Spotify was down this morning for thousands of users

My boyfriend texted me those dreaded four words: “Is your Spotify down?” Sure enough his, mine and thousands of other users’ Spotify accounts appear to be down and out at the moment, with Downdetector recording over 10,000 reports from users.

Spotify is apparently working on the problem. The account, Spotify Status, shared an update on X at 9:45 AM on Monday, “We’re aware of some issues right now and are checking them out!” About an hour later, the company shared an update saying that the outage was resolved as of 10:34 AM ET.

Source: Spotify was down this morning for thousands of users: Updates on the widespread outages

After Samsung forces Gemini, LG TV users get unremovable Microsoft Copilot through forced update

LG smart TV owners are reporting that a recent webOS software update has added Microsoft Copilot to their TVs, with no apparent way to remove it. Reports first surfaced over the weekend on Reddit, where a post showing a Copilot tile pinned to an LG TV home screen climbed to more than 35,000 upvotes on r/mildlyinfuriating, accompanied by hundreds of comments from users describing the same behavior.

According to affected users, Copilot appears automatically after installing the latest webOS update on certain LG TV models. The feature shows up on the home screen alongside streaming apps, but unlike Netflix or YouTube, it cannot be uninstalled.

LG has previously confirmed plans to integrate Microsoft Copilot into webOS as part of its broader “AI TV” strategy. At CES 2025, the company described Copilot as an extension of its AI Search experience, designed to answer questions and provide recommendations using Microsoft’s AI services. In practice, the iteration of Copilot currently seen on LG TVs appears to function as a shortcut to a web-based Copilot interface rather than a fully native application like the one described by LG.

The issue, for many, isn’t necessarily what Copilot does, but that it has been forced onto consumers with no option to remove it. LG’s own support documentation notes that certain preinstalled or system apps cannot be deleted, only hidden. Users who encounter Copilot after the update report that this limitation applies, leaving them with no way to fully remove the feature once it has been added. It’s a similar story on rival models, for instance some Samsung TV’s include Gemini.

The overwhelmingly negative reaction from users indicates a growing frustration with AI features being imposed on consumers in every way possible. Smart TVs have naturally become platforms for advertising, data collection, and now AI services, with updates adding new functionality that owners did not explicitly request and, in most cases, do not want. While LG allows users to disable some AI-related options, such as voice recognition and personalization features, those settings do not remove the Copilot app itself.

Ultimately, those wanting to minimize Copilot’s presence on their TVs are limited to keeping it disconnected from the Internet. That’s about the most that can be done at the moment, unless LG backtracks and either allows users to disable or completely uninstall the app in response to backlash, which seems unlikely.

Source: LG TV users baffled by unremovable Microsoft Copilot installation — surprise forced update shows app pinned to the home screen | Tom’s Hardware

Google Translate expands live translation to all earbuds on Android

[…]

The latest version of Google’s live translation is built on Gemini and initially rolled out earlier this year. It supports smooth back-and-forth translations as both on-screen text and audio. Beginning a live translate session in Google Translate used to require Pixel Buds, but that won’t be the case going forward.

Google says a beta test of expanded headphone support is launching today in the US, Mexico, and India. The audio translation attempts to preserve the tone and cadence of the original speaker, but it’s not as capable as the full AI-reproduced voice translations you can do on the latest Pixel phones. Google says this feature should work on any earbuds or headphones, but it’s only for Android right now. The feature will expand to iOS in the coming months. Apple does have a similar live translation feature on the iPhone, but it requires AirPods.

[…]

Google also debuted language-learning features earlier this year, borrowing a page from educational apps like Duolingo. You can tell the app your skill level with a language, as well as whether you need help with travel-oriented conversations or more everyday interactions. The app uses this to create tailored listening and speaking exercises.

[…]

Source: Google Translate expands live translation to all earbuds on Android – Ars Technica

Russian hackers debut ransomware service on Telegram. Hardcode the keys in plaintext in tempdir.

CyberVolk, a pro-Russian hacktivist crew, is back after months of silence with a new ransomware service. There’s some bad news and some good news here.

First, the bad news: the CyberVolk 2.x (aka VolkLocker) ransomware-as-a-service operation that launched in late summer. It’s run entirely through Telegram, which makes it very easy for affiliates that aren’t that tech savvy to lock files and demand a ransom payment.

CyberVolk’s soldiers can use the platform’s built-in automation to generate payloads, coordinate ransomware attacks, and manage their illicit business operations, conducting everything through Telegram.

But here’s the good news: the ransomware slingers got sloppy when it came time to debug their code and hardcoded the master keys – this same key encrypts all files on a victim’s system – into the executable files. This could allow victims to recover encrypted data without paying the extortion fee, according to SentinelOne senior threat researcher Jim Walter, who detailed the gang’s resurgence and flawed code in a Thursday report.

[…]

“Our analysis reveals an operation struggling with the challenges of expansion: taking one step forward with sophisticated Telegram automation, and one step backward with payloads that retain test artifacts enabling victim self-recovery,” Walter wrote.

[…]

In November, the ransomware operators began advertising standalone RAT and keylogger tools and advertised these pricing models:

  • RaaS (single OS): $800-$1,100 USD
  • RaaS (Linux + Windows): $1,600-$2,200 USD
  • Standalone RAT or Keylogger: $500 USD each

Once the ransomware has been deployed on victims’ systems, it escalates privileges, bypassing Windows User Account Control (UAC) to execute malware with admin-level privileges. It determines which files to encrypt based on exclusion lists for specific paths and extensions that have been configured in the malware’s code, and the ransomware uses AES-256 in GCM mode (Galois/Counter Mode) for file encryption.

But, here’s where the malware developers screwed up: VolkLocker doesn’t dynamically generate encryption keys, but rather hardcodes them as hex strings, and writes a plaintext file with the complete master encryption key in the %TEMP% folder.

The plaintext master key “likely represents a test artifact inadvertently shipped in production builds,” Walter wrote. “CyberVolk operators may be unaware that affiliates are deploying builds with the backupMasterKey() function still embedded.”

This “suggests that the operation is struggling to maintain quality control while aggressively recruiting lesser-skilled affiliates,” he added.

[…]

Source: Russian hackers debut simple ransomware service • The Register

US State Dept to Stop Using Calibri Font, go back to Times New Roman in Anti-DEI Push

Secretary of State Marco Rubio sent a memo on Tuesday ordering everyone at the U.S. State Department to use Times New Roman for all official government documents, according to the New York Times. What’s behind Rubio’s sudden obsession with fonts? The Secretary thinks the current typeface being used, Calibri, is too woke.

Rubio’s memo was titled “Return to Tradition: Times New Roman 14-Point Font Required for All Department Paper,” according to the Times and Reuters, which obtained a copy of the memo.

“To restore decorum and professionalism to the Department’s written work products and abolish yet another wasteful DEIA program, the Department is returning to Times New Roman as its standard typeface,” the cable said.

