale OLED. © Hecht et al., 2025.

The arrangement proved surprisingly effective in preventing filaments from forming. The optical antenna additionally helped focus electromagnetic energy and amplify the brightness, according to the paper. As a result, “even the first nanopixels were stable for two weeks under ambient conditions,” said Bert Hecht, study senior author and a physicist at the University of Würzburg, in the release.

That said, the system is still a prototype, with about 1% efficiency. However, the researchers noted that because the current paper eliminates one of the biggest challenges of scaling down pixels, the next steps should be slightly easier.

“With this technology, displays and projectors could become so small in the future that they can be integrated almost invisibly into devices worn on the body—from eyeglass frames to contact lenses,” the researchers added.

Source: Physicists Built a Pixel So Small, Full HD Could Fit on a Bread Crumb

‘Change course now’: humanity has missed 1.5C climate target, says UN head

[…]Humanity has failed to limit global heating to 1.5C and must change course immediately, the secretary general of the UN has warned.

In his only interview before next month’s Cop30 climate summit, António Guterres acknowledged it is now “inevitable” that humanity will overshoot the target in the Paris climate agreement, with “devastating consequences” for the world.

He urged the leaders who will gather in the Brazilian rainforest city of Belém to realise that the longer they delay cutting emissions, the greater the danger of passing catastrophic “tipping points” in the Amazon, the Arctic and the oceans.

“Let’s recognise our failure,” he told the Guardian and Amazon-based news organisation Sumaúma. “The truth is that we have failed to avoid an overshooting above 1.5C in the next few years. And that going above 1.5C has devastating consequences. Some of these devastating consequences are tipping points, be it in the Amazon, be it in Greenland, or western Antarctica or the coral reefs.

He said the priority at Cop30 was to shift direction: “It is absolutely indispensable to change course in order to make sure that the overshoot is as short as possible and as low in intensity as possible to avoid tipping points like the Amazon. We don’t want to see the Amazon as a savannah. But that is a real risk if we don’t change course and if we don’t make a dramatic decrease of emissions as soon as possible.”

The planet’s past 10 years have been the hottest in recorded history. Despite growing scientific alarm at the speed of global temperature increases caused by the burning of fossil fuels – oil, coal and gas – the secretary general said government commitments have come up short.

Fewer than a third of the world’s nations (62 out of 197) have sent in their climate action plans, known as nationally determined contributions (NDCs) under the Paris agreement. The US under Donald Trump has abandoned the process. Europe has promised but so far failed to deliver. China, the world’s biggest emitter, has been accused of undercommitting.

António Guterres speaking at a Cop29 podium
António Guterres giving his speech at Cop29 in Baku, Azerbaijan, in November 2024. Photograph: Anatoly Maltsev/EPA

Guterres said the lack of NDC ambition means the Paris goal of 1.5C will be breached, at least temporarily: “From those [NDCs] received until now, there is an expectation of a reduction of emissions of 10%. We would need 60% [to stay within 1.5C]. So overshooting is now inevitable.”

He did not give up on the target though, and said it may still be possible to temporarily overshoot and then bring temperatures down in time to return to 1.5C by the end of the century, but this would require a change of direction at and beyond Cop30.

[…]

Source: ‘Change course now’: humanity has missed 1.5C climate target, says UN head | Climate crisis | The Guardian

China’s New Influencer Law Says Only Degree-Holders Can Discuss Professional Topics. Idiots say this limits freedom of ideas

China’s new influencer law, which took effect on October 25, requires anyone creating content on sensitive topics, such as medicine, law, education, or finance, to hold official qualifications in those fields.

The Cyberspace Administration of China (CAC) says the goal is to fight misinformation and protect the public from false or harmful advice. But, the move has also raised concerns about censorship and freedom of expression.

Under the new rules, influencers who talk about regulated topics must show proof of their expertise, such as a degree, professional license, or certificate. Platforms like Douyin (China’s version of TikTok), Bilibili, and Weibo must verify creators’ credentials and make sure their content includes proper citations and disclaimers.

For example, influencers must clearly state when information comes from studies or when a video includes AI-generated material. Platforms are also required to educate users about their responsibilities when sharing content online.

The CAC has gone even further by banning advertising for medical products, supplements, and health foods to prevent hidden promotions disguised as “educational” videos.

However, critics warn that the law could harm creativity and limit freedom of speech. By controlling who can talk about certain topics, they argue, China might not only block misinformation but also restrict independent voices and critical debate.

Many worry that “expertise” will be defined too narrowly, giving authorities more power to silence people who question official narratives or offer alternative views.

Others, however, welcomed the move, saying that the new law would allow for well-informed content on important and sensitive topics. Many argued that only professionals in their field should be able to speak about and discuss said topic to prevent misinformation.

The rise of influencer culture has changed how people get information. Influencers are valued for being relatable and authentic, and being able to connect with audiences in ways traditional experts cannot. However, when these creators share misleading or inaccurate information, the effects can be serious, supporters of the new law argue.

Source: China’s New Influencer Law Says Only Degree-Holders Can Discuss Professional Topics China’s New Influencer Law Says Only Degree-Holders Can Discuss Professional Topics

Unfortunately, having people doing “research” by watching one Youtube video and then telling people that vaccines don’t work, or that 5G space bats cause covid and people want to inject chips into you has proven to be an absolute disaster, which prolonged a global pandemic and killed a lot of people.

These people should be jailed and it is a crying shame that a country like China is taking the lead in this, and not the EU.