Data Storage

Tech Hobbyist Destroys 51 MicroSD Cards To Build Ultimate Performance Database (tomshardware.com) 11

Tech enthusiast Matt Cole has created a comprehensive MicroSD card testing database, writing over 18 petabytes of data across nearly 200 cards since July 2023. Cole's "Great MicroSD Card Survey" uses eight machines running 70 card readers around the clock, writing 101 terabytes daily to test authenticity, performance, and endurance.

The 15,000-word report covering over 200 different cards reveals significant quality disparities. Name-brand cards purchased from Amazon performed markedly better than identical models from AliExpress, while cards with "fake flash" -- inflated capacity ratings -- performed significantly worse than authentic storage. Sandisk and Kingston cards averaged 4,634 and 3,555 read/write cycles before first error, respectively, while Lenovo cards averaged just 291 cycles. Some off-brand cards failed after only 27 cycles. Cole tested 51 cards to complete destruction during the endurance testing phase.
The Internet

Psylo Browser Obscures Digital Fingerprints By Giving Every Tab Its Own IP Address (theregister.com) 20

Psylo, a new privacy-focused iOS browser by Mysk, aims to defeat digital fingerprinting by isolating each browser tab with its own IP address, unique fingerprinting defenses, and proxy-based encryption. "Psylo stands out as it is the only WebKit-based iOS browser that truly isolates tabs," Tommy Mysk told The Register. "It's not only about separate storage and cookies. Psylo goes beyond that."

"This is why we call tabs 'silos.' It applies unique anti-fingerprinting measures per silo, such as canvas randomization. This way two Psylo tabs opening the same website would appear as though they originated on two different devices to the opened website." From the report: The company claims Psylo therefore offers better privacy than a VPN because the virtual networks mask the user's IP address but generally don't alter the data used for fingerprinting. Psylo, for example, will adjust the browser's time zone and browser language to match the geolocation of each proxy, resulting in more entropy that means fingerprints created by gathering data from silos will appear to be different.

The Mysk devs' post states that some privacy-focused browsers like Brave also implement anti-fingerprinting measures like canvas randomization, but those are more effective on the desktop macOS app due to Apple's iOS restrictions. They claim that they were able to achieve better results on iOS by using a client-side JavaScript solution. Mysk designed Psylo to minimize the information available to its maker. It doesn't log personally identifiable information or browsing data that the curious could use to identify the user, the company claims, noting that it also doesn't have customer payment information, which is handled by Apple. There are no user accounts, only randomized identifiers to indicate active subscriptions. According to Tommy Mysk, the only subscriber data kept is bandwidth usage, which is necessary to prevent abuse.

"We aggregate bandwidth usage based on a randomly generated ID that is created when a subscription is made," Mysk said. "The randomly generated ID is associated with the Apple subscription transaction. Apple doesn't share the identity of users making App Store purchases with developers." Asked whether Apple could identify users, Mysk said, "Theoretically and given a court order, Apple can figure out the randomly generated ID of the user in question. If we were to hand out the data associated with the randomly generated ID, it would only be the bandwidth usage of that user in the current month, and two months in the past. Older data is automatically deleted. "We don't associate any identifiable information with the randomly generated ID. We don't store IP addresses at all in every component of our system. We don't store websites visited by our users at all."
The browser is only available on iOS and iPadOS, but Mysk says an Android version could be developed if there's enough interest. It costs $9.99 per month or $99 per year in the U.S.
Microsoft

Microsoft Releases Classic MS-DOS Editor For Linux (arstechnica.com) 74

Microsoft has released a modern, open-source version of its classic MS-DOS Editor -- built with Rust and compatible with Windows, macOS, and Linux. It's now simple called "Edit." Ars Technica reports: Aside from ease of use, Microsoft's main reason for creating the new version of Edit stems from a peculiar gap in modern Windows. "What motivated us to build Edit was the need for a default CLI text editor in 64-bit versions of Windows," writes [Christopher Nguyen, a product manager on Microsoft's Windows Terminal team] while referring to the command-line interface, or CLI. "32-bit versions of Windows ship with the MS-DOS editor, but 64-bit versions do not have a CLI editor installed inbox." [...]

Linux users can download Edit from the project's GitHub releases page or install it through an unofficial snap package. Oh, and if you're a fan of the vintage editor and crave a 16-bit text-mode for your retro machine that actually runs MS-DOS, you can download a copy on the Internet Archive. [...]

At 250KB, the new Edit maintains the lightweight philosophy of its predecessor while adding features the original couldn't dream of: Unicode support, regular expressions, and the ability to handle gigabyte-sized files. The original editor was limited to files smaller than 300KB depending on available conventional memory -- a constraint that seems quaint in an era of terabyte storage. But the web publication OMG! Ubuntu found that the modern Edit not only "works great on Ubuntu" but noted its speed when handling gigabyte-sized documents.

