Pebble Watch Software Is Now 100% Open Source + Tick Talk #4 – PT2 Demos!

Another big Pebble update today! TLDR:

  • Yesterday, Pebble watch software was ~95% open source. Today, it’s 100% open source. You can download, compile and run all the software you need to use your Pebble. We just published the source code for the new Pebble mobile app!
  • Pebble Appstore now has a publicly available backup and supports multiple feeds, providing long term reliability through decentralization. We’ve launched our own feed and Developer Dashboard.
  • Pebble Time 2 schedule update (aiming to begin shipping in January, with most arriving on wrists in March/April)
  • New Tick Talk episode #4 is up, with Pebble Time 2 demos!

Pre-production Pebble Time 2 (Black/Red colourway) in all its glory

Source: Pebble Watch Software Is Now 100% Open Source + Tick Talk #4 – PT2 Demos!

Age Verification, Estimation, Assurance, Oh My! A Guide To The Terminology

If you’ve been following the wave of age-gating laws sweeping across the country and the globe, you’ve probably noticed that lawmakers, tech companies, and advocates all seem to be using different terms for what sounds like the same thing. Age verification, age assurance, age estimation, age gating—they get thrown around interchangeably, but they technically mean different things. And those differences matter a lot when we’re talking about your rights, your privacy, your data, and who gets to access information online.

[click the source link below to read the different definitions – ed]

Why This Confusion Matters

Politicians and tech companies love using these terms interchangeably because it obscures what they’re actually proposing. A law that requires “age assurance” sounds reasonable and moderate. But if that law defines age assurance as requiring government ID verification, it’s not moderate at all—it’s mass surveillance. Similarly, when Instagram says it’s using “age estimation” to protect teens, that sounds privacy-friendly. But when their estimation fails and forces you to upload your driver’s license instead, the privacy promise evaporates.

Here’s the uncomfortable truth: most lawmakers writing these bills have no idea how any of this technology actually works. They don’t know that age estimation systems routinely fail for people of color, trans individuals, and people with disabilities. They don’t know that verification systems have error rates. They don’t even seem to understand that the terms they’re using mean different things. The fact that their terminology is all over the place—using “age assurance,” “age verification,” and “age estimation” interchangeably—makes this ignorance painfully clear, and leaves the onus on platforms to choose whichever option best insulates them from liability.

Language matters because it shapes how we think about these systems. “Assurance” sounds gentle. “Verification” sounds official. “Estimation” sounds technical and impersonal, and also admits its inherent imprecision. But they all involve collecting your data and create a metaphysical age gate to the internet. The terminology is deliberately confusing, but the stakes are clear: it’s your privacy, your data, and your ability to access the internet without constant identity checks. Don’t let fuzzy language disguise what these systems really do.

Republished from EFF’s Deeplinks blog.

Source: Age Verification, Estimation, Assurance, Oh My! A Guide To The Terminology | Techdirt

The unpowered SSDs in your drawer are slowly losing your data

SSDs have all but replaced hard drives when it comes to primary storage. They’re orders of magnitude faster, more convenient, and consume less power than mechanical hard drives. That said, if you’re also using SSDs for cold storage, expecting the drives lying in your drawer to work perfectly after years, you might want to rethink your strategy

[…]

Unlike hard drives that magnetize spinning discs to store data, SSDs modify the electrical charge in NAND flash cells to represent 0 and 1. NAND flash retains data in underlying transistors even when power is removed, similar to other forms of non-volatile memory. However, the duration for which your SSD can retain data without power is the key here. Even the cheapest SSDs, say those with QLC NAND, can safely store data for about a year of being completely unpowered. More expensive TLC NAND can retain data for up to 3 years, while MLC and SLC NAND are good for 5 years and 10 years of unpowered storage, respectively.

The problem is that most consumer SSDs use only TLC or QLC NAND, so users who leave their SSDs unpowered for over a year are risking the integrity of their data. The reliability of QLC NAND has improved over the years, so you should probably consider 2–3 years of unpowered usage as the guardrails. Without power, the voltage stored in the NAND cells can be lost, either resulting in missing data or completely useless drives.

[…]

SSDs aren’t eternal, even if you keep them powered on forever. The limited write cycles of NAND flash will eventually bring an SSD to the end of its lifecycle, but the majority of users will probably replace the drive before that ever happens.

[…]

Source: The unpowered SSDs in your drawer are slowly losing your data

CISA: Spyware crews breaking into Signal, WhatsApp accounts

CISA has warned that state-backed snoops and cyber-mercenaries are actively abusing commercial spyware to break into Signal and WhatsApp accounts, hijack devices, and quietly rummage through the phones of what the agency calls “high-value” users.

In an alert published Monday, the US government’s cyber agency said it’s tracking multiple miscreants that are using a mix of phishing, bogus QR codes, malicious app impersonation, and, in some cases, full-blown zero-click exploits to compromise messaging apps which most people assume are safe.

The agency says the activity it’s seeing suggests an increasing focus on “high-value” individuals – everyone from current and former senior government, military, and political officials to civil society groups across the US, the Middle East, and Europe. In many of the campaigns, attackers delivered spyware first and asked questions later, using the foothold to deploy more payloads and deepen their access.

“CISA is aware of multiple cyber threat actors actively leveraging commercial spyware to target users of mobile messaging applications,” the agency said. “These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim’s messaging app, facilitating the deployment of additional malicious payloads that can further compromise the victim’s mobile device.”

The campaigns CISA flags in its bulletin show attackers doing what they do best: sidestepping encryption entirely by spoofing apps, abusing account features, and exploiting the phones underneath them.

For example, Google’s Threat Intelligence Group in February detailed how multiple Russia-aligned crews, including Sandworm and Turla, attempted to snoop on Signal users by abusing the app’s “linked devices” feature. By coaxing victims into scanning a tampered QR code, the operators could quietly add a second, attacker-controlled device to the account. Once paired, new messages flowed to both ends in real time, letting Moscow’s finest eavesdrop.

CISA also pointed to a separate line of Android exploitation work, spearheaded by Palo Alto Networks’ Unit 42, in which commercial-grade spyware known as LANDFALL was delivered to Samsung Galaxy devices. Uncovered earlier this month, this campaign combined a Samsung vulnerability with a zero-click WhatsApp exploit, allowing operators to slip a malicious image into a target’s inbox and have the device compromise itself on receipt.

Not all the activity relied on exploits. Several of the campaigns CISA cites – including ProSpy and ToSpy – made headway by impersonating familiar apps such as Signal and TikTok, hoovering up chat data, recordings, and files once it landed on a device. Meanwhile, Zimperium’s researchers identified ClayRat, an Android spyware family that has been seeded across Russia via counterfeit Telegram channels and lookalike phishing sites masquerading as WhatsApp, TikTok, and YouTube.

CISA’s alert lands amid heightened scrutiny of commercial spyware vendors. The US recently barred NSO Group from targeting WhatsApp users with Pegasus, and earlier this year, the US House of Representatives banned WhatsApp from staff devices after a string of security concerns. This move reflects the uncomfortable reality behind CISA’s warning: attackers aren’t breaking encrypted messengers, they’re simply burrowing under them. ®

Source: CISA: Spyware crews breaking into Signal, WhatsApp accounts • The Register

Danish manage to bypass democracy to implement mass EU surveillance, says it is “voluntary”

The EU states agree on a common position on chat control. Internet services should be allowed to read communication voluntarily, but will not be obliged [*cough – see bold and end of document: Ed*] to do so. We publish the classified negotiating protocol and bill. After the formal decision, the trilogue negotiations begin.

18.11.2025 at 14:03– Andre Meister – in surveillanceno additions

Man in suit at lectern, behind him flags.
Presidency of the Council: Danish Minister of Justice Hummelgaard. – CC-BY-NC-ND 4.0 Danish Presidency

The EU states have agreed on a common position on chat control. We publish the bill.

Last week, the Council working group discussed the law. We shall once again publish the classified minutes of the meeting.

Tomorrow, the Permanent Representatives want to officially decide on the position.

Update 19.10.: A Council spokesperson tells us, “The agenda item has been postponed until next week.”

Three years of dispute

For three and a half years, the EU institutions have been arguing over chat control. The Commission intends to oblige Internet services to search the content of their users without cause for information on criminal offences and to send them to authorities if suspected.

Parliament calls this mass surveillance and calls for only unencrypted content from suspects to be scanned.

A majority of EU countries want mandatory chat control. However, a blocking minority rejects this. Now the Council has agreed on a compromise. Internet services are not required to chat control, but may carry out a voluntary chat control.