[…]

You can’t make this up

Source: Marco Rubio Orders State Dept to Stop Using Calibri Font in Anti-DEI Push

Over 10,000 Docker Hub images found leaking credentials, auth keys

More than 10,000 Docker Hub container images expose data that should be protected, including live credentials to production systems, CI/CD databases, or LLM model keys.

The secrets impact a little over 100 organizations, among them are a Fortune 500 company and a major national bank.

[…]

After scanning container images uploaded to Docker Hub in November, security researchers at threat intelligence company Flare found that 10,456 of them exposed one or more keys.

The most frequent secrets were access tokens for various AI models (OpenAI, HuggingFace, Anthropic, Gemini, Groq). In total, the researchers found 4,000 such keys.

When examining the scanned images, the researchers discovered that 42% of them exposed at least five sensitive values.

“These multi-secret exposures represent critical risks, as they often provide full access to cloud environments, Git repositories, CI/CD systems, payment integrations, and other core infrastructure components,” Flare notes in a report today.

[…]

According to the researchers, one of the most frequent errors observed was the use of .ENV files that developers use to store database credentials, cloud access keys, tokens, and various authentication data for a project.

Additionally, they found hardcoded API tokens for AI services being hardcoded in Python application files, config.json files, YAML configs, GitHub tokens, and credentials for multiple internal environments.

Some of the sensitive data was present in the manifest of Docker images, a file that provides details about the image.

Many of the leaks appear to originate from the so-called ‘shadow IT’ accounts, which are Docker Hub accounts that fall outside of the stricter corporate monitoring mechanisms, such as those for personal use or belonging to contractors.

Flare notes that roughly 25% of developers who accidentally exposed secrets on Docker Hub realized the mistake and removed the leaked secret from the container or manifest file within 48 hours.

However, in 75% of these cases, the leaked key was not revoked, meaning that anyone who stole it during the exposure period could still use it later to mount attacks.

Organizations should implement active scanning across the entire software development life cycle and revoke exposed secrets and invalidate old sessions immediately.

Source: Over 10,000 Docker Hub images found leaking credentials, auth keys

Half of exposed React servers remain unpatched amid attacks

Half of the internet-facing systems vulnerable to a fast-moving React remote code execution flaw remain unpatched, even as exploitation has exploded into more than a dozen active attack clusters ranging from bargain-basement cryptominers to state-linked intrusion tooling.

That’s the assessment from Alon Schindel, VP of AI and Threat Research at Wiz, who says CVE-2025-55182 – the React server-side vulnerability dubbed “React2Shell” – is now being actively exploited at scale, with researchers tracking at least 15 distinct intrusion clusters in the wild over the past 24 hours alone.

According to Wiz’s latest telemetry, roughly 50 percent of publicly exposed resources known to be vulnerable are still running unpatched code, giving attackers a comfortable head start.

The critical-severity flaw, first disclosed earlier this month, affects React Server Components and dependent frameworks such as Next.js and stems from unsafe deserialization in React’s server-side packages, allowing an unauthenticated attacker to send a crafted request to achieve remote code execution. As The Register previously reported, the bug quickly proved attractive to attackers because of React’s ubiquity in modern web stacks, particularly in cloud-hosted environments where a single exposed endpoint can provide a foothold into far larger estates.

What began as opportunistic scanning and cryptomining has now broadened into something messier. Wiz says it is seeing a clear split between “commodity” exploitation – dominated by familiar cryptomining operations using tools like Kinsing, C3Pool, and custom loaders – and more deliberate intrusion sets deploying post-exploitation frameworks and bespoke malware.

Among the clusters observed are Python-based campaigns masquerading as miner droppers while quietly exfiltrating secrets, Sliver command-and-control infrastructure used for hands-on-keyboard operations, and a JavaScript file injector that systematically infects every server-side *.js file it can reach. Wiz also reports the re-emergence of EtherRat backdoor variants, a family of malware that had previously fallen out of favor but appears to have been dusted off for this wave of exploitation.

The technical sophistication is also creeping upward. Multiple miscreants are actively attempting to frustrate incident response by manipulating timestamps, minimizing logs, and otherwise scrubbing evidence of compromise. Those anti-forensics techniques, Wiz warned, suggest operators who expect to be hunted and intend to linger.

[…]

Source: Half of exposed React servers remain unpatched amid attacks • The Register

Dark chocolate ingredient associated with lower apparent age

A natural chemical in dark chocolate may play a role in slowing certain signs of biological aging. Researchers at King’s College London have identified theobromine, a plant compound found in cocoa, as a possible contributor to this effect.

The study, published on December 10 in Aging, analyzed how much theobromine was present in participants’ blood and compared those levels with biological aging markers measured in blood samples.

What Biological Age Reveals

Biological age reflects how well a person’s body is functioning, rather than the number of years they have lived. This measure is based on DNA methylation, a collection of tiny chemical tags on DNA that shift as we grow older.

The research team examined data from two European groups, including 509 people from TwinsUK and 1,160 from KORA. Individuals with higher amounts of theobromine in their bloodstream tended to have a biological age that appeared younger than their chronological age.

[…]

Dr. Ricardo Costeira, a Postdoctoral Research Associate at King’s College London, said: “This study identifies another molecular mechanism through which naturally occurring compounds in cocoa may support health. While more research is needed, the findings from this study highlight the value of population-level analyses in aging and genetics.”

Although the findings are encouraging, the researchers caution that increasing dark chocolate consumption is not automatically beneficial. Chocolate also contains sugar, fat and other ingredients, and more work is needed to fully understand how theobromine interacts with the body and how it may influence aging.

Source: Scientists find dark chocolate ingredient that slows aging | ScienceDaily

Apple appeal loses vs Epic again. Google decides to settle with Epic.

Shortly after appeals court judges ruled against Apple’s contempt appeal in a years-long antitrust dispute against the makers of Fortnite, I got to talk to Epic Games CEO Tim Sweeney in an interview. According to Sweeney, today’s ruling “completely shuts down” Apple’s App Store rules that allow it to collect “junk fees.”

The three-judge Ninth Circuit Court of Appeals panel largely affirmed an April ruling that Apple failed to comply with Judge Yvonne Gonzalez Rogers’s 2021 order allowing app developers to link to external payment options, which Sweeney said “… is really awesome for all developers.”

Perhaps the most notable part of the appeals court ruling is that the panel is asking Gonzalez Rogers to look at ways Apple could charge developers reasonable fees for purchases made in apps using outside payment links. In her April ruling, Gonzalez Rogers blocked Apple from taking any fees from external payments because of decisions like slapping external payments with a 27 percent fee and forcing developers to make their payments links in plain text.

But the appeals court says Apple “should” be able to charge a fee based on “the costs that are genuinely and reasonably necessary for its coordination of external links for linked-out purchases, but no more” and that Apple is “entitled to some compensation for the use of its intellectual property that is directly used in permitting Epic and others to consummate linked-out purchases.”

