Stories
Slash Boxes
Comments

SoylentNews is people

Log In

Log In

Create Account  |  Retrieve Password


Site News

Join our Folding@Home team:
Main F@H site
Our team page


Funding Goal
For 6-month period:
2022-07-01 to 2022-12-31
(All amounts are estimated)
Base Goal:
$3500.00

Currently:
$438.92

12.5%

Covers transactions:
2022-07-02 10:17:28 ..
2022-10-05 12:33:58 UTC
(SPIDs: [1838..1866])
Last Update:
2022-10-05 14:04:11 UTC --fnord666

Support us: Subscribe Here
and buy SoylentNews Swag


We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.

Roughly how much cash is in your pocket/wallet/purse right now?

  • None: why do I need cash anymore, grandpa?
  • Just enough for random small transactions
  • Enough for regular errands (grocery, fuel, etc.)
  • An unreasonably large amount
  • Normally none, but whatever amount my non-app-using acquantice paid me back for dinner
  • I'm all-in on crypto, you insensitive fiat-currency-loving clod!

[ Results | Polls ]
Comments:22 | Votes:84

posted by mrpg on Tuesday April 28, @09:22AM   Printer-friendly
from the we-sail-on-Tuesday dept.

Hydrogen atmosphere could keep exomoons habitable for billions of years:

Liquid water is considered essential for life. Surprisingly, however, stable conditions that are conducive to life could exist far from any sun. A research team from the Excellence Cluster ORIGINS at LMU and the Max Planck Institute for Extraterrestrial Physics (MPE) has shown that moons around free-floating planets can keep their water oceans liquid for up to 4.3 billion years by virtue of dense hydrogen atmospheres and tidal heating – that is to say, for almost as long as the Earth has existed and sufficient time for complex life to develop.

Planetary systems often form under unstable conditions. If young planets come too close, they can fling each other out of their orbits. This creates free-floating planets (FFPs), which wander through the galaxy without a parent star. An earlier study by LMU physicist Dr. Giulia Roccetti had shown that gas giants ejected in this way do not necessarily lose all of their moons in the process.

The ejection does, however, alter the orbits of the moons. They become highly elliptical, such that their distance from the planet constantly changes. The resulting tidal forces rhythmically deform the lunar body, compress its interior, and generate heat through friction. This tidal heating can be sufficient to maintain oceans of liquid water on the surface – even without the energy of a star, and in the cold of interstellar space.

Journal Reference: David Dahlbüdding, Tommaso Grassi, Karan Molaverdikhani, Giulia Roccetti, Barbara Ercolano, Dieter Braun, Paola Caselli. Habitability of Tidally Heated H2-Dominated Exomoons around Free-Floating Planets. In: MNRAS 2026


Original Submission

posted by mrpg on Tuesday April 28, @05:46AM   Printer-friendly
from the electric-heat dept.

Smart ceramics reveal a new way to control heat transfer, boosting thermal conductivity nearly threefold:

New research from the Department of Energy's Oak Ridge National Laboratory, in collaboration with The Ohio State University and Amphenol Corporation, challenges conventional understanding about controlling heat flow in solid materials.

The study, published in PRX Energy, shows that applying an electric field to a ceramic material changes how phonons (tiny vibrations that carry heat) behave. Phonons with atoms moving along the field direction (poling direction) last longer than those with atoms moving perpendicular to the field. As a result, the material conducts heat almost three times more efficiently along the field direction than in perpendicular directions. This promising approach could lead to new solid-state devices that control heat flow in everyday technologies.

"Being able to control both how fast and in what manner heat flows could lead to devices that manage thermal energy far more efficiently," said Puspa Upreti, an ORNL postdoctoral research associate.

Controlling heat flow is important for high-performance systems such as modern electronic coolers with no moving parts, energy converters that change heat into power, chip-based circuits used in everyday technology, and cogeneration systems, which capture and repurpose industrial heat. Regulating heat in these systems creates the right conditions for peak efficiency and performance.

The link between efficiency and heat flow is shown by the Carnot cycle, an idealized model of a heat engine that sets the highest possible efficiency by precisely controlling the transfer of heat between hot and cold reservoirs. In this study, applying an electric field removes barriers to phonon transport. This lets the vibrations travel farther, much like reducing traffic on a busy road, and improves heat conduction along the electric field direction, which leads to better efficiency.

[...] The study focused on a special type of ceramic called relaxor-based ferroelectrics. When these ceramics are exposed to an electric field, tiny electrical charges inside them align. This alignment reduces scattering of the heat-carrying vibrations, allowing energy to flow more efficiently. The crystals used in this study were carefully grown and then subjected to the electric field, or "poled," by Raffi Sahul at Amphenol Corporation. The work produced solids that enable precise control of energy flow.