Absolute red lines

The Danish Presidency wants to bring the draft law through the Council “as soon as possible” so that the trilogue negotiations can be started in a timely manner. The feedback from the states should be limited to “absolute red lines”.

The majority of states “supported the compromise proposal.” At least 15 spoke out in favour, including Germany and France.

Germany “welcomed both the deletion of the mandatory measures and the permanent anchoring of voluntary measures.”

Italy also sees voluntary chat control as skeptical. “We fear that the instrument could also be extended to other crimes, so we have difficulty supporting the proposal.” Politicians have already called for chat control to be extended to other content.

Absolute minimum consensus

Other states called the compromise “an absolute minimum consensus.” They “actually wanted more – especially in the sense of commitments.” Some states “showed themselves clearly disappointed by the cancellations made.”

Spain, in particular, “still considered mandatory measures to be necessary, unfortunately, a comprehensive agreement on this was not possible.” Hungary, too, “saw volunteerism as the sole concept as too little.”

Spain, Hungary and Bulgaria proposed “an obligation for providers to have to expose at least in open areas.” The Danish Presidency “described the proposal as ambitious, but did not take it up to avoid further discussion.”

Denmark explicitly pointed to the review clause. Thus, “the possibility of detection orders is kept open at a later date.” Hungary stressed that “this possibility must also be used.”

No obligation

The Danish Presidency had publicly announced that the chat control should not be mandatory, but voluntary.

However, the formulated compromise proposal was contradictory. She had deleted the article on mandatory chat control. However, another article said services should also carry out voluntary measures.

Several states have asked whether these formulations “could lead to a de facto obligation.” The Legal Services agreed: “The wording can be interpreted in both directions.” The Presidency of the Council “clarified that the text only had a risk mitigation obligation, but not a commitment to detection.”

The day after the meeting, the presidency of the Council sent out the likely final draft law of the Council. It states explicitly: ‘No provision of this Regulation shall be interpreted as imposing obligations of detection obligations on providers’.

Damage and abuse

Mandatory chat control is not the only issue in the planned law. Voluntary chat control is also prohibited. The European Commission cannot prove its proportionality. Many oppose voluntary chat control, including the EU Commission, the European Data Protection Supervisor and the German Data Protection Supervisor.

A number of scientists are critical of the compromise proposal. The voluntary chat control does not designate it to be appropriate. “Their benefit is not proven, while the potential for harm and abuse is enormous.”

The law also calls for mandatory age checks. The scientists criticize that age checks “bring with it an inherent and disproportionate risk of serious data breaches and discrimination without guaranteeing their effectiveness.” The Federal Data Protection Officer also fears a “large-scale abolition of anonymity on the Internet.”

Now follows Trilog

The EU countries will not discuss these points further. The Danish Presidency “reaffirmed its commitment to the compromise proposal without the Spanish proposals.”

The Permanent Representatives of the EU States will meet next week. In December, the justice and interior ministers meet. These two bodies are to adopt the bill as the official position of the Council.

This is followed by the trilogue. There, the Commission, Parliament and the Council negotiate to reach a compromise from their three separate bills.

[…]

A “risk mitigation obligation” can be used to explain anything and obligate spying through whatever services the EU says there is “risk”

Source: Translated from EU states agree on voluntary chat control

Considering the whole proposal was shot down several times in the past years and even past month, using a back door rush to push this through is not how a democracy is supposed to function at all. And this is how fascism grips it’s iron claws. What is going on in Demark?

For more information on the history of Chat Control click here

Microsoft adds tables support to Windows Notepad. More stuff nobody wants.

Microsoft is shoveling yet more features into the venerable Windows Notepad. This time it’s support for tables, with some AI enhancements lathered on top.

Notepad might predate Windows, but Microsoft is still keen to add features to it. After adding support for Markdown in June, replete with simple text formatting options, Microsoft has now added table support.

The new functionality is rolling out to Windows Insiders in the Canary and Dev channels, and “you can now easily insert tables in your document to help structure your notes,” according to Microsoft.

We’re not sure who was clamoring for this feature, which, to be frank, would be better suited to a rich text editor. Microsoft already had one of those – WordPad – but removed it from Windows in 2024.

[…]

Source: Microsoft adds tables support to Windows Notepad • The Register

5 ancient bugs in Fluent Bit put major clouds at risk

A series of “trivial-to-exploit” vulnerabilities in Fluent Bit, an open source log collection tool that runs in every major cloud and AI lab, was left open for years, giving attackers an exploit chain to completely disrupt cloud services and alter data.

The Oligo Security research team found the five vulnerabilities and – in coordination with the project’s maintainers – on Monday published details about the bugs that allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags.

Updating to the latest stable version, v4.1.1 / 4.0.12, fixes the flaws.

Fluent Bit, an open source project maintained by Chronosphere, is used by major cloud providers and tech giants, including Google, Amazon, Oracle, IBM, and Microsoft, to collect and route data.

It’s a lightweight telemetry data agent and processor for logs, metrics, and traces, and it has more than 15 billion deployments. At KubeCon earlier this month, OpenAI said it runs Fluent Bit on all of its Kubernetes nodes.

It’s been around for 14 years, and at least one of the newly disclosed bugs, a path-traversal flaw now tracked as CVE 2025-12972, has left cloud environments vulnerable for more than 8 years, according to Oligo Security researcher Uri Katz.

This, Katz told The Register, is because “the file-output behavior that makes path traversal possible has been a part of Fluent Bit since its early architecture. The other issues aren’t quite as old but are still long-standing.”

Most of these vulnerabilities are due to a new plugin being introduced, he added. “We can see based on code history, the tag-handling flaw behind CVE-2025-12977 has been present for at least four years, and the Docker input buffer overflow (CVE-2025-12970) goes back roughly 6 years.”

[…]

The five CVEs are:

CVE-2025-12977, a partial string comparison vulnerability in the tag_key configuration option. Affected inputs: HTTP, Splunk, Elasticsearch.

This type of flaw occurs when a program accepts a partial input string as a match for a complete string (like a password, username, or file path), and in this case, the vulnerability allows an attacker to control the value of tags – thus determining how and where the log data is processed – without knowing the tag_key value.

“An attacker with network access to a fluentbit http input server, Elasticsearch input data or Splunk input data, can send a json with a key from A-Z 0-9 essentially making sure one of the characters will match the key allowing them to control the tag value,” the Oligo researchers wrote. “An attacker could hijack routing, inject fake or malicious records under trusted tags, bypass filters or monitoring, and confuse downstream systems so logs end up in unexpected databases, dashboards, or alerting tools.”

CVE-2025-12978 is due to improper input validation on tag_key records. Affected inputs: HTTP, Splunk, Elasticsearch.

Fluent Bit’s tag_key option lets record fields bypass the normal sanitization process and define tags directly, which can lead to path traversal, injection, or unexpected file writes in downstream outputs.

CVE-2025-12972, a path traversal vulnerability in the File output plugin.

Vulnerable configurations:

  • Any configuration where the Tag value can be controlled (directly or indirectly) and the file output lacks a defined File key.
  • HTTP input with tag_key set and file output missing the File key.
  • Splunk input with tag_key set and file output missing the File key.
  • Elasticsearch input with tag_key set and file output missing the File key.
  • Forward input combined with file output missing the File key.

Again, because Fluent Bit uses tags straight from incoming logs without sanitizing them, attackers can use path traversal characters “../” in the tag to change the file path and name. “Since attackers can also partially control the data written to the file, this can lead to RCE on many systems,” the researchers warn.

CVE-2025-12970, a stack buffer overflow bug in the in_docker plugin, used to collect Docker container metrics.

Fluent Bit copies a container’s name into a fixed 256-byte buffer without checking its length, and this means a long container name can overflow that stack buffer. An attacker who can control container names or create containers can use a long name to trigger a stack overflow and crash the agent or execute code. “In a worse scenario, the overflow could let an attacker run code as the agent, letting them steal secrets from the host, install a backdoor, or move laterally to other services,” according to the bug hunters.

CVE-2025-12969, an authentication bypass vulnerability in the in_forward plugin – this is a network input plugin that receives logs from other Fluent Bit or Fluentd instances.

The researchers found that if the security.users configuration option is specified, no authentication occurs. This could allow all manner of nefarious activity including spamming security alerts to hide actual malicious behavior, injecting false telemetry to hide attackers’ activity, overwriting or exfiltrating logs, or feeding misleading data into detection pipelines.

Worst-case scenario

“A hypothetical worst-case scenario would be an attacker chaining these flaws together,” Katz said. “For example: an attacker sends a crafted log message that abuses the tag_key vulnerabilities (CVE-2025-12977 / CVE-2025-12978) and then embeds path-traversal characters to trigger the file-write vulnerability (CVE-2025-12972). That lets the attacker overwrite files on the host and escalate to remote code execution.”