“If you want to have an app go through review with custom linkouts, maybe there’s several hundred dollars of fees associated with that every time you submit an app, which is perfectly reasonable because there are real people at Apple doing those things and Apple pays them, and we should be contributing to that,” Sweeney says. But he says that the ruling, “completely shuts down, I think, for all time, Apple’s theory that they should be able to charge arbitrary junk fees for access.”

With these two areas that Apple would be allowed to charge for, Sweeney says that “I can’t imagine any justification for a percentage of developer revenue being assessed here.”

[…]

The ruling wasn’t the only big news for Epic and Fortnite on mobile today: the game also returned to Google Play in the US after similarly being booted by Google when Epic added the in-app payments system to Fortnite. Epic and Google announced last month that they have agreed to settle their lawsuit, and while the two sides are still seeking court approval for their settlement, it resolves their disputes worldwide.

[…]

Source: Tim Sweeney on the future of Fortnite after another win over Apple | The Verge

How Cops Are Using Flock’s license plate camera Network To Surveil Protesters And Activists

It’s no secret that 2025 has given Americans plenty to protest about. But as news cameras showed protesters filling streets of cities across the country, law enforcement officers—including U.S. Border Patrol agents—were quietly watching those same streets through different lenses: Flock Safety automated license plate readers (ALPRs) that tracked every passing car.

Through an analysis of 10 months of nationwide searches on Flock Safety’s servers, we discovered that more than 50 federal, state, and local agencies ran hundreds of searches through Flock’s national network of surveillance data in connection with protest activity. In some cases, law enforcement specifically targeted known activist groups, demonstrating how mass surveillance technology increasingly threatens our freedom to demonstrate.

Flock Safety provides ALPR technology to thousands of law enforcement agencies. The company installs cameras throughout their jurisdictions, and these cameras photograph every car that passes, documenting the license plate, color, make, model and other distinguishing characteristics. This data is paired with time and location, and uploaded to a massive searchable database. Flock Safety encourages agencies to share the data they collect broadly with other agencies across the country. It is common for an agency to search thousands of networks nationwide even when they don’t have reason to believe a targeted vehicle left the region.

Via public records requests, EFF obtained datasets representing more than 12 million searches logged by more than 3,900 agencies between December 2024 and October 2025. The data shows that agencies logged hundreds of searches related to the 50501 protests in February, the Hands Off protests in April, the No Kings protests in June and October, and other protests in between.

[…]

While EFF and other civil liberties groups argue the law should require a search warrant for such searches, police are simply prompted to enter text into a “reason” field in the Flock Safety system. Usually this is only a few words–or even just one.

In these cases, that word was often just “protest.”

Crime does sometimes occur at protests, whether that’s property damage, pick-pocketing, or clashes between groups on opposite sides of a protest. Some of these searches may have been tied to an actual crime that occurred, even though in most cases officers did not articulate a criminal offense when running the search. But the truth is, the only reason an officer is able to even search for a suspect at a protest is because ALPRs collected data on every single person who attended the protest.

[…]

In a few cases, police were using Flock’s ALPR network to investigate threats made against attendees or incidents where motorists opposed to the protests drove their vehicle into crowds. For example, throughout June 2025, an Arizona Department of Public Safety officer logged three searches for “no kings rock threat,” and a Wichita (Kan.) Police Department officer logged 22 searches for various license plates under the reason “Crime Stoppers Tip of causing harm during protests.”

Even when law enforcement is specifically looking for vehicles engaged in potentially criminal behavior such as threatening protesters, it cannot be ignored that mass surveillance systems work by collecting data on everyone driving to or near a protest—not just those under suspicion.

Border Patrol’s Expanding Reach

As U.S. Border Patrol (USBP), ICE, and other federal agencies tasked with immigration enforcement have massively expanded operations into major cities, advocates for immigrants have responded through organized rallies, rapid-response confrontations, and extended presences at federal facilities.

USBP has made extensive use of Flock Safety’s system for immigration enforcement, but also to target those who object to its tactics. In June, a few days after the No Kings Protest, USBP ran three searches for a vehicle using the descriptor “Portland Riots.”

[…]

Fighting Back Against ALPR

ALPR systems are designed to capture information on every vehicle that passes within view. That means they don’t just capture data on “criminals” but on everyone, all the time—and that includes people engaged in their First Amendment right to publicly dissent. Police are sitting on massive troves of data that can reveal who attended a protest, and this data shows they are not afraid to use it.

Our analysis only includes data where agencies explicitly mentioned protests or related terms in the “reason” field when documenting their search. It’s likely that scores more were conducted under less obvious pretexts and search reasons. According to our analysis, approximately 20 percent of all searches we reviewed listed vague language like “investigation,” “suspect,” and “query” in the reason field. Those terms could well be cover for spying on a protest, an abortion prosecution, or an officer stalking a spouse, and no one would be the wiser–including the agencies whose data was searched. Flock has said it will now require officers to select a specific crime under investigation, but that can and will also be used to obfuscate dubious searches.

For protestors, this data should serve as confirmation that ALPR surveillance has been and will be used to target activities protected by the First Amendment. Depending on your threat model, this means you should think carefully about how you arrive at protests, and explore options such as by biking, walking, carpooling, taking public transportation, or simply parking a little further away from the action. Our Surveillance Self-Defense project has more information on steps you could take to protect your privacy when traveling to and attending a protest.

[…]

Everyone should have the right to speak up against injustice without ending up in a database.

Source: How Cops Are Using Flock Safety’s ALPR Network To Surveil Protesters And Activists | Techdirt

Simple light trick reveals hidden organic pathways in microscopic detail

Every tissue in the human body contains exceptionally small fibers that help coordinate how organs move, function and communicate. Muscle fibers guide physical force, intestinal fibers support the motion of the digestive tract, and brain fibers carry electrical signals that allow different regions to exchange information. Together, these intricate fiber systems help shape the structure of each organ and keep them operating properly.

[…]

Although these microscopic structures play essential roles, they have long been challenging to study. Researchers have struggled to determine how fibers are oriented inside tissues, which has made it difficult to fully understand how they change in health and disease.

A Simple Method for Revealing Hidden Microstructure

A research team led by Marios Georgiadis, PhD, instructor of neuroimaging, has now introduced an approach that makes these hard-to-see fiber patterns visible with exceptional clarity and at a relatively low cost.

Their technique, described in Nature Communications, is known as computational scattered light imaging (ComSLI). It can reveal the orientation and organization of tissue fibers at micrometer resolution on virtually any histology slide, regardless of how it was stained or preserved — even if the slide is many decades old.

[…]

ComSLI relies on a basic physical principle: when light encounters microscopic structures, it scatters in different directions based on their orientation. By rotating the light source and recording how the scattering signal changes, researchers can reconstruct the direction of the fibers within each pixel of an image.

The method requires only a rotating LED light and a microscope camera, making the setup accessible compared with other forms of advanced microscopy. After the images are collected, software analyzes delicate patterns in the scattered light to generate color-coded maps of fiber orientation and density, known as microstructure-informed fiber orientation distributions.