[...] By integrating their thermal conductivity measurements with neutron scattering data, the researchers directly connected changes in heat flow to the behavior of atomic vibrations within the crystal. The late Professor Joseph Heremans of Ohio State designed the thermal conductivity experiments and guided doctoral candidate Delaram Rashadfar through the data interpretation. "While earlier work led us to expect only a modest effect, observing a threefold difference turned out to be a significant result," said Rashadfar. "Professor Heremans always stressed the importance of trusting the data first and letting the theory follow."

Journal Reference: https://doi.org/10.1103/5d1z-wg4p


Original Submission

posted by jelizondo on Tuesday April 28, @01:04AM   Printer-friendly
from the Panopticon dept.

https://www.yahoo.com/news/articles/federal-surveillance-tech-becomes-mandatory-161321992.html

Section 24220 of the 2021 Infrastructure Investment and Jobs Act, requires NHTSA to finalize rules forcing all new passenger vehicles to include "advanced impaired driving prevention technology": infrared cameras and sensors which perform a constant biometric assessment of driver alertness and sobriety.

The tech involves infrared cameras mounted on steering columns or A-pillars, tracking eye movement, pupil dilation, and drowsiness patterns. Your car watches and decides whether you're fit to drive.

Timeline for Implementation

The surveillance rollout targets late 2026 to 2027 for all new passenger vehicles.

While NHTSA's final rule faced delays beyond the November 2024 deadline, automakers will still get 2-3 years for full implementation once regulations are finalized.

The timing coincides with broader automotive software integration, making these systems potentially updatable through over-the-air patches—expanding monitoring capabilities post-purchase.

-----

My deepest apologies to the world for any small part I may have played in this development. In 2012 I submitted an "idea" paper to an anonymous solicitor asking for ways to better integrate smartphones with in-vehicle systems. In that paper (which I wrote carelessly off the top of my head) I suggested that automobiles should abandon the then current practice of using under-powered embedded systems and instead install a desktop level capability computer utilizing standard development tools. I also pointed out the ability of such a system to use OpenCV to perform this kind of monitoring as an opt-in, or parental control type of system - not really thinking through the (not obvious at the time) future of insurance and federally mandated continuous monitoring of all drivers (as Elmo has already demonstrated broad popular compliance with in his Tesla products...) They awarded me 3rd place in the competiton and sent me a check for $2000, which came at a very good time for the family - having been laid off in the post-Afghanistan pullout techonomic upheaval. I'm sure I'm not the only one to point out these things around that time...


Original Submission

posted by jelizondo on Monday April 27, @08:20PM   Printer-friendly
from the one-hand-washes-the-other dept.

An Apple-backed trade group prematurely published a press release on April 12th praising a yet-to-be-introduced Senate bill, raising questions about coordination between Big Tech companies and lawmakers on child safety legislation:

[...] "The Parents Over Platforms Act (POPA), sponsored by Sens. Jerry Moran (R-KS) and Jacky Rosen (D-NV), offers a pragmatic, security-first approach by imposing the requirement to receive age information only on apps that provide differentiated experiences for children and adults, like social media apps or adult-only apps," the now-deleted press release stated.

The bill is expected to be introduced on Wednesday (4/22), according to a release from Moran's office,

"Sen. Moran's office is not aware or involved in any trade organization publishing and then removing a release related to Parents Over Platforms Act," a spokesperson told the Daily Caller News Foundation.

The App Association, which receives substantial funding from Apple, launched a lobbying campaign in February to support the bill with advertisements. Apple and Google have additionally lobbied in support of POPA, spending millions on related efforts in recent disclosures.

Apple did not respond to requests for comment from the DCNF.


Original Submission

posted by jelizondo on Monday April 27, @03:33PM   Printer-friendly

https://itsfoss.com/news/tuta-drive-closed-beta/

Privacy in 2026 is a bit of a joke. Governments have turned surveillance into standard operating procedure, and Big Tech companies treat your personal data like a free-for-all buffet, helping themselves, then selling the leftovers to data brokers who do the same.

That's pushed people toward privacy-first alternatives, and quite a few companies have stepped up to meet that demand. Tuta is one of the more recognizable names in that space, offering encrypted mail and calendar services to over 10 million users worldwide.

Now, the company is looking to round out its ecosystem with the one piece that's been missing, an encrypted cloud storage solution.

Tuta first laid the groundwork for this back in July 2023, when it announced the PQDrive project with backing from the German government. The initiative had received €1.5 million in funding through the KMU-innovativ program, a grant scheme that supports small and medium enterprises in research and development.

The goal was clear from the very beginning. It was to build a cloud storage service secured with post-quantum encryption, not just conventional algorithms.

To get there, Tuta partnered with the University of Wuppertal, which handled key research tasks including testing cryptographic algorithms and figuring out how to deduplicate encrypted data without punching holes in the security model.

All that effort has now produced a product ready for real-world testing. Starting today, Tuta Drive enters closed beta, with select users receiving early access to put it through its paces ahead of a public release.

It is an end-to-end encrypted cloud storage service that fits directly into Tuta's existing ecosystem alongside mail and calendar. Everything you store gets encrypted without any action needed on your end, and the zero-knowledge architecture means Tuta has no technical ability to read your files or share them with anyone else.