Additionally, because Fluent Bit is commonly deployed as a Kubernetes DaemonSet, “a single compromised log agent can cascade into full node and cluster takeover, with the attacker tampering with logs to hide their activity and establishing long-term persistence across all nodes,” he added.

[…]

Source: Years-old bugs in open source took out major clouds at risk • The Register

DOGE Is Officially Dead, all government data still in Musk’s hands though

After months of controversy, Elon Musk and Donald Trump’s failed passion project to cut costs across the federal government is officially dead, ahead of schedule.

Earlier this month, Office of Personnel Management director Scott Kupor told Reuters that the Department of Government Efficiency “doesn’t exist.”

Even though there are eight more months left on its mandate, DOGE is no longer a “centralized entity,” according to Kupor. Instead, the Office of Personnel Management, an existing independent agency that has been overseeing the federal workforce for decades, will be taking over most of DOGE’s functions

[…]

DOGE had a short but eventful life. Trump announced the creation of the “agency” immediately after his election last year. The cuts began shortly after Trump took office, with Musk taking a figurative and literal chainsaw to the federal government. With DOGE, Musk completely gutted the Department of Education, laid off a good chunk of the government’s cybersecurity officials, caused the deaths of an estimated 638 thousand people around the world with funding cuts to USAID, and stripped more than a quarter of the Internal Revenue Service’s workforce (most of these positions are now reportedly being filled by AI agents). Several DOGE staffers have also since ended up practically taking over other federal agencies like the Department of Health and Human Services and the Social Security Administration.

All that carnage ended up being for practically nothing. A Politico analysis from earlier this year claimed that even though DOGE purported to have saved Americans billions of dollars, only a fraction of that has been realized. Another report, this time by the Senate Permanent Subcommittee on Investigations, said that DOGE ended up spending more money than it saved while trying to downsize the government. Musk Watch, a tracker set up by veteran independent journalists, has been able to verify $16.3 billion in federal cuts, significantly less than the $165 billion that DOGE has claimed in the past, and a drop in the bucket compared to DOGE’s original claim that it would eliminate $2 trillion in spending.

[…]

Source: DOGE Is Officially Dead

Why is nobody talking about the datagrab that Musk has performed?

Ukraine Is Jamming Russia’s ‘Superweapon’ With a Song

The Ukrainian Army is knocking a once-hyped Russian superweapon out of the sky by jamming it with a song and tricking it into thinking it’s in Lima, Peru. The Kremlin once called its Kh-47M2 Kinzhal ballistic missiles “invincible.” Joe Biden said the missile was “almost impossible to stop.” Now Ukrainian electronic warfare experts say they can counter the Kinzhal with some music and a re-direction order.

[…]

Kinzhals and other guided munitions navigate by communicating with Russian satellites that are part of the GLONASS system, a GPS-style navigation network. Night Watch uses a jamming system called Lima EW to generate a disruption field that prevents anything in the area from communicating with a satellite. Many traditional jamming systems work by blasting receivers on munitions and aircraft with radio noise. Lima does that, but also sends along a digital signal and spoofs navigation signals. It “hacks” the receiver it’s communicating with to throw it off course.

Night Watch shared pictures of the downed Kinzhals with 404 Media that showed a missile with a controlled reception pattern antenna (CRPA), an active antenna that’s meant to resist jamming and spoofing. “We discovered that this missile had pretty old type of technology,” Night Watch said. “They had the same type of receivers as old Soviet missiles used to have. So there is nothing special, there is nothing new in those types of missiles.”

Night Watch told 404 Media that it used this Lima to take down 19 Kinzhals in the past two weeks. First, it replaces the missile’s satellite navigation signals with the Ukrainian song “Our Father Is Bandera.”

A downed Kinzhal. Night Watch photo.

Any digital noise or random signal would work to jam the navigation system, but Night Watch wanted to use the song because they think it’s funny. “We just send a song…we just make it into binary code, you know, like 010101, and just send it to the Russian navigation system,” Night Watch said. “It’s just kind of a joke. [Bandera] is a Ukrainian nationalist and Russia tries to use this person in their propaganda to say all Ukrainians are Nazis. They always try to scare the Russian people that Ukrainians are, culturally, all the same as Bandera.”

💡
Do you know anything else about this story? I would love to hear from you. Using a non-work device, you can message me securely on Signal at +1 347 762-9212 or send me an email at matthew@404media.co.

Once the song hits, Night Watch uses Lima to spoof a navigation signal to the missiles and make them think they’re in Lima, Peru. Once the missile’s confused about its location, it attempts to change direction. These missiles are fast—launched from a MiG-31 they can hit speeds of up to Mach 5.7 or more than 4,000 miles per hour—and an object moving that fast doesn’t fare well with sudden changes of direction.

“The airframe cannot withstand the excessive stress and the missile naturally fails,” Night Watch said. “When the Kinzhal missile tried to quickly change navigation, the fuselage of this missile was unable to handle the speed…and, yeah., it was just cut into two parts…the biggest advantage of those missiles, speed, was used against them. So that’s why we have intercepted 19 missiles for the last two weeks.”

Electronics in a downed Kinzhal. Night Watch photo.

Night Watch told 404 Media that Russia is attempting to defeat the Lima system by loading the missiles with more of the old tech. The goal seems to be to use the different receivers to hop frequencies and avoid Lima’s signal.

“What is Russia trying to do? Increase the amount of receivers on those missiles. They used to have eight receivers and right now they increase it up to 12, but it will not help,” Night Watch said. “The last one we intercepted, they already used 16 receivers. It’s pretty useless, that type of modification.”

[…]

Source: Ukraine Is Jamming Russia’s ‘Superweapon’ With a Song

Makers slam Qualcomm for tightening the clamps on Arduino. Guess everyone will move to ESP32 now.

Qualcomm quietly rewrote the terms of service for its newest acquisition, programmable microcontroller and SBC maker Arduino, drawing intense fire from the maker community for grabbing additional rights to user-generated content on its platform and prohibiting reverse-engineering of what was once very open software.

In a level of open criticism that’s unusually frank for Microsoft’s corporate-friendly business-networking site, hobbyist electronics vendor Adafruit published a stinging assessment of the rewritten terms and conditions for Qualcomm’s new subsidiary Arduino, saying that “the changes mark a clear break from the open-hardware ethos that built the platform.”

The New York-based open-source electronics vendor has harsh views about the new Arduino Privacy Policy and new Terms and Conditions. Among its comments, Adafruit’s post says:

The new documents introduce an irrevocable, perpetual license over anything users upload, broad surveillance-style monitoring of AI features, a clause preventing users from identifying potential patent infringement, years-long retention of usernames even after account deletion, and the integration of all user data (including minors) into Qualcomm’s global data ecosystem.

If that were not worrying enough, it notes:

Users are now explicitly forbidden from reverse-engineering or even attempting to understand how the platform works unless Arduino gives permission.

[…]

Source: Makers slam Qualcomm for tightening the clamps on Arduino • The Register

Google says hackers stole data from 200 companies following Salesforce / Gainsight breach

Google has confirmed that hackers have stolen the Salesforce-stored data of more than 200 companies in a large-scale supply chain hack.

On Thursday, Salesforce disclosed a breach of “certain customers’ Salesforce data” — without naming affected companies — that was stolen via apps published by Gainsight, which provides a customer support platform to other companies.

In a statement, Austin Larsen, the principal threat analyst of Google Threat Intelligence Group, said that the company “is aware of more than 200 potentially affected Salesforce instances.”

After Salesforce announced the breach, the notorious and somewhat-nebulous hacking group known as Scattered Lapsus$ Hunters, which includes the ShinyHunters gang, claimed responsibility for the hacks in a Telegram channel, which TechCrunch has seen.

The hacking group claimed responsibility for hacks affecting Atlassian, CrowdStrike, Docusign, F5, GitLab, Linkedin, Malwarebytes, SonicWall, Thomson Reuters, and Verizon.

Google would not comment on specific victims.

CrowdStrike’s spokesperson Kevin Benacci told TechCrunch in a statement that the company is “not affected by the Gainsight issue and all customer data remains secure.” CrowdStrike confirmed to TechCrunch that it terminated a “suspicious insider” for allegedly passing information to hackers.

TechCrunch reached out to all the companies mentioned by Scattered Lapsus$ Hunters.

Verizon spokesperson Kevin Israel said in a statement that “Verizon is aware of the unsubstantiated claim by the threat actor,” without providing evidence for this claim.