Patents

WD Escapes Half a Billion in Patent Damages as Judge Trims Award To $1 (theregister.com) 11

Western Digital has succeeded in having the sum it owed from a patent infringement case reduced from $553 million down to just $1 in post-trial motions, when the judge found the plaintiff's claims had shifted during the course of the litigation. From a report: The storage biz was held by a California jury to have infringed on data encryption patents owned by SPEX Technologies Inc in October, relating to several of its self-encrypting hard drive products.

WD was initially told to pay $316 million in damages, but District Judge James Selna ruled the company owed a further $237 million in interest charges earlier this year, bringing the total to more than half a billion dollars. In February, WD was given a week to file a bond or stump up the entire damages payment.
Selna granted Western Digital's post-trial motion to reduce damages, writing that "SPEX's damages theory changed as certain evidence and theories became unavailable" and there was "insufficient evidence from which the Court could determine a reasonable royalty."
The Courts

DOJ Files To Seize $225 Million In Crypto From Scammers (theverge.com) 13

The DOJ has filed a civil complaint to seize $225.3 million in cryptocurrency linked to pig butchering scams -- long-con frauds where victims are tricked into fake crypto investments. The funds were laundered through a blockchain network, and the DOJ says recovered money will go toward reimbursing victims. The Verge reports: The 75-page complaint (PDF) filed in the US District Court for the District of Columbia lays out more detail about the seizure. According to it, the US Secret Service (USSS) and Federal Bureau of Investigation (FBI) tied scammers to seven groups of Tether stablecoin tokens. The fraud fell under what's typically known as "pig butchering": a form of long-running confidence scam aimed at tricking victims -- sometimes with a fake romantic relationship -- into what they believe is a profitable crypto investment opportunity, then disappearing with the funds. Pig butchering rings often traffic the workers who directly communicate with victims to Southeast Asian countries, something the DOJ alleges this ring did.

The DOJ says Tether and crypto exchange OKX first alerted law enforcement in 2023 to a series of accounts they believed were helping launder fraudulently obtained currency through a vast and complex web of transactions. The alleged victims include Shan Hanes (referred to in this complaint as S.H.), the former Heartland Tri-State Bank president who was sentenced to 24 years in prison for embezzling tens of millions of dollars to invest in one of the best-known and most devastating pig butchering scams. The complaint lists a number of other victims who lost thousands or millions of dollars they thought they were investing (and did not commit crimes of their own). An FBI report (PDF) cited by the press release concluded overall crypto investment fraud caused $5.8 billion worth of reported losses in 2024.

Security

The 16-Billion-Record Data Breach That No One's Ever Heard of (cybernews.com) 34

An anonymous reader quotes a report from Cybernews: Several collections of login credentials reveal one of the largest data breaches in history, totaling a humongous 16 billion exposed login credentials. The data most likely originates from various infostealers. Unnecessarily compiling sensitive information can be as damaging as actively trying to steal it. For example, the Cybernews research team discovered a plethora of supermassive datasets, housing billions upon billions of login credentials. From social media and corporate platforms to VPNs and developer portals, no stone was left unturned.

Our team has been closely monitoring the web since the beginning of the year. So far, they've discovered 30 exposed datasets containing from tens of millions to over 3.5 billion records each. In total, the researchers uncovered an unimaginable 16 billion records. None of the exposed datasets were reported previously, bar one: in late May, Wired magazine reported a security researcher discovering a "mysterious database" with 184 million records. It barely scratches the top 20 of what the team discovered. Most worryingly, researchers claim new massive datasets emerge every few weeks, signaling how prevalent infostealer malware truly is.

"This is not just a leak -- it's a blueprint for mass exploitation. With over 16 billion login records exposed, cybercriminals now have unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing. What's especially concerning is the structure and recency of these datasets -- these aren't just old breaches being recycled. This is fresh, weaponizable intelligence at scale," researchers said. The only silver lining here is that all of the datasets were exposed only briefly: long enough for researchers to uncover them, but not long enough to find who was controlling vast amounts of data. Most of the datasets were temporarily accessible through unsecured Elasticsearch or object storage instances.
Key details to be aware of: - The records include billions of login credentials, often structured as URL, login, and password.
- The datasets include both old and recent breaches, many with cookies, tokens, and metadata, making them especially dangerous for organizations without multi-factor authentication or strong credential practices.
- Exposed services span major platforms like Apple, Google, Facebook, Telegram, GitHub, and even government services.
- The largest dataset alone includes 3.5 billion records, while one associated with the Russian Federation has over 455 million; many dataset names suggest links to malware or specific regions.
- Ownership of the leaked data is unclear, but its potential for phishing, identity theft, and ransomware is severe -- especially since even a - Basic cyber hygiene -- such as regularly updating strong passwords and scanning for malware -- is currently the best line of defense for users.