The encryption underpinning Drive is the same TutaCrypt protocol Tuta already uses for its mail service. It combines classical and quantum-resistant algorithms in a hybrid approach, so even if a quantum computer cracks one layer down the line, it still has to contend with the other.

And, the service is hosted in Germany, which brings strict GDPR protections into play on top of the technical safeguards.

Arne Möhle, CEO of Tuta, announced this by commenting that:

        With Tuta Drive, we are taking the next step towards offering a full private digital workspace.

        Today, more than ten million citizens and businesses, including journalists, whistleblowers and activists use Tuta Mail as an alternative to insecure email offered by mainstream providers.

        Adding an encrypted cloud storage to Tuta will enable them to also store their files securely.

We were given early access to the closed beta ahead of its rollout today, and here's a look at what Tuta Drive is like right now.

The interface is minimal, which is fine. You get a familiar sidebar and a top bar that shows you the server connection status and houses quick-switch buttons for Mail, Contacts, Calendar, and Drive.

First, I uploaded two videos to see how Tuta Drive would handle them. Here, the upload speeds were noticeably slow when connected over a VPN, though that's more or less expected. Without an active VPN connection, file uploads were fast.

Moving those files to a new folder afterward was straightforward using the "Move" option from the right-click context menu. Drag and drop works too, and I could manually select specific files without any issues. Cut and paste for moving files around also worked well.

When uploading multiple files at once, a progress list appears, which is handy. The one catch is that you can't scroll through it to check which file is currently being processed, which was a bummer.

Files are shown with appropriate icons depending on type, so images, videos, and audio all get their own visual treatment. Folders display a cat emoji where the folder size info should probably appear, which looks like a work-in-progress placeholder more than anything else.

If you upload something by mistake or decide a file isn't worth keeping, you can delete it promptly either from the right-click context menu or by hitting Delete on your keyboard. The "Trash" page then gives you the choice to either restore it if it was a wrong call or permanently delete it if you're sure.

That said, folder uploads aren't supported yet, and the keyboard shortcut support is lacking. Ctrl+A to select everything in a folder, for instance, does nothing. No search tool either; those are the kinds of gaps that user feedback tends to sort out quickly.

Seeing that this is a closed beta, I am confident that the Tuta folks will listen to what people say about their newest offering and act accordingly.

[- Links, Screenshots, etc. in article -]


Original Submission

posted by hubie on Monday April 27, @10:49AM   Printer-friendly
from the Betteridge-please-say-"yes" dept.

The practice impacts consumers beyond the grocery store. Car dealerships can be dynamic pricing traps, too, the FTC said last year:

Your favorite online grocer or retail store might be secretly raising prices on you - and one state has had enough.

Maryland lawmakers approved a bill earlier this month that will ban surveillance pricing: the practice of raising individualized prices online, based on a shopper's habits and personal information. The practice can cost shoppers as much as $1,200 a year, a study from consumer watchdog Consumer Reports found last year.

The bill is likely to become law in Maryland later this month when Governor Wes Moore signs it. His signature is all but guaranteed after Moore said in an April 14 social media post that he "can't wait to sign it."

Titled, "Protection From Predatory Pricing Act," it includes a ban on grocery stores and third-party partners from using an individual's personal information and other data to set a price. If passed, it would be the first law of its kind in the country.

Surveillance pricing uses a shopper's personal information, past purchases, cart activity and, in some cases, protected data such as gender to raise prices as far as they can without losing the customer. That can lead to higher prices for the same product for different consumers.

Surveillance pricing has become widespread in the last few years, and can increase a company's profits by up to 4 percent, a 2025 Federal Trade Commission study found.

The practice impacts consumers beyond the grocery store. Car dealerships can be dynamic pricing traps, too, the commission said.

"A car could potentially be segmented as a 'first-time car buyer' by the dealership using these tools, inferring that [the] shopper might be less savvy about the options available and be promoted particular financing rates, trade-in discounts, or maintenance products," the commission wrote.

Translation: a company can use your personal info to shape how it pitches lending options, discounts and optional vehicle features.

Maryland isn't the only state taking on surveillance pricing.

New York passed a law in November 2025 requiring retailers to tell customers when they're using AI or personal information to set prices. A bill submitted to New York's state legislature in January would ban surveillance pricing altogether, but it has yet to make it past the early stages of the lawmaking process.

In January 2026, California Attorney General Rob Bonta launched an investigation into how businesses use surveillance pricing and whether it violates the state's consumer protection laws.


Original Submission

posted by hubie on Monday April 27, @06:04AM   Printer-friendly

It adds to the body of evidence that the Red Planet once contained the building blocks of life:

The search for signs of life on Mars continues to yield promising data. A first-of-its-kind wet chemistry experiment, published Tuesday in Nature, confirmed the presence of essential ingredients of life preserved in ancient Martian sandstones.