Malwarebytes spokesperson Ashley Stewart told TechCrunch that the company’s security team is “aware” of the Gainsight and Salesforce issues and “actively investigating the matter.”

A spokesperson for Thomson Reuters said the company is “actively investigating.”

Michael Adams, the chief information security officer at Docusign told TechCrunch in a statement that “following a comprehensive log analysis and internal investigation, we have no indication of Docusign data compromise at this time.” However, Adams said that, “out of an abundance of caution, we have taken a number of measures including terminating all Gainsight integrations and containing related data flows.”

At the time of publishing, none of the other companies responded to requests for comment.

Hackers with the ShinyHunters group told TechCrunch in an online chat that they gained access to Gainsight thanks to their previous hacking campaign that targeted customers of Salesloft, which provides an AI and chatbot-powered marketing platform called Drift. In that earlier case, the hackers stole Drift authentication tokens from those customers, allowing the hackers to break into their linked Salesforce instances and download their contents.

At the time, Gainsight confirmed it was among the victims of that hacking campaign.

“Gainsight was a customer of Salesloft Drift, they were affected and therefore compromised entirely by us,” a spokesperson for the ShinyHunters group told TechCrunch.

Salesforce spokesperson Nicole Aranda told TechCrunch that “as a matter of policy, Salesforce does not comment on specific customer issues.”

Gainsight did not respond to TechCrunch’s requests for comment.

On Thursday, Salesforce said there is “no indication that this issue resulted from any vulnerability in the Salesforce platform,” effectively distancing itself from its customers’ data breaches.

Gainsight has been publishing updates about the incident on its incident page. On Friday, the company said that it is now working with Google’s incident response unit Mandiant to help investigate the breach, that the incident in question “originated from the applications’ external connection — not from any issue or vulnerability within the Salesforce platform,” and that “a forensic analysis is continuing as part of a comprehensive and independent review.”

“Salesforce has temporarily revoked active access tokens for Gainsight-connected apps as a precautionary measure while their investigation into unusual activity continues,” according to Gainsight’s incident page, which said Salesforce is notifying affected customers whose data was stolen.

In its Telegram channel, Scattered Lapsus$ Hunters said it plans to launch a dedicated website to extort the victims of its latest campaign by next week. This is the group’s modus operandi; in October, the hackers also published a similar extortion website after stealing victims’ Salesforce data in the Salesloft incident.

The Scattered Lapsus$ Hunters is a collective of English-speaking hackers made up of several cybercriminal gangs, including ShinyHunters, Scattered Spider, and Lapsus$, whose members use social engineering tactics to trick company employees into granting the hackers access to their systems or databases. In the last few years, these groups have claimed several high-profile victims, such as MGM Resorts, Coinbase, DoorDash, and more.

Source: Google says hackers stole data from 200 companies following Gainsight breach | TechCrunch

“Elites” wield huge influence over deepening polarization—now we can tell exactly how much

Political systems become polarized when internal unity within groups strengthens and the divide between them deepens. As polarization intensifies, societal tensions can grow, making it difficult to find compromises. The intensity of polarization has been measured in research, but until now its structural roots in social media have remained obscure.

Now, researchers from Aalto University have used network theory to develop a method for measuring the impact of individuals on societal division. While the method can be applied to any case around which social media data can be gathered, the initial study utilized Twitter data collected before Finland’s 2019 and 2023 parliamentary elections.

The results, published in the journal Network Science, reveal how a relatively small elite can have a disproportionately large influence on shaping polarizing environments.

“We know that size, or the activity level of a group or groups, don’t necessarily correlate with how divided society is on a particular issue,” explains network scientist Ali Salloum, a doctoral researcher, and lead author of the study.

“The method we came up with identifies the elite and the mass entirely through an algorithm––quantifying how much each contributes to the overall divide.”

The team analyzed 12 weeks of Twitter (now X) data preceding both elections, as the platform offers one of the clearest views into Finland’s digital polarization dynamics. Based on core-periphery theory, hierarchical groups were identified, with participants classified algorithmically as elite or mass. Established community detection techniques were then used to map the location of elites on the political spectrum.

“Not all thought leaders––the so-called elite––are politicians. But even without knowing exactly who they are, we can infer their status from the network’s structure. You don’t end up at the center by accident,” Salloum says.

According to the researchers, an elite cluster may include only a few hundred individuals, yet account for a striking share of overall polarization. The study is the first to demonstrate this imbalance quantitatively.

The road to deadlock

Another key finding is that the algorithmically identified elite has become increasingly aligned in its views. Alignment refers to the likelihood that a person’s stance on one issue correlates with their opinions on other topics –– for example, in matters of climate or immigration policy.

“In democracies, it’s healthy––even desirable––to disagree sharply on individual issues. But when alignment becomes complete, society splits into just two camps that disagree on absolutely everything––there’s nothing left in common with the other side,” says Mikko Kivelä, Professor of Computer Science at Aalto University and co-author of the study.

When hatred and suspicion towards those with different worldviews overshadow the importance of the best argument in political issues, or when interactions between people from different backgrounds dwindle, societal, and even individual well-being can significantly regress.

In the Finnish case study, it was revealed that by 2023 alignment had almost reached its zenith among elites. For example, a progressive stance on climate almost certainly meant a correspondingly progressive view on immigration, and vice versa, while conservative social views almost always paired with conservative opinions on economics. In other words, over four years, thought-leaders had become intractably siloed –– a red flag for a functioning democracy.

“One of the most serious consequences of polarization and alignment––beyond the threat of political violence––is political gridlock. Legislation slows down and weakens, poor-quality decisions are made, or no decisions are made at all,” says Salloum.

Political pressure needed to restore access to data

Unfortunately, polarization data can no longer be studied through X, as owner Elon Musk has restricted researchers’ access to user data. Despite this, the researchers hope to apply the method to other nations and contexts.

“I have no reason not to assume this is a global phenomenon,” says Salloum, for whom the next step is to study US and European data from Bluesky. However, ongoing research depends on having access to data, a point that frustrates Salloum.

“We have seen for decades how important ‘information influence’ data like this is. It gives huge insights into mis- and disinformation, and the state of our democracies generally. Yet, one of the biggest platforms shuts down its APIs and suddenly there’s no access,” he says.

“It’s especially frustrating when we already know what’s inside the black box, and the value of all that data that the platforms control. By law, researchers should have access, but it’s not being followed. In my opinion, we don’t have enough political pressure directed at keeping these platforms transparent and open,” he concludes.

More information: Ali Salloum et al, Anatomy of elite and mass polarization in social networks, Network Science (2025). DOI: 10.1017/n

Source: Elites wield huge influence over deepening polarization—now we can tell exactly how much

Moss spores survive and germinate after 283-day ‘space walk’ | New Scientist

On 4 March 2022, astronauts locked 20,000 moss spores outside the International Space Station and left them exposed to the rigours of space for 283 days. They then rescued the spores and returned them to Earth on a SpaceX capsule so that scientists could attempt to germinate them. Surprisingly, these attempts were successful.

Mosses were among the earliest land plants and are well known for colonising some of the harshest environments on Earth – Antarctica, volcanic fields and deserts, says Tomomichi Fujita at Hokkaido University in Japan, who was on the team that ran the experiment.

“We wondered whether their spores might also survive exposure to outer space – one of the most extreme environments imaginable,” he says.

[…]

A control group of spores that had stayed on Earth had a germination rate of 97 per cent, as did another set of spores that were exposed to space but shielded from the damaging ultraviolet radiation found there.

Most astonishingly, over 80 per cent of the spores that were exposed to the full brunt of space – a vacuum, extreme temperatures, microgravity, UV and cosmic radiation – remained viable and germinated into normal plants. The team predicted it is possible that, based on the results of these experiments, some of the spores could remain viable in space for 15 years.

[…]

Fujita says the multiple layers of spore walls that encase the reproductive tissue appear to offer “passive shielding against space stresses”.

He says it is as if the spores are inside their own spacecraft. This might have been an adaptive feature they developed to cope with the harsh environmental conditions that existed on land when life first moved out of the oceans hundreds of millions of years ago.

[…]

David Eldridge at the University of New South Wales in Sydney says the true test isn’t whether the spores will germinate once back on Earth, but whether they can also germinate in space.

“The trick will be to check the growth rates of these taxa in space and see whether they can reproduce,” he says.

Source: Moss spores survive and germinate after 283-day ‘space walk’ | New Scientist

British laser weapon downs drones off coast of Scotland

Britain’s DragonFire laser has destroyed high speed drones during recent trials at the MOD Hebrides range, with the Ministry of Defence announcing a 316 million pound contract for MBDA UK to deliver the first ship fitted systems from 2027, the organisation stated.