China

Chinese AI Companies Dodge US Chip Curbs Flying Suitcases of Hard Drives Abroad (wsj.com) 20

An anonymous reader quotes a report from the Wall Street Journal: Since 2022, the U.S. has tightened the noose around the sale of high-end AI chips and other technology to China overnational-security concerns. Yet Chinese companies have made advances using workarounds. In some cases, Chinese AI developers have been able to substitute domestic chips for the American ones. Another workaround is to smuggle AI hardware into China through third countries. But people in the industry say that has become more difficult in recent months, in part because of U.S. pressure. That is pushing Chinese companies to try a further option: bringing their data outside China so they can use American AI chips in places such as Southeast Asia and the Middle East (source paywalled; alternative source). The maneuvers are testing the limits of U.S. restrictions. "This was something we were consistently concerned about," said Thea Kendler, who was in charge of export controls at the Commerce Department in the Biden administration, referring to Chinese companies remotely accessing advanced American AI chips. Layers of intermediaries typically separate the Chinese users of American AI chips from the U.S. companies -- led by Nvidia -- that make them. That leaves it opaque whether anyone is violating U.S. rules or guidance. [...]

At the Chinese AI developer, the Malaysia game plans take months of preparation, say people involved in them. Engineers decided it would be fastest to fly physical hard drives with data into the country, since transferring huge volumes of data over the internet could take months. Before traveling, the company's engineers in China spent more than eight weeks optimizing the data sets and adjusting the AI training program, knowing it would be hard to make major tweaks once the data was out of the country. The Chinese engineers had turned to the same Malaysian data center last July, working through a Singaporean subsidiary. As Nvidia and its vendors began to conduct stricter audits on the end users of AI chips, the Chinese company was asked by the Malaysian data center late last year to work through a Malaysian entity, which the companies thought might trigger less scrutiny.

The Chinese company registered an entity in Kuala Lumpur, Malaysia's capital, listing three Malaysian citizens as directors and an offshore holding company as its parent, according to a corporate registry document. To avoid raising suspicions at Malaysian customs, the Chinese engineers packed their hard drives into four different suitcases. Last year, they traveled with the hard drives bundled into one piece of luggage. They returned to China recently with the results -- several hundred gigabytes of data, including model parameters that guide the AI system's output. The procedure, while cumbersome, avoided having to bring hardware such as chips or servers into China. That is getting more difficult because authorities in Southeast Asia are cracking down on transshipments through the region into China.

Data Storage

macOS Tahoe Brings a New Disk Image Format (eclecticlight.co) 29

Apple's macOS 26 "Tahoe" introduces a new disk image format called ASIF, designed to dramatically improve performance over previous formats like UDRW and sparse bundles -- achieving near-native read/write speeds for virtual machines and general disk image use. The Eclectic Light Company reports: Apple provides few technical details, other than stating that the intrinsic structure of ASIF disk images doesn't depend on the host file system's capabilities, and their size on the host depends on the size of the data stored in the disk. In other words, they're a sparse file in APFS, and are flagged as such. [...]

Conclusions:
- Where possible, in macOS 26 Tahoe in particular, VMs should use ASIF disk images rather than RAW/UDRW.
- Unless a sparse bundle is required (for example when it's hosted on a different file system such as that in a NAS), ASIF should be first choice for general purpose disk images in Tahoe.
- It would be preferable for virtualizers to be able to call a proper API rather than a command tool.
- Keep an eye on C-Command's DropDMG. I'm sure it will support ASIF disk images soon.

Microsoft

'We're Done With Teams': German State Hits Uninstall on Microsoft (france24.com) 100

An anonymous reader shares a report: In less than three months' time, almost no civil servant, police officer or judge in Schleswig-Holstein will be using any of Microsoft's ubiquitous programs at work. Instead, the northern state will turn to open-source software to "take back control" over data storage and ensure "digital sovereignty," its digitalisation minister, Dirk Schroedter, told AFP. "We're done with Teams!" he said, referring to Microsoft's messaging and collaboration tool and speaking on a video call -- via an open-source German program, of course.

The radical switch-over affects half of Schleswig-Holstein's 60,000 public servants, with 30,000 or so teachers due to follow suit in coming years. The state's shift towards open-source software began last year. The current first phase involves ending the use of Word and Excel software, which are being replaced by LibreOffice, while Open-Xchange is taking the place of Outlook for emails and calendars.