ComSLI is not limited by sample preparation. It works with formalin-fixed, paraffin-embedded sections (a standard in hospitals and pathology labs) as well as fresh-frozen, stained or unstained slides.

[…]

“This is a tool that any lab can use,” Zeineh said. “You don’t need specialized preparation or expensive equipment. What excites me most is that this approach opens the door for anyone, from small research labs to pathology labs, to uncover new insights from slides they already have.”

[…]

To test the limits of the method, the researchers analyzed a brain section prepared in 1904. Even in this century-old sample, ComSLI identified intricate fiber patterns, allowing scientists to study historical specimens and explore how structural features evolve across generations of disease.

Applications Beyond the Brain

Although first designed for brain research, ComSLI also works well in other tissues. The team used it to study muscle, bone and vascular samples, each revealing unique fiber arrangements tied to their biological functions.

In tongue muscle, the method highlighted layered fiber orientations linked to movement and flexibility. In bone, it captured collagen fibers that align with mechanical stress. In arteries, it showed alternating collagen and elastin layers that support both strength and elasticity.

This ability to map fiber orientation across species, organs and archival specimens could significantly change how scientists investigate structure and function.

[…]

Story Source:

Materials provided by Stanford Medicine. Note: Content may be edited for style and length.


Journal Reference:

  1. Marios Georgiadis, Franca auf der Heiden, Hamed Abbasi, Loes Ettema, Jeffrey Nirschl, Hossein Moein Taghavi, Moe Wakatsuki, Andy Liu, William Hai Dang Ho, Mackenzie Carlson, Michail Doukas, Sjors A. Koppes, Stijn Keereweer, Raymond A. Sobel, Kawin Setsompop, Congyu Liao, Katrin Amunts, Markus Axer, Michael Zeineh, Miriam Menzel. Micron-resolution fiber mapping in histology independent of sample preparation. Nature Communications, 2025; 16 (1) DOI: 10.1038/s41467-025-64896-9

Source: Simple light trick reveals hidden brain pathways in microscopic detail | ScienceDaily

Instacart Charging Customers up to 25% Different Prices for Same Products

How much does a carton of eggs cost? Depends on who you are. A new study produced in collaboration with policy group Groundwork Collaborative, Consumer Reports, and More Perfect Union found that people who purchased the exact same product from the exact same store at the exact same time were charged different prices—sometimes up to nearly 25% more—when placing the order on Instacart.

The study tapped 437 volunteer shoppers in four cities who were put in groups that were synced up virtually to add items from a specific grocery store into their Instacart shopping carts at the same time. They then reported the prices that appeared for those researchers to determine if people were being charged different prices for the same goods.

The result was a pretty resounding “Yes.” According to the study, nearly three-quarters of all grocery items tested in the experiment produced multiple prices across shoppers, including some products that showed five different prices for the same product.

[…]

Researchers reported that the final total of the Instacart shopping carts varied by an average of 7% despite every item and condition being identical.

[…]

According to Consumer Reports, the company confirmed the study accurately reflected its pricing strategies, which it claims to only do at 10 partnering grocery retailers that it chose not to name.

[…]

While Instacart didn’t name the retailers they have partnered with for this program, the study did name where they performed their tests. One retailer was Target, and they found varying prices on items sold through Instacart from the retailer. Target told Groundwork Collaborative that it has no business relationship with Instacart and “does not directly share any pricing information with Instacart or dictate what Instacart prices appear on their platform.” Instacart acknowledged to the publication that it scrapes Target’s prices and adds an upcharge to offset “operating and technology costs.” So Target was seemingly not one of the 10 retail partners, but shoppers there were still exposed to price variance. Instacart claims it has ended pricing experiments at Target.

It certainly seems like the pricing discrepancies are an example of surveillance pricing, where consumers are served different prices based on information the platform knows about them. The study didn’t find any clear correlation that would link certain shopper demographic data and the prices they were presented, and Instacart told Consumer Reports that it doesn’t use any personal or demographic data from users in its pricing experiments and instead explained that customers are randomly assigned to price groups.

[…]

“These tests are not dynamic pricing – prices never change in real-time, including in response to supply and demand. The tests are never based on personal or behavioral characteristics — they are completely randomized,” an Instacart spokesperson told Gizmodo.

So Instacart’s varied pricing is allegedly part of an experiment that randomly assigns shoppers to different pricing groups, but brands whose goods are available on Instacart can use the company’s data-driven pricing platform to serve different prices based on different demographic data. For the end user, that likely feels like a distinction without a difference, as they are ultimately seeing different prices based on conditions that are outside of their control.

Source: Instacart Charging Customers Different Prices for Same Products, Study Finds

Australias Social Media Ban goes into Effect

The BBC has a live page following the ban and surprise surprise – it didn’t take long for people to circumvent the ban at all, with alternative social media being used (eg Lemon8, Yope, etc), VPNs being used (and the use of VPNs being threatened by ministers), pleas by campaigners asking for parents not to help circumvent the rules, etc.

That the ban won’t work is predictable. It will force kids into hiding, where they will be beyond the oversight of absolutely anyone. Worse, it will leave them with no help when things do go wrong – who is going to be complaining to their parents or the police about cyberbullying when they are using an illegal platform where they are being bullied on?

The age limit of 16 is entirely arbitrary too. Some kids develop faster than others and some very much slower. With science showing that adulthood starts at 32 (and looking at how far right politics and belief in populist nonsense is going globally, in many cases seemingly never), mature children are being punished and immature young adults are being exposed to content that they are not equipped to handle.

The goal – stopping toxic, unwanted behaviors in social media platforms – is a good one. By now we should be able to define these unwanted behaviours (eg no false news; no body shaming; no targeted abuse; no political preferences in feeds; who really needs video calls with groups of more than 6 people on a social media platform anyway? etc) and test them. To throw a random age line at the problem doesn’t solve it. How about for every instance of one of these behaviours a huge fine is levied (eg $1 million or above – the scale of the profits of the social media companies beggars belief, so only huge fines will make them feel the cost / benefit of paying the fine / fixing the problem lies in the fixing the problem side of things) – something that these behemoths cannot ignore. And if too many transgressions are detected in a certain period (eg 100 fines per week) then the platform is closed entirely for a certain period (weeks / months). This will incentivise the social media platforms to fix the problems which is what we want instead of driving kids into hiding and exposing them to a much more dangerous social media landscape.

Congress strips right-to-repair from military spending bill despite bipartisan support. Why? Lobbying Money!

Congress has released the final version of the 2026 National Defense Authorization Act (NDAA), and critics have been quick to point out that previously proposed rules giving the US military the right to repair its equipment without having to rely on contractors have gone missing.

The House and Senate versions of the NDAA passed earlier both included provisions that would have extended common right-to-repair rules to US military branches, requiring defense contractors to provide access to technical data, information, and components that enabled military customers to quickly repair essential equipment. Both of those provisions were stripped from the final joint-chamber reconciled version of the bill, published Monday, right-to-repair advocates at the US Public Interest Research Group (PIRG) pointed out in a press release.