According to the MOD, the trials involved targets travelling at speeds up to 650 kilometres per hour and included what it describes as a UK first in above the horizon tracking, targeting and engagement.

The department highlights the system’s low cost per shot and its claimed precision at long range. It says DragonFire will be installed on a Type 45 destroyer on a timeline the government describes as significantly accelerated.

Defence Readiness and Industry Minister Luke Pollard MP said in the release “This high power laser will see our Royal Navy at the leading edge of innovation in NATO, delivering a cutting edge capability to help defend the UK and our allies in this new era of threat.”

Scottish Secretary Douglas Alexander said in the release “This new 316 million pound contract award and news that DragonFire has successfully taken down high speed drones in the latest trials at the MoD’s Hebrides range shows just how vital Scottish expertise is to the UK’s national security.”

Senior industry partners also spoke on the programme’s momentum. Chris Allam, Managing Director of MBDA UK, stated in the release “This latest contract for DragonFire is another significant milestone. It allows us to continue with the next phase of the programme and re affirms the UK’s intent to be at the forefront of laser directed energy weapons.”

QinetiQ Group CEO Steve Wadey said in the release “The DragonFire programme is delivering the ambition of the Strategic Defence Review, with industry experts working in collaboration with government to get disruptive, next generation technology into the hands of our warfighters at pace.”

Mark Stead, Senior Vice President for Radar and Advanced Targeting at Leonardo UK, said in the release “Leonardo has channelled its decades of experience developing world leading lasers to produce DragonFire’s beam director, which harnesses and directs the powerful laser energy on target.”

DragonFire is the first high-power laser system entering service from a European nation; it is one of NATO’s most advanced directed energy programmes.

Source: British laser weapon downs drones off coast of Scotland

European Commission in pocket of US Big Tech  to massively rollback digital protections in Digital domain

The European Commission has been accused of “a massive rollback” of the EU’s digital rules after announcing proposals to delay central parts of the Artificial Intelligence Act and water down its landmark data protection regulation.

If agreed, the changes would make it easier for tech firms to use personal data to train AI models without asking for consent, and try to end “cookie banner fatigue” by reducing the number times internet users have to give their permission to being tracked on the internet.

The commission also confirmed the intention to delay the introduction of central parts of the AI Act, which came into force in August 2024 and does not yet fully apply to companies.

Companies making high-risk AI systems, namely those posing risks to health, safety or fundamental rights, such as those used in exam scoring or surgery, would get up to 18 months longer to comply with the rules.

The plans were part of the commission’s “digital omnibus”, which tries to streamline tech rules including GDPR, the AI Act, the ePrivacy directive and the Data Act.

After a long period of rule-making, the EU agenda has shifted since the former Italian prime minister Mario Draghi warned in a report last autumn that Europe had fallen behind the US and China in innovation and was weak in the emerging technologies that would drive future growth, such as AI. The EU has also come under heavy pressure from the Trump administration to rein in digital laws.

[…]

They are part of the bloc’s wider drive for “simplification”, with plans under way to scale back regulation on the environment, company reporting on supply chains and agriculture. Like these other proposals, the digital omnibus will need to be approved by EU minsters and the European parliament.

European Digital Rights (EDRi), a pan-European network of NGOs, described the plans as “a major rollback of EU digital protections” that risked dismantling “the very foundations of human rights and tech policy in the EU”.

In particular, it said that changes to GDPR would allow “the unchecked use of people’s most intimate data for training AI systems” and that a wide range of exemptions proposed to online privacy rules would mean businesses would be able to read data on phones and browsers without asking.

European business groups welcomed the proposals but said they did not go far enough. A representative from the Computer and Communications Industry Association, whose members include Amazon, Apple, Google and Meta, said: “Efforts to simplify digital and tech rules cannot stop here.” The CCIA urged “a more ambitious, all-encompassing review of the EU’s entire digital rulebook”.

Critics of the shake-up included the EU’s former commissioner for enterprise, Thierry Breton, who wrote in the Guardian that Europe should resist attempts to unravel its digital rulebook “under the pretext of simplification or remedying an alleged ‘anti-innovation’ bias. No one is fooled over the transatlantic origin of these attempts.”

[…]

Source: European Commission accused of ‘massive rollback’ of digital protections | European Commission | The Guardian

Yes, the simplification change allowing cookie consent to be stored in the browser is a good one. Allowing AI systems to run amok without proper oversight, especially in high risk domains and allowing large companies to do so without rules only benefits the players that can afford to play in these domains: namely the far right by introducing more mass surveillance tools and big (US) tech.

Manipulating the meeting notetaker: The rise of AI summarization optimization

These days, the most important meeting attendee isn’t a person: It’s the AI notetaker.

This system assigns action items and determines the importance of what is said. If it becomes necessary to revisit the facts of the meeting, its summary is treated as impartial evidence.

But clever meeting attendees can manipulate this system’s record by speaking more to what the underlying AI weights for summarization and importance than to their colleagues. As a result, you can expect some meeting attendees to use language more likely to be captured in summaries, timing their interventions strategically, repeating key points, and employing formulaic phrasing that AI models are more likely to pick up on. Welcome to the world of AI summarization optimization (AISO).

Optimizing for algorithmic manipulation

AI summarization optimization has a well-known precursor: SEO.

Search-engine optimization is as old as the World Wide Web. The idea is straightforward: Search engines scour the internet digesting every possible page, with the goal of serving the best results to every possible query. The objective for a content creator, company, or cause is to optimize for the algorithm search engines have developed to determine their webpage rankings for those queries. That requires writing for two audiences at once: human readers and the search-engine crawlers indexing content. Techniques to do this effectively are passed around like trade secrets, and a $75 billion industry offers SEO services to organizations of all sizes.

More recently, researchers have documented techniques for influencing AI responses, including large-language model optimization (LLMO) and generative engine optimization (GEO). Tricks include content optimization — adding citations and statistics — and adversarial approaches: using specially crafted text sequences. These techniques often target sources that LLMs heavily reference, such as Reddit, which is claimed to be cited in 40% of AI-generated responses. The effectiveness and real-world applicability of these methods remains limited and largely experimental, although there is substantial evidence that countries such as Russia are actively pursuing this.

AI summarization optimization follows the same logic on a smaller scale. Human participants in a meeting may want a certain fact highlighted in the record, or their perspective to be reflected as the authoritative one. Rather than persuading colleagues directly, they adapt their speech for the notetaker that will later define the “official” summary. For example:

  • “The main factor in last quarter’s delay was supply chain disruption.”
  • “The key outcome was overwhelmingly positive client feedback.”
  • “Our takeaway here is in alignment moving forward.”
  • “What matters here is the efficiency gains, not the temporary cost overrun.”

The techniques are subtle. They employ high-signal phrases such as “key takeaway” and “action item,” keep statements short and clear, and repeat them when possible. They also use contrastive framing (“this, not that”), and speak early in the meeting or at transition points.

Once spoken words are transcribed, they enter the model’s input. Cue phrases — and even transcription errors — can steer what makes it into the summary. In many tools, the output format itself is also a signal: Summarizers often offer sections such as “Key Takeaways” or “Action Items,” so language that mirrors those headings is more likely to be included. In effect, well-chosen phrases function as implicit markers that guide the AI toward inclusion.

Research confirms this. Early AI summarization research showed that models trained to reconstruct summary-style sentences systematically overweigh such content. Models over-rely on early-position content in news. And models often overweigh statements at the start or end of a transcript, underweighting the middle. Recent work further confirms vulnerability to phrasing-based manipulation: models cannot reliably distinguish embedded instructions from ordinary content, especially when phrasing mimics salient cues.

How to combat AISO

If AISO becomes common, three forms of defense will emerge. First, meeting participants will exert social pressure on one another. When researchers secretly deployed AI bots in Reddit’s r/changemyview community, users and moderators responded with strong backlash calling it “psychological manipulation.” Anyone using obvious AI-gaming phrases may face similar disapproval.

Second, organizations will start governing meeting behavior using AI: risk assessments and access restrictions before the meetings even start, detection of AISO techniques in meetings, and validation and auditing after the meetings.

Third, AI summarizers will have their own technical countermeasures. For example, the AI security company CloudSEK recommends content sanitization to strip suspicious inputs, prompt filtering to detect meta-instructions and excessive repetition, context window balancing to weight repeated content less heavily, and user warnings showing content provenance.

Broader defenses could draw from security and AI safety research: preprocessing content to detect dangerous patterns, consensus approaches requiring consistency thresholds, self-reflection techniques to detect manipulative content, and human oversight protocols for critical decisions. Meeting-specific systems could implement additional defenses: tagging inputs by provenance, weighting content by speaker role or centrality with sentence-level importance scoring, and discounting high-signal phrases while favoring consensus over fervor.