The molecules were found inside 3.5-billion-year-old sandstone. NASA's Curiosity rover collected the clay-filled rocks from an area called Glen Torridon, inside Mars' enormous Gale Crater. The rover's Sample Analysis at Mars (SAM) mobile instrument suite analyzed the data.

The experiment was unique as the first off-Earth study to use the chemical tetramethylammonium hydroxide (TMAH). The reagent allows Curiosity to break down larger organic molecules on the Martian surface, reducing them to something the rover's instruments can read.

It revealed the presence of over 20 different organic molecules. Among the data was confirmation of naphthalene and benzothiophene, some of the largest and most complex organic compounds discovered on the Red Planet. The experiment also yielded the first detection of a possible N-heterocycles, which DNA and RNA are built upon.

“That detection is pretty profound because these structures can be chemical precursors to more complex nitrogen-bearing molecules,” the paper’s lead author, Amy Williams, wrote in NASA’s announcement. “Nitrogen heterocycles have never been found before on the Martian surface or confirmed in Martian meteorites.”

As with previous discoveries of organic material on Mars, this one is not yet the smoking gun we've been waiting for. But it adds to a growing body of evidence that, at a minimum, the foundations of life as we know it were present on an ancient version of the planet. The study also confirms that organic material can survive on Mars for billions of years, which will encourage future experiments.

The paper's authors say the data will help NASA to optimize its second (and final) TMAH experiment on Curiosity. It also opens the door to future TMAH tests on the Rosalind Franklin Mars rover and the Dragonfly mission to Saturn's moon, Titan. Both missions are scheduled for 2028 at the earliest.

Journal Reference: Williams, A.J., Eigenbrode, J.L., Millan, M. et al. Diverse organic molecules on Mars revealed by the first SAM TMAH experiment. Nat Commun 17, 2748 (2026). https://doi.org/10.1038/s41467-026-70656-0


Original Submission

posted by hubie on Monday April 27, @01:20AM   Printer-friendly

The influencers claim that products such as patches, gums and pouches utilize the 'natural' product and that it has been unfairly condemned by the medical establishment:

Multiple influencers who are supporters of Robert F Kennedy Jr's Make America Healthy Again movement are pushing a new and somewhat surprising health hack to their followers – nicotine.

The influencers claim that products such as patches, gums and pouches utilize the "natural" product and that it has been unfairly condemned by the medical establishment,

Nicotine pouches entered the U.S. market in 2016, and scientists are still learning about the short and long-term effects of the products, according to the Centers for Disease Control and Prevention.

"There are no safe tobacco products, including nicotine pouches. This is particularly true for youth, young adults, and women who are pregnant," the CDC website states.

"Youth, young adults, and women who are pregnant should not use nicotine pouches. People who do not currently use tobacco products, including nicotine pouches, should not start."

The center notes that nicotine can harm brain development, which continues up until the age of 25, as well as increasing the risk for young people of future addiction to other drugs. Symptoms of addiction can start "quickly" even if the person has not used nicotine products previously.

"Nicotine can also increase blood pressure and heart rate, which could, over time, raise the risk of heart disease; the compound may also harden the walls of arteries in the heart, which can lead to heart attacks. Nicotine can also exacerbate existing heart conditions, according to the CDC.

This has not deterred the MAHA influencers, who argue that nicotine has been vilified in a similar way to peptides, raw milk and beef tallow – which has been promoted by Kennedy. The U.S. Health Secretary himself has been pictured carrying around a tin of nicotine pouches, and has said previously that such pouches are "probably" the safest way to consume nicotine.

[...] Medical experts are united in their condemnation of such promotions.

"If there really was a health benefit for nicotine, then the medical community would be recommending it to their patients," Doctor Adam Leventhal, director of the Institute for Addiction Science at the University of Southern California, told The New York Times.

"And what's happening is the opposite."


Original Submission

posted by hubie on Sunday April 26, @08:34PM   Printer-friendly

Gold-based substrates create major cost barriers for mass production:

The team from the Institute of Metal Research reengineered the chemical vapor deposition process by introducing a liquid gold and tungsten bilayer as the substrate.

For decades, Moore's Law predicted a doubling of computing power roughly every two years - but as transistor dimensions approach atomic scales, quantum effects and heat dissipation are making further miniaturization increasingly difficult.

2D semiconductors have emerged as a leading candidate for post-Moore chip materials, as the rising workloads from AI tools and large language models are pushing current chip architectures to their limits.

Modern transistor architectures depend on the complementary pairing of n-type and p-type materials.

The shortage of high-performance p-type options has become a major constraint for next-generation chip design, as while many n-type 2D semiconductors are well established, achieving stable p-type counterparts remains a challenge.

"The lack of high performance p-type materials has become a critical bottleneck for the development of sub-5 nanometer node 2D semiconductors," said Zhu Mengjian from the National University of Defense Technology.

The monolayer tungsten silicon nitride films combine several key advantages for advanced transistor design.

These include strong hole mobility, high on-state current density, mechanical strength, efficient heat dissipation, and chemical stability.