Support for the military’s right to repair is so broad, and it’s one of the few issues where liberal Democrats in Congress are aligned with President Trump. Senators Elizabeth Warren (D-MA) and Tim Sheehy (R-MT) even introduced a bill over the summer that would have legislated “fair and reasonable access” to necessary parts and information that would enable the US military to fix gear faster than farmers with broken John Deere tractors. That bill, referred to the Senate Armed Services Committee in July, hasn’t budged since.

In other words, the 2026 NDAA was the latest best hope to give the troops some repairability leeway.

“Despite support from Republicans, Democrats, the White House, and key military leaders, troops will keep waiting for repairs they could perform themselves,” PIRG legislative associate Charlie Schuyler said in the group’s statement. “Taxpayers will keep paying inflated costs. And in some cases, soldiers might not get the equipment they need when they need it most.”

The US military has been waging a war to achieve the right to repair its own equipment for some time, with the effort accelerating during the second Trump administration. The US Army, for example, has taken it upon itself to demand that future contracts include right to repair provisions, while the Navy has told Congress that it wants the right to repair its own gear, too.

In the Navy’s case, part of that was motivated by incredibly costly repairs needed for the USS Gerald R. Ford, a nuclear-powered aircraft carrier with a crew of 4,500 that, at one point, had six of eight kitchen ovens out of commission. The support contract for ship maintenance barred sailors from fixing the ovens themselves, even if they could do it.

“The Trump administration, in addition to the Secretaries of the Army, Navy, and Air Force, have all expressed support for military Right to Repair,” PIRG said in its press release.

Isaac Bowers, PIRG’s federal legislative director, told The Register that, while it’s hard to fathom a reason the repairability provisions were stripped from the final bill, he has a sneaking suspicion: Defense industry lobbying.

The right-to-repair provisions “were opposed by a defense industry that has deep pockets, influence on Capitol Hill and a lot invested in the U.S. military continuing to pay their inflated sustainment costs,” Bowers told us.

[…]

Source: Congress strips right-to-repair from military spending bill • The Register

Colour Epaper Digital Screens Takes Color Resolution to 25,000 pixels per inch

Visual displays have steadily gotten smaller and held closer to our eyes as our viewing habits have shifted from cinema screens to TVs to computers, smartphones and virtual reality. This shift has required higher image resolution (usually through increased pixel counts) to provide enough detail. Conventional light-emitting pixels work poorly below a certain size: brightness drops, and colors bleed. The same isn’t true for reflective displays such as those used in many e-readers, whose pixels reflect ambient light rather than emitting their own—but creating those pixels typically requires larger components.

A new reflective display could shatter those restrictions with resolutions beyond the limit of human perception. In a recent study in Nature, scientists describe a reflective retina e-paper that can display color video on screens smaller than two square millimeters across.

The researchers used nanoparticles whose size and spacing affect how light is scattered, tuning them to create red, green and blue subpixels. The material is electrochromic, so its light absorption and reflection can be controlled with electrical signals. With this setup, “metapixels” consisting of the three subpixels can generate any color if you deliver appropriate signals.

Each pixel is only 560 nanometers wide, creating a resolution above 25,000 pixels per inch—more than 50 times that of current smartphones. “We can make displays a similar size as your pupil, with a similar number of pixels as photoreceptors in your eyes,” says study co-author Kunli Xiong of Uppsala University in Sweden. “So we can create virtual worlds very close to reality.”

Graphic compares the scale, resolution and color quality of an image of Gustav Klimt’s painting The Kiss on a phone screen versus the e-paper.

E-paper screens also have relatively low energy requirements; the pixels retain their color for some time, so power is generally needed only when colors change. “It uses ultralow power,” Xiong says. “For very small devices, it is not easy to integrate large batteries, so that energy saving becomes even more important.”

The team demonstrated the technology with a version of The Kiss by Austrian painter Gustav Klimt and a three-dimensional butterfly image. “People have made these kinds of materials before, but usually they produce poor colors,” says Jeremy Baumberg, a nanotechnologist at the University of Cambridge, who studies how nanoscale materials interact with light. In comparison, the design of Xiong and his colleagues’ subpixels “generates colors that look more compelling than I’ve seen before,” Baumberg says.

These pixels can be rapidly controlled, enabling a reasonable refresh rate—but the necessary electronics for such a high resolution do not yet exist. Xiong and his colleagues anticipate that engineering companies will begin to develop such systems.

Meanwhile Xiong’s team plans to optimize other aspects of the technology such as its speed and lifetime. “Every time you switch [colors], the material’s structure changes, and eventually it crumbles,” Baumberg says—similar to how batteries decay. He estimates that it’ll be five to 10 years before we see commercially available devices.

Source: Breakthrough in Digital Screens Takes Color Resolution to Incredibly Small Scale | Scientific American

Why Local Airports Matter More Than Ever

Europe’s map is not just its capitals and hubs: it is a constellation of cultures and communities. It is a simple fact that many of these communities, industrial towns, university centres, and touristic villages depend on reliable, affordable air links to the rest of Europe and beyond – provided by their regional airports.

For them, the nearest airport is a lifeline and their sole link to the world. If the EU is serious about cohesion, competitiveness and the green transition for aviation, then it must recognise the strategic value of regional airports in ensuring no citizen is left behind.

This means the EU must also recognise that these airports, which provide such essential connections, are not often in a position to be profitable and self-funding. This is the role of State aid: to ensure citizens across Regional communities are not isolated from education, employment, culture and the opportunities that come from being connected.

This is why ACI EUROPE continues to raise alarms about the need to extend EU guidelines that allow well-governed State aid to small airports. Those guidelines are at risk in an ongoing European Commission evaluation.

Here is the policy rub: the EU’s current State Aid Aviation Guidelines assume that small airports will adjust to become financially viable over time. The reality is that many will not be able to, through no fault of their own. High fixed costs, lumpy seasonality and airline market power in route development negotiations act against them. That is why extending the possibility for operating state aid beyond 2027 for airports up to 1 million passengers, with sensible intensity thresholds and guardrails, is not market distortion. It is the targeted correction of a structural market failure that preserves connectivity possibilities where the market alone undersupplies it.

The fiscal scale is modest; the payoff is large. Airports up to 1 million passengers account for only about 2.5% of total EU traffic – so the envelope of potential operating support is limited, precise, and efficient: the social and economic returns are concentrated in exactly the places EU cohesion policy is meant to serve. Put differently: a relatively small public outlay secures links that keep regions investable, stem brain drain, and maintain equal access to essential services.

[…]

Source: Why Local Airports Matter More Than Ever | Euractiv

For simple politicians, it is easy to think in simple solutions: on paper having huge airports (owned by a huge company with huge lobbying power) servicing centrally will seem more efficient. With connections, it is not about efficiency, it is about quantity – seeing that as many points are connected is more important than that the existing connections have huge throughput.

Google and Apple partner on better Android-iPhone switching 

The latest Android Canary build is available today and it features work by Apple and Google to make switching between Android and iPhone devices easier.