Reshaping human behavior

AI summarization optimization is a small, subtle shift, but it illustrates how the adoption of AI is reshaping human behavior in unexpected ways. The potential implications are quietly profound.

Meetings — humanity’s most fundamental collaborative ritual — are being silently reengineered by those who understand the algorithm’s preferences. The articulate are gaining an invisible advantage over the wise. Adversarial thinking is becoming routine, embedded in the most ordinary workplace rituals, and, as AI becomes embedded in organizational life, strategic interactions with AI notetakers and summarizers may soon be a necessary executive skill for navigating corporate culture.

AI summarization optimization illustrates how quickly humans adapt communication strategies to new technologies. As AI becomes more embedded in workplace communication, recognizing these emerging patterns may prove increasingly important.

Source: Manipulating the meeting notetaker: The rise of AI summarization optimization | CSO Online

Boston Dynamics Robot Dog Is Becoming Standard in Policing

Spot, the four-legged robot from Boston Dynamics Inc., is perhaps best known for its viral dance routines to songs like “Uptown Funk.” But beyond its playful antics, Spot’s ability to climb stairs and open doors signals a potentially controversial role as a policing tool.

Five years after its commercial debut, the 75-pound, German Shepherd-sized robot is increasingly being deployed by local law enforcement to handle armed standoffs, hostage rescues and hazardous materials incidents — situations where sending in a human or a real dog could be life-threatening.

More than 60 bomb squads and SWAT teams in the US and Canada are now using Spot, according to previously unreported data shared by Boston Dynamics with Bloomberg News.

[…]

Spot’s role on law enforcement teams varies. In 2022, it approached a man who had crashed a car trying to kidnap his son in St. Petersburg, Florida, to keep an eye on the situation and see if he was armed. In Massachusetts last year, in two different incidents, it helped assess a chemical waste accident at a middle school in North Andover, and it intervened when a suspect in Hyannis took his mother hostage at knifepoint and fired at officers. Spot was deployed to corner him and police eventually followed with tear gas to apprehend him.

“It did its job,” said trooper John Ragosa, a Massachusetts State Police bomb squad member and the Spot operator assigned to the hostage-rescue mission. “The suspect was stunned, thinking ‘What is this dog?’”

The robot, which starts at around $100,000, can operate autonomously in many cases — performing maintenance checks, detecting gas leaks and inspecting faulty equipment — but still relies on human operators like Ragosa for decision making. Using a tablet that resembles a video game controller, an operator guides the machine while monitoring a live video feed from its onboard camera system. Additional built-in sensors handle navigation and mapping. During high-stakes situations, officers can also view the live feed on larger nearby screens.

Spot’s technology continues to evolve. The company recently added a mode to help Spot navigate slippery spots. And it’s working to help Spot better manipulate objects in the real world.

[…]

Roughly 2,000 Spot units are now in operation globally, Boston Dynamics said. The deployments include organizations such as the Dutch Ministry of Defense and Italy’s national police. While most of the company’s customers are still industrial clients, including manufacturers and utility providers, interest from law enforcement has surged over the past two years, said Brendan Schulman, Boston Dynamics’ vice president of policy and government relations.

[…]

“One of the things about the so-called robot dogs that we are a little wary of is this normalization and this sort of affectionate framing of calling it a dog,” she said. “It’s normalizing that for the public when it’s not actually a dog. It’s another piece of police technology.”

Ryan Calo, a professor at the University of Washington School of Law focusing on robotics law, said that the technology could deepen public skepticism toward law enforcement, and said clear guidelines are critical for safe deployment.

“The unease people feel around robotics is not just a psychological quirk,” he said. “They are disconcerting for a reason. The overuse of robotics in policing will further dehumanize police to the public and break down those community ties that have been so important to policing over so many years.”

[…]

“I don’t think every police officer needs a robot partner,” he said. “But the use of robots in certain situations that have been specified in writing in advance is good. No one wants police to risk their lives or fail to gain situational awareness during an emergency — nor do we want to live in a robotic police state.”

Source: A $100,000 Robot Dog Is Becoming Standard in Policing — and Raising Ethical Alarms

EU proposes doing away with constant cookies requests by setting the “No” in your browser settings

People will no longer be bombarded by constant requests to accept or reject “cookies” when browsing the internet, under proposed changes to the European Union’s strict data privacy laws.

The pop-up prompts asking internet users to consent to cookies when they visit a website are widely seen as a nuisance, undermining the original privacy intentions of the digital rules.

[I don’t think this undermines anything – cookie consent got rid of a LOT of spying and everyone now just automatically clicks on NO or uses addons to do this (well, if you are using Firefox as a browser). The original purpose: stop companies spying has been achieved]

Brussels officials have now tabled changes that would allow people to accept or reject cookies for a six-month period, and potentially set their internet browser to automatically opt-in or out, to avoid being repeatedly asked whether they consent to websites remembering information about their past visits.

Cookies allow websites to keep track of a user’s previous activity, allowing sites to pull up items added to an online shopping cart that were not purchased, or remember whether someone had logged in to an account on the site before, as well as target advertisements.

[…]

Source: EU proposes doing away with constant internet ‘cookies’ requests – The Irish Times

Fortinet confirms second 0-day exploited in the wild in just four days

Fortinet has confirmed that another flaw in its FortiWeb web application firewall has been exploited as a zero-day and issued a patch, just days after disclosing a critical bug in the same product that attackers had found and abused a month earlier.

The new bug, tracked as CVE-2025-58034, is an OS command injection vulnerability that allows authenticated attackers to execute unauthorized code on the underlying system using crafted HTTP requests or CLI commands. Updating FortiWeb devices to the most recent software version fixes the problem.

“Fortinet has observed this to be exploited in the wild,” the vendor said in a Tuesday security advisory that credited Trend Micro researcher Jason McFadyen with finding and reporting the vulnerability.

“Trend Micro has observed attacks in the wild using this flaw with around 2,000 detections so far,” Trend Micro senior threat researcher Stephen Hilt told The Register.

Meanwhile, the US Cybersecurity and Infrastructure Security Agency issued its own alert about the FortiWeb bug on Tuesday, adding it to its Known Exploited Vulnerability catalog and giving federal agencies just seven days to apply the patch. CISA usually sets a 15-day deadline to fix critical patches and a 30-day time limit for implementing high-severity bugs.

“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,” America’s cyber defense agency warned.

[…]

Source: Fortinet confirms second 0-day in just four days • The Register

Tokyo Court Finds Cloudflare Liable For All Content it Allows Access to, Verification of all Users of the service and Should Follow Lawyers Requests without Court Verdicts in Manga Piracy Lawsuit

Japanese manga publishers have declared victory over Cloudflare in a long-running copyright infringement liability dispute. Kadokawa, Kodansha, Shueisha and Shogakukan say that Cloudflare’s refusal to stop manga piracy sites, meant they were left with no other choice but to take legal action. The Tokyo District Court rendered its decision this morning, finding Cloudflare liable for damages after it failed to sufficiently prevent piracy.

[…]

After a wait of more than three and a half years, the Tokyo District Court rendered its decision this morning. In a statement provided to TorrentFreak by the publishers, they declare “Victory Against Cloudflare” after the Court determined that Cloudflare is indeed liable for the pirate sites’ activities.

In a statement provided to TorrentFreak, the publishers explain that they alerted Cloudflare to the massive scale of the infringement, involving over 4,000 works and 300 million monthly visits, but their requests to stop distribution were ignored.

“We requested that the company take measures such as stopping the distribution of pirated content from servers under its management. However, Cloudflare continued to provide services to the manga piracy sites even after receiving notices from the plaintiffs,” the group says.

The publishers add that Cloudflare continued to provide services even after receiving information disclosure orders from U.S. courts, leaving them with “no choice but to file this lawsuit.”

Factors Considered in Determining Liability

Decisions in favor of Cloudflare in the United States have proven valuable over the past several years. Yet while the Tokyo District Court considered many of the same key issues, various factors led to a finding of liability instead, the publishers note.

“The judgment recognized that Cloudflare’s failure to take timely and appropriate action despite receiving infringement notices from the plaintiffs, and its negligent continuation of pirated content distribution, constituted aiding and abetting copyright infringement, and that Cloudflare bears liability for damages to the plaintiffs,” they write.

“The judgment, in that regard, attached importance to the fact that Cloudflare, without conducting any identity verification procedures, had enabled a massive manga piracy site to operate ‘under circumstances where strong anonymity was secured,’ as a basis for recognizing the company’s liability.”