The method expands single-crystal domains to sub-millimeter sizes and increases production speed from approximately 0.00004 inches over five hours to about 0.0008 inches per minute.

This represents an increase of around 1,000x compared to conventional approaches.

The research represents progress in 2D semiconductor manufacturing, but the gap between growing centimeter-scale films in a lab and mass-producing defect-free wafers remains enormous.

The gold-based substrate, while effective for research, would be prohibitively expensive for high-volume production.

China's ambition to leapfrog existing semiconductor limitations is understandable, and this study is a breakthrough.

Unfortunately, the industry has seen many promising 2D materials fail to transition from academic papers to fabrication plants.

Whether this material follows the same path will depend on solving the scalability and cost challenges that have doomed previous options.

Via Interesting Engineering


Original Submission

posted by hubie on Sunday April 26, @03:53PM   Printer-friendly

What makes a person keep playing a video slot machine? Some of the same features that make children stay on social media apps or video games for too long:

In two landmark cases, social media companies have been found liable for endangering and harming children. Meta and Google are appealing the verdicts and disputing the idea that their products are addictive. But over the course of more than a decade, scientists have identified key features of social media and other apps meant to hold children's attention for as long as possible.

These features create a kind of superglue on the apps, says cultural anthropologist Natasha Dow Schüll at New York University, who has pioneered research in this field. "They keep us spending more time on these apps and spending more money. They drain us of our energy and ourselves." Understanding these features offers parents a rubric for evaluating how harmful an app or device may be for kids, Schüll says.

During the trial in California, the attorney bringing the case accused Meta and Google of designing their apps to behave like "digital casinos." That's an apt comparison, according to Schüll's research, because major design elements of social media have surprising roots in the gambling industry.

Back in the 1980s and 1990s, the casino industry gradually and purposely created what many scientists consider to be the most addictive form of gambling: video slot machines. They are something like a giant app, played on a huge video screen with an ergonomic chair attached to it.

People struggling with gambling addiction often cite video slots as their game of choice, studies have found. Some people gamble on these machines for extraordinary periods of time, Schüll found in her ethnographic fieldwork. They can play for 24 hours, even 48 hours straight. Some people even told Schüll that they wear adult diapers to the casino so they don't have to stop gambling to use the restroom.

[...] Through her research, she uncovered four key features that, when combined together, help hold people on the gambling devices. These features trigger a trancelike or dissociative state, known as a "machine zone" or "dark flow," in which people lose track of their sense of time and place.

To Schüll's surprise, around the early 2010s, the same features began to appear on phone and tablet apps, including social media, games and video-streaming platforms. "These are not normal products for kids like a pair of shoes or a toy," she says. "They create a relationship with kids."

Here are four features that create that superglue:

Feature 1: solitude

"When the relationship is just between you and the machine, it removes social cues needed for stopping," Schüll says. It's harder to notice when the activity no longer serves the person playing or scrolling.

Studies have found that children who regularly use screens alone in their bedrooms have a higher risk of developing what psychologists call problematic usage. That is, they continue to use an app or play a game even when it damages their health. For example, the app may interfere with their sleep or friendships, but the child still feels compelled to stay on the app.

Feature 2: bottomlessness

Videos keep appearing on TikTok and YouTube. Photos, comments and likes keep popping up on Instagram. Apps have seemingly endless content for you to see, and it all shows or plays automatically.

"There's no natural stopping point," Schüll says. So you never feel finished or satisfied.

You want one more of something , endlessly. And that feeling grows even stronger with the third ingredient added into the mix.

Feature 3: speed

The faster people play video slots, the longer people gamble, Schüll found in her review of research performed by the gambling industry. Speed has a similar effect on social media and video-streaming apps, she says. The faster people can scroll, watch and then watch again, the harder it is for many to pull away from an app.

"The speed of the feedback can cause this sense that you merge with the screen. You don't know where you begin and the machine ends," Schüll says. "The speed really just pulls you into this flow."

For social media, the speed at which we can find "new" material has jumped with several technological advancements, including the invention of higher-speed internet and infinite scroll.

Feature 4: teasing, or giving you almost what you want

The final ingredient is perhaps the most important, says Jonathan D. Morrow, a neuroscientist and psychiatrist at the University of Michigan. It's all about how apps select content for you.

Here's how it typically works. First, the software uses AI to determine what you're hoping to find or see. "Even if you don't know what you want, the app knows. It's very good at figuring that out," Morrow says.

But then, he says, the app withholds that reward: "Apps don't give it to you. They give you something close to that, and then a few clicks later, the algorithm gives you something even closer."

They rarely — if ever — give you what you're looking for. "They give just enough to keep you engaged, keep you looking at the app and interacting with it as long as possible," he adds.

This teasing gives you the feeling that you're going to get what you're seeking soon. "So you'll be there all day trying to get that next big thing. There's always a possibility you'll finally get what you want," Morrow says.


Original Submission

posted by janrinok on Sunday April 26, @11:05AM   Printer-friendly

[Source]: Anthropocene Magazine

Scientists have engineered a water-soluble pyrimidone molecule that captures solar heat and releases it days or weeks later—enough to boil water on demand.