A joint collaboration between the two companies aims to make transferring data between Android and iOS easier. Google and Apple tell us that this will be available during the device setup process.

This work is beginning to go live today with Android Canary 2512 (ZP11.251121.010) on all Pixel devices, while this is coming with a future iOS 26 developer beta. Ahead of launch, this easier switching will add more functionality and support for additional data types that are transferred over.

As always, Android Canary and iOS developer betas are not intended for general use, and might have other performance issues. On the Google side, these features will eventually make their way to the Android Beta before launch.

It’s not clear when the final version of this improved switching is going live, with Android support happening on a device-by-device basis. Until then, there is Apple’s Move to iOS app on Android and Google’s Android Switch app on iOS.

Source: Google and Apple partner on better Android-iPhone switching 

The year age verification laws came for the open internet

When the nonprofit Freedom House recently published its annual report, it noted that 2025 marked the 15th straight year of decline for global internet freedom. The biggest decline, after Georgia and Germany, came within the United States.

Among the culprits cited in the report: age verification laws, dozens of which have come into effect over the last year. “Online anonymity, an essential enabler for freedom of expression, is entering a period of crisis as policymakers in free and autocratic countries alike mandate the use of identity verification technology for certain websites or platforms, motivated in some cases by the legitimate aim of protecting children,” the report warns.

Age verification laws are, in some ways, part of a years-long reckoning over child safety online, as tech companies have shown themselves unable to prevent serious harms to their most vulnerable users. Lawmakers, who have failed to pass data privacy regulations, Section 230 reform or any other meaningful legislation that would thoughtfully reimagine what responsibilities tech companies owe their users, have instead turned to the blunt tool of age-based restrictions — and with much greater success.

Over the last two years, 25 states have passed laws requiring some kind of age verification to access adult content online. This year, the Supreme Court delivered a major victory to backers of age verification standards when it upheld a Texas law requiring sites hosting adult content to check the ages of their users.

Age checks have also expanded to social media and online platforms more broadly. Sixteen states now have laws requiring parental controls or other age-based restrictions for social media services. (Six of these measures are currently in limbo due to court challenges.) A federal bill to ban kids younger than 13 from social media has gained bipartisan support in Congress. Utah, Texas and Louisiana passed laws requiring app stores to check the ages of their users, all of which are set to go into effect next year. California plans to enact age-based rules for app stores in 2027.

These laws have started to fragment the internet. Smaller platforms and websites that don’t have the resources to pay for third-party verification services may have no choice but to exit markets where age checks are required. Blogging service Dreamwidth pulled out of Mississippi after its age verification laws went into effect, saying that the $10,000 per user fines it could face were an “existential threat” to the company. Bluesky also opted to go dark in Mississippi rather than comply. (The service has complied with age verification laws in South Dakota and Wyoming, as well as the UK.) Pornhub, which has called existing age verification laws “haphazard and dangerous,” has blocked access in 23 states.

Pornhub is not an outlier in its assessment. Privacy advocates have long warned that age verification laws put everyone’s privacy at risk. Practically, there’s no way to limit age verification standards only to minors. Confirming the ages of everyone under 18 means you have to confirm the ages of everyone. In practice, this often means submitting a government-issued ID or allowing an app to scan your face. Both are problematic and we don’t need to look far to see how these methods can go wrong.

Discord recently revealed that around 70,000 users “may” have had their government IDs leaked due to an “incident” involving a third-party vendor the company contracts with to provide customer service related to age verification. Last year, another third-party identity provider that had worked with TikTok, Uber and other services exposed drivers’ licenses. As a growing number of platforms require us to hand over an ID, these kinds of incidents will likely become even more common.

Similar risks exist for face scans. Because most minors don’t have official IDs, platforms often rely on AI-based tools that can guess users’ ages. A face scan may seem more private than handing over a social security number, but we could be turning over far more information than we realize, according to experts at the Electronic Frontier Foundation (EFF).

“When we submit to a face scan to estimate our age, a less scrupulous company could flip a switch and use the same face scan, plus a slightly different algorithm, to guess our name or other demographics,” the organization notes. “A poorly designed system might store this personal data, and even correlate it to the online content that we look at. In the hands of an adversary, and cross-referenced to other readily available information, this information can expose intimate details about us.”

These issues aren’t limited to the United States. Australia, Denmark and Malaysia have taken steps to ban younger teens from social media entirely. Officials in France are pushing for a similar ban, as well as a “curfew” for older teens. These measures would also necessitate some form of age verification in order to block the intended users. In the UK, where the Online Safety Act went into effect earlier this year, we’ve already seen how well-intentioned efforts to protect teens from supposedly harmful content can end up making large swaths of the internet more difficult to access.

The law is ostensibly meant to “prevent young people from encountering harmful content relating to suicide, self-harm, eating disorders and pornography,” according to the BBC. But the law has also resulted in age checks that reach far beyond porn sites. Age verification is required to access music on Spotify. It will soon be required for Xbox accounts. On X, videos of protests have been blocked. Redditors have reported being blocked from a lengthy number of subreddits that are marked NSFW but don’t actually host porn, including those related to menstruation, news and addiction recovery. Wikipedia, which recently lost a challenge to be excluded from the law’s strictest requirements, is facing the prospect of being forced to verify the ages of its UK contributors, which the organization has said could have disastrous consequences.

The UK law has also shown how ineffective existing age verification methods are. Users have been able to circumvent the checks by using selfies of video game characters, AI-generated images of ID documents and, of course, Virtual Private Networks (VPNs).

As the EFF notes, VPNs are incredibly widely used. The software allows people to browse the internet while masking their actual location. They’re used by activists and students and people who want to get around geoblocks built into streaming services. Many universities and businesses (including Engadget parent company Yahoo) require their students and workers to use VPNs in order to access certain information. Blocking VPNs would have serious repercussions for all of these groups.

The makers of several popular VPN services reported major spikes in the UK following the Online Safety Act going into effect this summer, with ProtonVPN reporting a 1,400 percent surge in sign-ups. That’s also led to fears of a renewed crackdown on VPNs. Ofcom, the regulator tasked with enforcing the law, told TechRadar it was “monitoring” VPN usage, which has further fueled speculation it could try to ban or restrict their use. And here in the States, lawmakers in Wisconsin have proposed an age verification law that would require sites that host “harmful” content to also block VPNs.

While restrictions on VPNs are, for now, mostly theoretical, the fact that such measures are even being considered is alarming. Up to now, VPN bans are more closely associated with authoritarian countries without an open internet, like Russia and China. If we continue down a path of trying to put age gates up around every piece of potentially objectionable content, the internet could get a lot worse for everyone.

Source: The year age verification laws came for the open internet

Pebble smart ring for recording thoughts, battery life: years. Software – open.

Pebble just announced the Index 01, a smart ring for recording thoughts. It’s a little ring with a built-in microphone and that’s about it. The Index 01 is almost anti-tech in its simplicity. There’s no needless AI component shoehorned in, aside from speech-to-text. It’s a ring with a microphone that you whisper ideas into and I want one.