[…]

According to Japanese media, Cloudflare plans to appeal the verdict, which was expected. In comments to the USTR last month, Cloudflare referred to a long-running dispute in Japan with the potential to negatively affect future business.

“One particular dispute reflects years of effort by Japan’s government and its publishing industry to impose additional obligations on intermediaries like CDNs,” the company’s submission reads (pdf).

“A fully adjudicated ruling that finds CDNs liable for monetary damages for infringing material would set a dangerous global precedent and necessitate U.S. CDN providers to limit the provision of global services to avoid liability, severely restricting market growth and expansion into Asian Pacific markets.”

Whether that heralds Cloudflare’s exit from the region is unclear.

[…]

Source: Tokyo Court Finds Cloudflare Liable For Manga Piracy in Long-Running Lawsuit * TorrentFreak

KC-135 Refueling Pods Have Been Converted Into Flying Communication Nodes

The Utah Air National Guard demonstrated new capabilities that expand the KC-135 aerial refueling tanker’s ability to also act as an airborne communications and data-sharing node during major exercises in the Pacific earlier this year. Additional datalinks and other systems were packed into heavily modified underwing Multipoint Refueling System (MPRS) pods normally used to send gas to receivers via the probe-and-drogue method. More network connectivity for the U.S. Air Force’s KC-135s, as well as its KC-46s, opens the door to a host of new operational possibilities for those aircraft, including when it comes to controlling drones in flight.

At least one KC-135 from the Utah Air National Guard’s 151st Wing flew with the podded networking suites during this year’s Resolute Force Pacific 25 (REFORPAC 25) exercise.

[…]

the 151st Wing, in cooperation with the AATC, has been at the very forefront of Air Force efforts to advance new communications and data-sharing capabilities for the KC-135, specifically, for some time now. The development of podded systems similar, if not identical to the ones demonstrated at REFORPAC 25, traces back at least to 2021, and builds on years of work before then on roll-on/roll-off packages designed to be installed in the aircraft’s cargo deck.

The Roll-On Beyond Line-of-Sight Enhancement (ROBE) package seen here is among the add-on communications and data-sharing capabilities that has been available for use on the KC-135, as well as other aircraft, for years now already. USAF

A self-contained podded system offers a different degree of flexibility when it comes to loading and unloading from aircraft, as required. A KC-135 can only carry one pod under each wing at a time, so being able to readily swap out ones filled with communications gear for standard MRPS types between missions would be very valuable. Leveraging the established MRPS pod design, which the KC-135 is already cleared to carry, also helps significantly reduce costs and overall time required for integration and flight testing.

[…]

Tanker crews being able to control various tiers of drones, including ones launched in mid-air from their aircraft, is one particularly notable element of this future vision. Those drones could help provide further situational awareness, or even a more active defense against incoming threats, as well as perform other missions, as you can read more about here. A Utah Air National Guard KC-135 demonstrated just this kind of capability in a previous test also involving a Kratos Unmanned Tactical Aerial Platform-22, or UTAP-22, also known as the Mako, a low-cost loyal wingman-type drone, back in 2021.

[…]

The pod’s line-of-sight links could even be used to control future stealthy collaborative combat aircraft (CCA) type drones and/or send and receive data from stealthy crewed aircraft, like F-22 and F-35 fighters and the future B-21 Raider bombers. Beyond the immediate value of that information exchange for tankers, including when it comes to survivability, this could open up additional possibilities for data fusion and rebroadcasting. If the pods can communicate with the low probability of interception/low probability of detection (LPI/LPD) datalinks that stealthy aircraft use, such as the Multifunction Advanced Data Link (MADL) and Intra-Fighter Data Link (IFDL), and more general-purpose ones, they could turn tankers into invaluable ‘translator’ nodes between various waveforms. Basically, they could allow aircraft with disparate datalink architectures to share data with each other, with the KC-135 acting as a forward fusion and rebroadcasting ‘gateway.’ The tankers could also use their beyond-line-of-sight links to share critical information globally in near real time. The fact that they would already be operating forward in their tanker role means they can provide these added services alongside their primary refueling mission.

[…]

Source: KC-135 Refueling Pods Have Been Converted Into Flying Communication Nodes

Why “public AI”, built on open source software, is the way forward for the EU and how the EU enables it

A quarter of a century ago, I wrote a book called “Rebel Code”. It was the first – and is still the only – detailed history of the origins and rise of free software and open source, based on interviews with the gifted and generous hackers who took part. Back then, it was clear that open source represented a powerful alternative to the traditional proprietary approach to software development and distribution. But few could have predicted how completely open source would come to dominate computing. Alongside its role in running every aspect of the Internet, and powering most mobile phones in the form of Android, it has been embraced by startups for its unbeatable combination of power, reliability and low cost. It’s also a natural fit for cloud computing because of its ability to scale. It is no coincidence that for the last ten years, pretty much 100% of the world’s top 500 supercomputers have all run an operating system based on the open source Linux.

More recently, many leading AI systems have been released as open source. That raises the important question of what exactly “open source” means in the context of generative AI software, which involves much more than just code. The Open Source Initiative, which drew up the original definition of open source, has extended this work with its Open Source AI Definition. It is noteworthy that the EU has explicitly recognised the special role of open source in the field of AI. In the EU’s recent Artificial Intelligence Act, open source AI systems are exempt from the potentially onerous obligation to draw up a range of documentation that is generally required.

That could provide a major incentive for AI developers in the EU to take the open source route. European academic researchers working in this area are probably already doing that, not least for reasons of cost. Paul Keller points out in a blog post that another piece of EU legislation, the 2019 Copyright in the Digital Single Market Directive (CDSM), offers a further reason for research institutions to release their work as open source:

Article 3 of the CDSM Directive enables these institutions to text and data-mine all “works or other subject matter to which they have lawful access” for scientific research purposes. Text and data mining is understood to cover “any automated analytical technique aimed at analysing text and data in digital form in order to generate information, which includes but is not limited to patterns, trends and correlations,” which clearly covers the development of AI models (see here or, more recently, here).

Keller’s post goes through the details of how that feeds into AI research, but the end-result is the following:

as long as the model is made available in line with the public-interest research missions of the organisations undertaking the training (for example, by releasing the model, including its weights, under an open-source licence) and is not commercialised by these organisations, this also does not affect the status of the reproductions and extractions made during the training process.

This means that Article 3 does cover the full model-development pathway (from data acquisition to model publication under an open source license) that most non-commercial Public AI model developers pursue.

As that indicates, the use of open source licensing is critical to this application of Article 3 of EU copyright legislation for the purpose of AI research.

What’s noteworthy here is how two different pieces of EU legislation, passed some years apart, work together to create a special category of open source AI systems that avoid most of the legal problems of training AI systems on copyright materials, as well as the bureaucratic overhead imposed by the EU AI Act on commercial systems. Keller calls these “public AI”, which he defines as:

AI systems that are built by organizations acting in the public interest and that focus on creating public value rather than extracting as much value from the information commons as possible.

Public AI systems are important for at least two reasons. First, their mission is to serve the public interest, rather than focussing on profit maximisation. That’s obviously crucial at time when today’s AI giants are intent on making as much money as possible, presumably in the hope that they can do so before the AI bubble bursts.

Secondly, public AI systems provide a way for the EU to compete with both US and Chinese AI companies – by not competing with them. It is naive to think that Europe can ever match levels of venture capital investment that big name US AI startups currently enjoy, or that the EU is prepared and able to support local industries for as long and as deeply as the Chinese government evidently plans to do for its home-grown AI firms. But public AI systems, which are fully open source, and which take advantage of the EU right of research institutions to carry out text and data mining, offer a uniquely European take on generative AI that might even make such systems acceptable to those who worry about how they are built, and how they are used.

Source: Why “public AI”, built on open source software, is the way forward for the EU – Walled Culture

How Trademark Ruined Colorado-Style Pizza

You’ve heard of New York style, Chicago deep dish, Detroit square pans. But Colorado-style pizza? Probably not. And there’s a perfectly ridiculous reason why this regional style never spread beyond a handful of restaurants in the Rocky Mountains: one guy trademarked it and scared everyone else away from making it.

This story comes via a fascinating Sporkful podcast episode where reporter Paul Karolyi spent years investigating why Colorado-style pizza remains trapped in obscurity while other regional styles became national phenomena.

The whole episode is worth listening to for the detective work alone, but the trademark angle reveals something important about how intellectual property thinking can strangle cultural movements in their cradle.

Here’s the thing about pizza “styles”: they become styles precisely because they spread. New York, Chicago, Detroit, New Haven—these aren’t just individual restaurant concepts, they’re cultural phenomena adopted and adapted by hundreds of restaurants. That widespread adoption creates the network effects that make a “style” valuable: customers seek it out, restaurants compete to perfect it, food writers chronicle its evolution.