There are several technologies out there that harvest the sun's boundless energy. Solar panels soak up solar energy and convert it to electricity, while solar thermal systems use mirror-like contraptions to collect sunshine to heat water or living spaces. But there aren't any efficient ways to store solar heat for days or weeks.

Now, researchers at the University of California Santa Barbara have come up with a way to do that. They have created a new engineered molecule that traps sunlight, stores the energy in its chemical bonds, and then releases it on demand. The team reported this rechargeable solar heat battery in a paper published in the journal Science.

"Think of photochromic sunglasses," said Han Nguyen, a PhD student and the paper's lead author in a press release . "When you're inside, they're just clear lenses. You walk out into the sun, and they darken on their own. Come back inside, and the lenses become clear again. That kind of reversible change is what we're interested in. Only instead of changing color, we want to use the same idea to store energy, release it when we need it, and then reuse the material over and over."

The new material, called a pyrimidone, can store more than 1.6 megajoules per kilogram. That is almost double the energy density of a conventional lithium-ion battery, which is about 0.9 MJ/kg. Just like a lithium-ion battery can store electricity for days, the new liquid battery could store sunshine for days to provide hot water or heat when needed.

Molecular solar thermal energy storage in Dewar pyrimidone beyond 1.6 megajoules per kilogram


Original Submission

posted by janrinok on Sunday April 26, @06:20AM   Printer-friendly

Governments want to move away from "platforms over which we have no control," says Dutch minister:

Governments in France, Germany, Poland, the Netherlands, Luxembourg and Belgium have started rolling out in-house messaging services for officials to exchange sensitive information, in an effort to stop staff from using popular encrypted apps and switch to local alternatives they can control. Defense alliance NATO also has its own messenger, and the European Commission plans to make the switch by the end of the year.

The move toward government-controlled messaging apps is part of Europe's search for alternatives to American technology, sparked by fears of being strategically dependent on Washington. WhatsApp is owned by U.S. tech giant Meta, while Signal is run by a U.S.-based non-profit and managed by a large community of open-source software enthusiasts.

The effort to unplug from American companies also reflects growing recognition among governments of the vulnerabilities of mainstream messaging apps for sharing sensitive information between politicians.

"Our communication currently often takes place via platforms over which we have no control," Willemijn Aerdts, the Netherlands' digital minister, told POLITICO in a statement. "In a world where technology is increasingly being used as a tool of power, that poses a risk."

Brandon De Waele, the director of Belgian Secure Communications, the Belgian federal government agency in charge of its new secure app, said: "Everyone in Europe is getting more and more awake on sovereignty ... For us it's data sovereignty."

WhatsApp and Signal have faced cybersecurity challenges in recent weeks. Last month, dozens of cybersecurity agencies warned that Russian hacking groups were targeting political and government officials on the messengers with high-level phishing attacks.

The risks also became painfully apparent in Brussels: The European Commission told some of its most senior officials to shut down a group on messaging app Signal, POLITICO reported this month, and the EU was the victim of a string of cybersecurity breaches affecting, among other things, its mobile devices management system.

Belgium was the latest European government to unveil an in-house secure messaging service last month, for use by public officials for sensitive but unclassified information. Members of the federal government — including Prime Minister Bart De Wever — are now encouraged to use an app called BEAM, which comes with all the features of familiar apps like WhatsApp and Signal, but which operates under the control of the government.

There is no suggestion that apps like Signal and WhatsApp, which use end-to-end encryption, the gold standard for messaging security, are more unsecure than their alternatives. Much of what's driving the shift is a need for features like access controls, the ability to only allow chats between specific people, and control over metadata that show where and when calls and messages are made and sent.

Using consumer apps for big organizations is "really a risky move," said Benjamin Schilz, the chief executive of Wire, a secure communications app used by the German government. They're "just not built for that."

Some of those features would have helped defend against a recent Russian spying campaign carried out via WhatsApp and Signal, said Belgium's De Waele. "With us, because it's a closed environment with only government employees, you can also avoid that," he said.


Original Submission

posted by janrinok on Sunday April 26, @01:36AM   Printer-friendly

The Dumbest Hack of the Year Exposed a Very Real Problem:

In the wee hours of the night last April, someone stopped at roughly 20 street intersections across Silicon Valley and launched an unprecedented cyberattack that would eventually spread to multiple states, embarrassing local officials and prompting them to question their security practices. Authorities suspect the unknown culprit took advantage of weak and publicly available default passwords to wirelessly upload custom recordings that played whenever a pedestrian pressed a crosswalk button.

Instead of the normal recordings telling people to either wait or cross the street, pedestrians heard the spoofed voices of billionaire tech CEOs. A fake Mark Zuckerberg said at one Menlo Park intersection that people would not be able to stop AI from "forcefully" being inserted "into every facet of your conscious experience." At another, he celebrated "undermining democracy." At a different intersection, an altered Elon Musk described President Donald Trump as "actually really sweet and tender and loving," while on a nearby street his faked voice whined about being "so alone."