Here’s how it works. You get an idea while walking down the street, so you quietly whisper it into the ring. The ring sends the idea to a notes app or saves it for later review. Pebble founder Eric Migicovsky calls this an “external memory” for the brain, but I call it a nice way to avoid having to dig the phone out of a pocket or bag just to utter something like “pizza, but for cats.”

The ring doesn’t record unless a button is pushed, so it won’t be listening in on private conversations, and it doesn’t require a paid subscription of any kind. It’s on the smaller side, about the size of a wedding band, and is water-resistant.

The battery also lasts for “years” and never needs to be charged. The ring is designed to be worn at all times, so users develop the muscle memory of holding down the little button when they have something to share. See what I mean? I want one, and I’ve quite literally never worn a ring in my life.

A ring.
Pebble

Migicovsky says this is an open source product and that Pebble is “leaving the side door open for folks to customize.” He envisions people will integrate AI voice agents and that the ring will eventually work with stuff like ChatGPT, Beeper, Google and other services.

The Pebble Index 01 works with iPhone and Android and is available for preorder right now. It costs $75 during this preorder period, but the price jacks up to $99 when shipments start going out in March.

This is just the latest product by Migicovsky and Pebble. The company unveiled the Core 2 Duo and the Core Time 2 smartwatches earlier this year.

Source: Pebble is making a weird little smart ring for recording thoughts

Timing cancer drug delivery around our body clock may boost survival

They say timing is everything, and treating cancer may be no exception. Researchers have found that simply shifting when people with cancer receive immunotherapy drugs could improve their survival, adding to evidence that our body’s internal clocks influence how well cancer treatments work.

The activity of our cells and tissues works on 24-hour cycles, known as circadian rhythms, which coordinate everything from hormone release to the timing of cell division and repair. These rhythms are often disrupted in cancer cells, which tend to divide continuously, rather than at set times.

This has prompted efforts to reduce the side effects of chemotherapy, which targets rapidly dividing cells, by administering it when healthy tissues are least active. Increasingly, however, researchers are exploring whether the effectiveness of cancer drugs might also be improved by giving them at particular times.

One such group of drugs is immune checkpoint inhibitors, which help immune T-cells recognise and attack tumours more effectively. “T-cells and other immune defenders are naturally more active in the morning; primed to respond,” says Seline Ismail-Sutton at Ysbyty Gwynedd hospital in Bangor, UK, who wasn’t involved in the study. “Administering immune checkpoint inhibitors during this window may amplify anti-tumour effects and enhance efficacy.”

Earlier this year, Zhe Huang at Central South University in Changsha, China, and his colleagues reported that giving the checkpoint inhibitor pembrolizumab alongside chemotherapy to people with advanced non-small cell lung cancer (NSCLC) before 11.30am was associated with nearly double the survival rate seen in those who received most of their treatment in the afternoon.

To investigate whether timing treatments around circadian rhythms – known as chronotherapy – might also benefit people with small cell lung cancer, a faster-growing and more aggressive form of the condition, the same team analysed data from 397 people treated with the checkpoint inhibitors atezolizumab or durvalumab alongside chemotherapy between 2019 and 2023.

“Compared with patients treated later in the day, those treated before 3pm had significantly longer progression‑free survival and overall survival,” says team member Yongchang Zhang, also at Central South University.

After adjusting for multiple confounding factors, earlier administration was associated with a 52 per cent lower risk of cancer progression and a 63 per cent lower risk of death.

Zhang believes this effect probably exists for other tumour types, pointing to hints from studies of renal cell carcinoma and melanoma. As to why this dosing regimen has this effect, the NSCLC trial showed that morning administration boosted circulating T-cell numbers and activation, while late-day dosing had the opposite effect. Studies in mice have also shown that tumour-infiltrating T-cells vary in function over 24 hours, and that the circadian clocks of nearby endothelial cells can regulate when immune cells enter tumours.

Although randomised controlled trials with larger sample sizes are needed, this study “further supports the growing number of reports from all over the world describing better results with early time of day of immunotherapy drugs administration,” says Pasquale Innominato at the University of Warwick, UK.

Source: Timing cancer drug delivery around our body clock may boost survival | New Scientist

Minor Video Call Glitches create uncanny feelings and impact you negatively

During covid-19, most of us became accustomed to conducting all sorts of business via video call, as well as struggling with the unavoidable technical problems associated with such digital interactions. New research, however, reveals that in certain situations, glitches can be more harmful than one might think.

Researchers found that audiovisual glitches during face-to-face video calls can trigger a feeling of “uncanniness,” even if they don’t impact the communicated information. Depending on the context, this can have serious implications for the outcome of the call. In potentially the most striking example, researchers associated disrupted online court hearings with lower likelihoods of individuals being granted criminal parole.

The danger zone

“The best feature of video calling is the fact that you basically feel like you’re together,” Jacqueline Rifkin, assistant professor of marketing and management communications at the Cornell SC Johnson College of Business, said in a university statement. “And so when there’s a glitch, you’re right in that danger zone where it’s almost perfect, but not quite—what has become known as the ‘uncanny valley.’ It triggers this switch in your brain where things feel just a little bit creepy,” she explained. She’s a co-first author of a study published December 3 in the journal Nature.

To investigate the matter, Rifkin and her colleagues analyzed previously held video conferences and conducted real-life experiments. They studied a database of over 1,600 “get-to-know-you” video calls that took place in 2020, after which participants took a survey including questions about interpersonal connection and any technical difficulties during the call. The data revealed that the connection was weaker between video callers who had experienced glitches, no matter what type of glitch and whether they had happened for one or both individuals.

Another analysis of transcript data from hundreds of virtual parole hearings in Kentucky in 2021 identified glitches in 32.6% of cases. Individuals whose hearings experienced glitches were granted parole 48% of the time, whereas those who didn’t have problematic calls were granted parole 60% of the time. Taking into account the individual’s or crime’s characteristics didn’t make a difference. Simply put, disrupted connections were associated with lower chances of individuals being granted parole.

“That was when we started feeling like, wow, there’s really something quite important to say here,” Rifkin explained.

Potential to further inequalities

Their experiments also confirmed that glitches during face-to-face video calls broke the illusion of in-person reality. In one, the team had over 3,000 participants watch job interview recordings similarly to how one would experience a video call. Glitches during the “calls” lowered the interviewee’s chances of being recommended for hire. Similarly, of the almost 500 participants who listened to healthcare advice in a replication of a virtual health consultation, 77% said they were confident in working with the professional during a smooth call, while only 61% were confident when they experienced connection problems on the call.

According to Rifkin, the feeling of uncanniness is difficult to ignore once it takes hold. “We tried a lot of different interventions, but we basically struggled to overcome it,” she explained. In short, their work indicates that small audiovisual issues during video calls result in negative consequences for interpersonal judgements. This could further inequalities among already disadvantaged groups, such as those with suboptimal internet connections.