Colorado-style pizza never got that chance. When Karolyi dug into why, he discovered that Beau Jo’s—the restaurant credited with inventing the style—had locked it up legally. When he asked the owner’s daughter if other restaurants were making Colorado-style pizza, her response was telling:

We’re um a trademark, so they cannot.

Really?

Yes.

Beau owns a trademark for Colorado style pizza.

Yep.

When Karolyi finally tracked down the actual owner, Chip (after years of trying, which is its own fascinating subplot), he expected to hear about some grand strategic vision behind the trademark. Instead, he got a masterclass in reflexive IP hoarding:

Cuz it’s different and nobody else is doing that. So, why not do it Colorado style? I mean, there’s Chicago style and there’s Pittsburgh style and Detroit and everything else. Um, and we were doing something that was what was definitely different and um um licensing attorney said, “Yeah, we can do it” and we were able to.

That’s it. No business plan. No licensing strategy. Just “some lawyer said we can do it” so they did. This is the IP-industrial complex in microcosm: lawyers selling trademark applications because they can, not because they should.

I pressed my case to Chip that abandoning the trademark so others could also use it could actually be good for his business.

“If more places made Colorado style pizza, the style itself would become more famous, which would make more people come to Beau Jo’s to try the original. If imitation is the highest form of flattery, like everyone would know that Beau Jo was the originator. Like, do you ever worry or maybe do you think that the trademark has possibly hindered the spread of this style of pizza that you created that you should be getting credit for?”

“Never thought about it.”

“Well, what do you think about it now?”

“I don’t know. I have to think about that. It’s an interesting thought. I’ve never thought about it. I’m going to look into it. I’m going to look into it. I’m going to talk to some people and um I’m not totally opposed to it. I don’t know that it would be a good idea for us, but I’m willing to look at it.”

A few weeks later, Karolyi followed up with Chip. Predictably, the business advisors had circled the wagons. They “unanimously” told him not to give up the trademark—because of course they did. These are the same people who profit from maintaining artificial scarcity, even when it demonstrably hurts the very thing they’re supposedly protecting.

And so Colorado-style pizza remains trapped in its legal cage, known only to a handful of tourists who stumble across Beau Jo’s locations. A culinary innovation that could have sparked a movement instead became a cautionary tale about how IP maximalism kills the things it claims to protect.

This case perfectly illustrates the perverse incentives of modern IP thinking. We’ve created an entire industry of lawyers and consultants whose job is to convince business owners to “protect everything” on the off chance they might license it later. Never mind that this protection often destroys the very value they’re trying to capture.

The trademark didn’t just fail to help Beau Jo’s—it actively harmed them. As Karolyi documents in the podcast, the legal lockup has demonstrably scared off other restaurateurs from experimenting with Colorado-style pizza, ensuring the “style” remains a curiosity rather than a movement. Fewer competitors means less innovation, less media attention, and fewer customers seeking out “the original.” It’s a masterclass in how to turn potential network effects into network defects.

Compare this to the sriracha success story. David Tran of Huy Fong Foods deliberately avoided trademarking “sriracha” early on, allowing dozens of competitors to enter the market. The result? Sriracha became a cultural phenomenon, and Huy Fong’s distinctive rooster bottle became the most recognizable brand in a category they helped create. Even as IP lawyers kept circling, Tran understood what Chip apparently doesn’t:

“Everyone wants to jump in now,” said Tran, 70. “We have lawyers come and say ‘I can represent you and sue’ and I say ‘No. Let them do it.’” Tran is so proud of the condiment’s popularity that he maintains a daily ritual of searching the Internet for the latest Sriracha spinoff.

Sometimes the best way to protect your creation is to let it go. But decades of IP maximalist indoctrination have made this counterintuitive wisdom almost impossible to hear. Even when presented with a clear roadmap for how abandoning the trademark could grow his business, Chip couldn’t break free from the sunk-cost fallacy and his advisors’ self-interested counsel.

The real tragedy isn’t just that Colorado-style pizza remains obscure. It’s that this story plays out thousands of times across industries, with creators choosing artificial scarcity over organic growth, protection over proliferation. Every time someone trademarks a taco style or patents an obvious business method, they’re making the same mistake Chip made: confusing ownership with value creation.

Source: How Trademark Ruined Colorado-Style Pizza | Techdirt

Drones delivering life-saving defibrillators to 911 calls

[…] collaborative team of health experts, community organizations, and universities are in the middle of a pilot program using drones and automated external defibrillators (AEDs). Led by Duke Health and the Duke Clinical Research Institute, EMS responders are now deploying drones AEDs to certain 911 calls in Forsyth County, North Carolina.

Why is cardiac arrest so serious?

Over 350,000 people experience cardiac arrest every year in the United States. When that happens, time is crucial–and AEDs are key to saving lives. Each device includes external sensor pads that adhere to a patient’s chest to monitor their heart. At the appropriate time, the pads deliver a moderately high voltage shock (usually between 200 to 1,000 volts) to readjust and regulate the heartbeat. Modern AEDs are designed to be used with minimal experience, and often include a speaker in the central component to verbally give proper instructions.

Although 90 percent of patients survive if an AED is administered within the first minute, such a rapid response is often out of the question, unless a patient is already in a healthcare facility. The American Red Cross estimates over 70 percent of all cardiac arrests occur at home, with survival odds decreasing around 10 percent for every additional minute of delayed AED application. The national average for EMS response times is around seven minutes, but in rural areas the timeframe can often extend as long as 13 minutes.

Unlike an ambulance or firetruck, a lowflying drone isn’t beholden to traffic slowdowns or winding streets. Researchers like Monique Starks at the Duke University School of Medicine suspect that deploying drones in conjunction with EMS workers may offer opportunities to provide faster AED deliveries.

[…]

Importantly, the trial does not alter any existing 911 response protocols. When EMS is dispatched to the location, a pilot remotely deploys and guides a drone flying 200 feet above the ground to the same address. If it arrives before first responders, the drone descends to 100 feet and lowers the AED down via a winch strap. At that point, a 911 dispatcher can take a bystander step-by-step through using the device on the person in need.

[…]

Source: Drones are delivering life-saving defibrillators to 911 calls | Popular Science

NASA’s X-59 Quiet Supersonic Jet With No Forward Window Completes First Flight, Prepares for More Flight Testing

After years of design, development, and testing, NASA’s X-59 quiet supersonic research aircraft took to the skies for the first time Oct. 28, marking a historic moment for the field of aeronautics research and the agency’s Quesst mission.

The X-59, designed to fly at supersonic speeds and reduce the sound of loud sonic booms to quieter sonic thumps, took off at 11:14 a.m. EDT and flew for 67 minutes. The flight represents a major step toward quiet supersonic flight over land.

[…]

The X-59’s first flight went as planned, with the aircraft operating slower than the speed of sound at 230 mph and a maximum altitude of about 12,000 feet, conditions that allowed the team to conduct in-flight system and performance checks. As is typical for an experimental aircraft’s first flight, landing gear was kept down the entire time while the team focused on ensuring the aircraft’s airworthiness and safety.

The aircraft traveled north to Edwards Air Force Base, circled before landing, and taxied to its new home at NASA’s Armstrong Flight Research Center in Edwards, California, officially marking the transition from ground testing to flight operations.

[…]

The X-59 is the centerpiece of NASA’s Quesst mission and its first flight connects with the agency’s roots of flying bold, experimental aircraft.

“The X-59 is the first major, piloted X-plane NASA has built and flown in over 20 years – a unique, purpose-built aircraft,”

[…]

Getting off the ground was only the beginning for the X-59. The team is now preparing the aircraft for full flight testing, evaluating how it will handle and, eventually, how its design will shape shock waves, which typically result in a sonic boom, in supersonic flight. The X-59 will eventually reach its target cruising speed of about 925 mph (Mach 1.4) at 55,000 feet.

The aircraft’s design sits at the center of that testing, shaping and distributing shock-wave formation. Its engine is mounted on top of the fuselage – the main body of the aircraft – to redirect air flow upward and away from the ground.

The cockpit sits mid-fuselage, with no forward-facing window. Instead, NASA developed an eXternal Vision System – cameras and advanced high-definition displays that allow the pilot to see ahead and below the aircraft, which is particularly critical during landing.

These design choices reflect years of research and modeling – all focused on changing how the quieter sonic thump from a supersonic aircraft will be perceived by people on the ground.

[…]

Source: NASA’s X-59 Completes First Flight, Prepares for More Flight Testing – NASA