Government emails and text messages obtained by WIRED through public records requests show how the cities of Menlo Park, Redwood City, Palo Alto, and later Seattle and Denver scrambled to respond to the crosswalk button tampering. The communications, along with interviews with security experts and former employees of the button manufacturer, highlight how governments and the company had overlooked vulnerabilities in a widespread technology.

In Redwood City, then-city manager Melissa Diaz quizzed staff about who should be blamed for the incident. "We need to understand who should be accountable for the security of these systems and what we can do to hold either staff or the external responsible party accountable," she wrote in an email to colleagues in the days after the hack.

Nick Mathiowdis, Redwood City's current communications manager, tells WIRED that staff have been addressing the issue based on "lessons learned and evolving best practices," but declines to share details to avoid encouraging further hacks.

Edward Fok, a veteran Federal Highway Administration cybersecurity official who briefly investigated the hacking before retiring as DOGE swept through the government , says cities need to do a better job ensuring that cybersecurity clauses are baked into contracts with suppliers and installers of technology, especially as AI tools and powerful sensors are increasingly integrated into transportation infrastructure.

Redwood City, for example, had contractually required its button installation and maintenance vendor to "use reasonable diligence and best judgment" at the time of the hack but had not specified anything about passwords or digital security.

In an unsigned statement to WIRED, the highway administration said that it previously issued a technical advisory outlining "security measures to make sure ideological idiots are not jeopardizing Americans' safety when utilizing our crosswalks."

The police investigation into the hacked buttons in Silicon Valley has run cold. Authorities couldn't figure out who was behind the scheme because the buttons don't track who uploads audio, and surveillance footage from the area wasn't helpful, according to Redwood City police lieutenant Jeff Clements.

Greenville, Texas-based Polara Enterprises has been a leading supplier of crosswalk push buttons for decades. Some have the ability for cities to upload custom audioclips via Bluetooth to give pedestrians, including those who are blind or visually impaired, extra cues like the street and direction they are crossing.

Official online manuals and videos aimed at the thousands of technicians maintaining the buttons across the country describe how Bluetooth-enabled Polara models ship with a default password of "1234" and are configurable through a publicly available app . About eight months before last year's button hacking spree, a physical security vlogger who goes by the name Deviant Ollam posted a YouTube video pointing out how easy it would be to tamper with the buttons. "I'm not encouraging anyone to try completely guessable passwords and upload their own content because, remember, that would be bad. That would probably be a crime or something. Talk to your lawyers," he said in the video.


Original Submission

posted by janrinok on Saturday April 25, @08:54PM   Printer-friendly

The Smash program focuses on processing, not mining:

The United States has spent years trying to rebuild its rare earth supply chain, but mining alone hasn’t fixed the core problem. Processing remains the sticking point, and as Data Centre Dynamics reports, that’s where the Defense Advanced Research Projects Agency is placing a high-risk bet.

“So the challenge is processing, not mining,” said Julian McMorrow, Smash lead and program manager at DARPA’s Microsystems Technology Office. “We want to develop technologies to take the industry from wasting over 99 percent of its feedstock to making use of the entire feedstock.”

Traditional mining wastes enormous amounts of material during refinement. More than two tons of ore and 13 tons of water can produce just one kilogram of copper, leaving most of the original material discarded.

Smash explores a parallel processing model that attempts to extract nearly everything from a shovel of dirt at once. That concept borrows ideas from industries such as petroleum refining, where multiple outputs are separated efficiently from a single input.

The program also reflects concerns about relying on a single major site such as the Mountain Pass mine which once dominated global rare earth output but struggled when refining costs became uncompetitive.

DARPA notes that concentrating production in one location creates vulnerability if disruptions occur. A distributed model using varied feedstocks, including mining waste and recycled materials, could cut that exposure.

Smash will run as a 48-month effort split into two phases. The first will focus on proof-of-concept experiments, while the second will move toward working prototypes suitable for industrial mining environments.

Even if the technology succeeds in laboratory settings, scaling it economically could be tricky. Achieving profitability while maintaining strict environmental and labor standards will be the real test.


Original Submission

posted by janrinok on Saturday April 25, @04:08PM   Printer-friendly

A stubborn misconception is hampering the already hard work of quantum readiness:

With growing focus on the existential threat quantum computing poses to some of the most crucial and widely used forms of encryption, cryptography engineer Filippo Valsorda wants to make one thing absolutely clear: Contrary to popular mythology that refuses to die, AES 128 is perfectly fine in a post-quantum world.

AES 128 is the most widely used variety of the Advanced Encryption Standard , a block cipher suite formally adopted by NIST in 2001. While the specification allows 192- and 256-bit key sizes, AES 128 was widely considered to be the preferred one because it meets the sweet spot between computational resources required to use it and the security it offers. With no known vulnerabilities in its 30-year history, a brute-force attack is the only known way to break it. With 2 128 or 3.4 x 10 38 possible key combinations, such an attack would take about 9 billion years using the entire Bitcoin mining resources as of 2026.