[…]

Source: Even Minor Video Call Glitches Could Cost You a Job—or Your Freedom

Boomerang – the guy from WeTransfer rebuilds file sharing

We’ve been here before. Back in 2009, the idea was simple: upload without too much hassle. Somewhere along the way, file-sharing got complicated. Features piled up. Ads crept in. Settings multiplied. Privacy gone. We think it’s time to get back to the basics.

Spearheaded by Nalden, one of the original founders of WeTransfer, we’ve built Boomerang for people who believe sharing files should just be easy. We won’t use your data to train any AI models. We simply want to help you to share your files fast.

Built for Speed

Boomerang runs on Cloudflare’s global edge network, one of the fastest infrastructures on the planet. Your files upload and download from the server closest to you, whether you’re in Tokyo, Berlin, or São Paulo. We use modern web technologies including Hono, TypeScript, and Drizzle ORM because we believe the best tools make the best products.

A Canvas, Not a Control Panel

Boomerang has features; stuff you can customize, files you can manage, passwords, collaboration. But we approach design like a wireframe that actually works. A clean canvas where you paint only what you need.

[…]

File sharing hasn’t changed much, but web technology has transformed completely. We’re building Boomerang with the latest infrastructure: edge computing, distributed storage, global CDN delivery, because your files deserve better than legacy tech.

Easy-duz-it.

If you have any ideas, feedback or feature requests, simply reach out via email and we will get back to you. No bots, no AI. Just imperfectly human. hi@bmrng.me.

Source: Boomerang

iFixit Made an AI Assistant to Help You Fix Your Gadgets (and It’s Free, for Now)

iFixit, the internet’s go-to for repair guides and spare parts, just launched a new mobile app with what sounds like a genuinely useful AI chatbot.

Starting today, iOS and Android users can download the iFixit app and chat directly with the new FixBot to get curated expert advice on how to fix everything from a cracked phone screen to a faulty dishwasher.

The team at iFixit says it spent two years building the chatbot, which utilizes a combination of AI models for its language, voice, and vision capabilities. What makes FixBot stand out from a general chatbot like ChatGPT or Gemini is its laser focus on repairs. FixBot won’t answer questions that are not about fixing things, and it’s trained on iFixit’s 125,000 repair guides, community forums, and a huge repository of PDF manuals.

To use the bot, users can type or vocally explain their issue to the bot, or they can even just snap a photo of whatever needs fixing. FixBot will try to identify the device and model, then ask follow-up questions until it figures out the problem. The bot will then walk users through a step-by-step repair, pulling answers from the iFixIt library, even if that means surfacing something buried on page 500 of a PDF manual. It will also provide links to buy the spare parts you need. Along the way, users can ask FixBot questions. Its voice command features are also designed to help anyone who’s elbow-deep in a repair and can’t reach their phone.

Source: iFixit Made an AI Assistant to Help You Fix Your Gadgets (and It’s Free, for Now)

And this is how you do useful AI

All of Russia’s Porsches Were Bricked By a Satellite Outage

Imagine walking out to your car, pressing the start button, and getting absolutely nothing. No crank, no lights on the dash, nothing. That’s exactly what happened to hundreds of Porsche owners in Russia last week. The issue is with the Vehicle Tracking System, a satellite-based security system that’s supposed to protect against theft. Instead, it turned these Porsches into driveway ornaments.

The issue was first reported at the end of November, with owners reporting identical symptoms of their cars refusing to start or shutting down soon after ignition. Russia’s largest dealership group, Rolf, confirmed that the problem stems from a complete loss of satellite connectivity to the VTS. When it loses its connection, it interprets the outage as a potential theft attempt and automatically activates the engine immobilizer.

What Actually Happened

The issue affects all models and engine types, meaning any Porsche equipped with the system could potentially disable itself without warning. The malfunction impacts Porsche models dating back to 2013 that have the factory VTS installed. This includes popular models like the Cayenne, Macan, Panamera, Taycan, 911, and the 718 Cayman and Boxster. When the VTS connection drops, the anti-theft protocol kicks in, cutting fuel delivery and locking down the engine completely.

[…]

Some drivers reported success after disconnecting their car batteries for up to 10 hours, while others managed to restore function by disabling or rebooting the VTS module entirely. Rolf dealerships have been instructing technicians to manually reset the alarm units, which often requires partially dismantling the vehicle. Some cars spring back to life immediately, while others remain stubbornly offline despite multiple attempts.

[…]

Source: All of Russia’s Porsches Were Bricked By a Mysterious Satellite Outage – Autoblog

Now you might say Fuck the Russians, but this is something that could happen anywhere and to anyone.

New EU Jolla Phone Now Available for Pre-Order as an Independent No Spyware Linux Phone

Jolla kicked off a campaign for a new Jolla Phone, which they call the independent European Do It Together (DIT) Linux phone, shaped by the people who use it.

“The Jolla Phone is not based on Big Tech technology. It is governed by European privacy thinking and a community-led model.”

The new Jolla Phone is powered by a high-performing Mediatek 5G SoC, and features 12GB RAM, 256GB storage that can be expanded to up to 2TB with a microSDXC card, a 6.36-inch FullHD AMOLED display with ~390ppi, 20:9 aspect ratio, and Gorilla Glass, and a user-replaceable 5,500mAh battery.

The Linux phone also features 4G/5G support with dual nano-SIM and a global roaming modem configuration, Wi-Fi 6 wireless, Bluetooth 5.4, NFC, 50MP Wide and 13MP Ultrawide main cameras, front front-facing wide-lens selfie camera, fingerprint reader on the power key, a user-changeable back cover, and an RGB indication LED.

On top of that, the new Jolla Phone promises a user-configurable physical Privacy Switch that lets you turn off the microphone, Bluetooth, Android apps, or whatever you wish.

The device will be available in three colors, including Snow White, Kaamos Black, and The Orange. All the specs of the new Jolla Phone were voted on by Sailfish OS community members over the past few months.

Honouring the original Jolla Phone form factor and design, the new model ships with Sailfish OS (with support for Android apps), a Linux-based European alternative to dominating mobile operating systems that promises a minimum of 5 years of support, no tracking, no calling home, and no hidden analytics.

“Mainstream phones send vast amounts of background data. A common Android phone sends megabytes of data per day to Google even if the device is not used at all. Sailfish OS stays silent unless you explicitly allow connections,” said Jolla.

The new Jolla Phone is now available for pre-order for 99 EUR and will only be produced if at least 2000 pre-orders are reached in one month from today, until January 4th, 2026. The full price of the Linux phone will be 499 EUR (incl. local VAT), and the 99 EUR pre-order price will be fully refundable and deducted from the full price.

The device will be manufactured and sold in Europe, but Jolla says that it will design the cellular band configuration to enable global travelling as much as possible, including e.g. roaming in the U.S. carrier networks. The initial sales markets are the EU, the UK, Switzerland, and Norway.

Source: New Jolla Phone Now Available for Pre-Order as an Independent Linux Phone – 9to5Linux