Over the past decade, something interesting happened to all that public confidence. Amateur cryptographers and mathematicians twisted a series of equations known as Grover's algorithm to declare the death of AES 128 once a cryptographically relevant quantum computer (CRQC) came into being. They said a CRQC would halve the effective strength to just 2 64 , a small enough supply that—if true—would allow the same Bitcoin mining resources to brute force it in less than a second (the comparison is purely for illustration purposes; a CRQC almost certainly couldn't run like clusters of Bitcoin ASICs and more importantly couldn't parallelize the workload as the amateurs assume).

On Monday Valsorda finally channelled years' worth of frustration fueled by the widely held misunderstanding into a blog post titled Quantum Computers Are Not a Threat to 128-bit Symmetric Keys .

"There's a common misconception that quantum computers will 'halve' the security of symmetric keys, requiring 256-bit keys for 128 bits of security," he wrote. "That is not an accurate interpretation of the speedup offered by quantum algorithms, it's not reflected in any compliance mandate, and risks diverting energy and attention from actually necessary post-quantum transition work."

That's the easy part of the argument. The much harder part is the math and physics that explains it. At its highest level it comes down to a fundamental difference in the way a brute-force search works on classical computers versus the way it works using Grover's algorithm. Classical computers can perform multiple searches simultaneously, a capability that allows large tasks to be broken into smaller pieces to complete the overall job faster. Grover's algorithm, by contrast, requires a long-running serial computation, where each search is done one at a time.

"What makes Grover special is that as you parallelize it, its advantage over non-quantum algorithms gets smaller," Valsorda said in an interview. He continued:

Imagine it with small numbers, let's say there are 256 possible combinations to a lock, A normal attack would take 256 tries. You decide it's too long, so you get three friends and you each do 64 tries. "That's the classical parallelization. With Grover you could in theory do √256)=16 tries in a row, but if that's still too long and you again look for help from three friends. Each has to do √256/4)=8 tries.

So in total you do 8*4=32 tries, which is more than the 16 you would have done alone! Asking for help to parallelize the attack made the attack slower overall. Which is not the case for classical attacks.

Of course the numbers are way larger, but if we apply any reasonable constraint on the attacker (like having to finish a run in 10 years), the total work becomes so much more than 2 64 .

Also, 2 64 was never the right number, because that pretends you can do AES as a single operation on a single qubit. This is somewhat orthogonal. The combination of these two observations turn the actual cost into 2 104 give or take, which is well beyond the threshold for security.

Sophie Schmieg, a senior cryptography engineer at Google, explained it this way:

With a normal brute force search, if I interrupt it halfway through, I have roughly a 50% chance of it already being successful. So I can have two computers doing the search, each over 50% of the keys, and be done in half the time. But with Grover's, if I interrupt halfway through, the probability of getting the correct answer is only 25%. So instead of using two computers on half of the search space, I now need four.

So if you look at coreseconds, the classical algorithms cost what they cost, independent of how many computers you use in parallel. You can increase cores and your time goes down by the corresponding amount. But with the quantum algorithm, coreseconds are not independent of the parallelization strategy. Having more cores does not reduce the time by the same amount, to the point that if you went to the maximally parallel instance where each QC has to check only a single key, you need 2 128 QCs, and not 2 64 , i.e. you're no better than classical.

Valsorda's post provides a more mathematically detailed explanation, as does this video .

Valsorda listed a litany of sources that support the assertion that AES is perfectly acceptable in a post-quantum world, including from the National Institute of Standards and Technology ( here , here , and here ), the German Federal Office for Information Security ( here ), and Samuel Jaques, an assistant professor in the Department of Combinatorics and Optimization at the University of Waterloo ( here ).

The exception to these recommendations is spelled out in the NSA's version 2 of the Commercial National Security Algorithm Suite, which mandates AES 256. Valsorda said requirements for 256-level security were in place even in the predecessor algorithm suite, and weren't specific to quantum readiness. "As far as I can tell, its intention is to avoid the very same fragmentation introduced by security levels by picking one oversized primitive for all settings."

He further said 256-bit AES is also warranted in certain cases, such as to avoid the possibility of collisions, in which two keys randomly end up equal because of the birthday paradox .

So the next time you hear someone say quantum computing reduces the security of AES by a factor of two, kindly remind them that's a superstition that's distracting engineers from the real and considerable work in preparing the world for the advent of CRQC. It's a tall enough order updating asymmetric algorithms known to be vulnerable to Shor's algorithm , which breaks them in polynomial time, specifically cubic time , a massive advantage compared with the exponential time provided by today's classical computers.

"Conflating necessary and unnecessary changes will cause needless churn and take resources away from the urgent updates," Valsorda argued. "We're lucky we can leave the symmetric cryptography (sub-)systems untouched; we should take that blessing and focus on the work that actually needs doing, which is plenty."


Original Submission