The Military

US Navy Backs Right To Repair After $13 Billion Carrier Crew Left Half-Fed By Contractor-Locked Ovens (theregister.com) 135

An anonymous reader quotes a report from The Register: US Navy Secretary John Phelan has told the Senate the service needs the right to repair its own gear, and will rethink how it writes contracts to keep control of intellectual property and ensure sailors can fix hardware, especially in a fight. Speaking to the Senate Armed Services Committee on Tuesday, Phelan cited the case of the USS Gerald R. Ford, America's largest and most expensive nuclear-powered aircraft carrier, which carried a price tag of $13 billion. The ship was struggling to feed its crew of over 4,500 because six of its eight ovens were out of action, and sailors were barred by contract from fixing them themselves.

"I am a huge supporter of right to repair," Phelan told the politicians. "I went on the carrier; they had eight ovens -- this is a ship that serves 15,300 meals a day. Only two were working. Six were out." He pointed out the Navy personnel are capable of fixing their own gear but are blocked by contracts that reserve repairs for vendors, often due to IP restrictions. That drives up costs and slows down basic fixes. According to the Government Accountability Office, about 70 percent [PDF] of a weapon system's life-cycle cost goes to operations and support. A similar issue plagued the USS Gerald Ford's weapons elevators, which move bombs from deep storage to the flight deck. They reportedly took more than four years after delivery to become fully operational, delaying the carrier's first proper deployment. "They have to come out and diagnose the problem, and then they'll fix it," Phelan said. "It is crazy. We should be able to fix this."
"Our soldiers are immensely smart and capable and should not need to rely on a third party contractor to maintain their equipment. Oven repair is not rocket science: of course sailors should be able to repair their ovens," Kyle Wiens, CEO of repair specialists iFixit told The Register.

"It's gratifying to see Secretary Phelan echoing our work. The Navy bought it, the Navy should be able to fix it. Ownership is universal, and the same principles apply to an iPhone or a radar. Of course, the devil is in the details: the military needs service documentation, detailed schematics, 3D models of parts so they can be manufactured in the field, and so on. We're excited that the military is joining us on this journey to reclaim ownership."

Further reading: Army Will Seek Right To Repair Clauses In All Its Contracts
Power

World Bank Lifts Ban on Funding Nuclear Energy in Boost To Industry 112

The World Bank is lifting its decades-long ban on financing nuclear energy, in a policy shift aimed at accelerating development of the low-emissions technology to meet surging electricity demand in the developing world. From a report: In an email to staff on Wednesday, Ajay Banga, the World Bank president, said it would "begin to re-enter the nuclear energy space" [non-paywalled source] in partnership with the International Atomic Energy Agency, the UN nuclear watchdog which works to prevent proliferation of nuclear weapons.

"We will support efforts to extend the life ofÂexisting reactors in countries that already have them, and help support grid upgrades andÂrelated infrastructure," the email said. The shift follows advocacy from the pro-nuclear Trump administration and a change of government in Germany, which previously opposed financing atomic energy due to domestic political opposition to the technology. It is part of a wider strategy aimed at tackling an expected doubling of electricity demand in the developing world by 2035. Meeting this demand would require annual investment in generation, grids and storage to rise from $280 billion today to $630 billion, Banga said in the memo seen by the Financial Times.
Data Storage

FAA To Eliminate Floppy Disks Used In Air Traffic Control Systems (tomshardware.com) 151

An anonymous reader quotes a report from Tom's Hardware: The head of the Federal Aviation Administration just outlined an ambitious goal to upgrade the U.S.'s air traffic control (ATC) system and bring it into the 21st century. According to NPR, most ATC towers and other facilities today feel like they're stuck in the 20th century, with controllers using paper strips and floppy disks to transfer data, while their computers run Windows 95. While this likely saved them from the disastrous CrowdStrike outage that had a massive global impact, their age is a major risk to the nation's critical infrastructure, with the FAA itself saying that the current state of its hardware is unsustainable.

"The whole idea is to replace the system. No more floppy disks or paper strips," acting FAA administrator Chris Rocheleau told the House Appropriations Committee last Wednesday. Transportation Secretary Sean Duffy also said earlier this week," This is the most important infrastructure project that we've had in this country for decades. Everyone agrees -- this is non-partisan. Everyone knows we have to do it." The aviation industry put up a coalition pushing for ATC modernization called Modern Skies, and it even ran an ad telling us that ATC is still using floppy disks and several older technologies to keep our skies safe. [...]

Currently, the White House hasn't said what this update will cost. The FAA has already put out a Request For Information to gather data from companies willing to take on the challenge of upgrading the entire system. It also announced several 'Industry Days' so companies can pitch their tech and ideas to the Transportation Department. Duffy said that the Transportation Department aims to complete the project within four years. However, industry experts say this timeline is unrealistic. No matter how long it takes, it's high time that the FAA upgrades the U.S.'s ATC system today after decades of neglect.

Data Storage

Seagate's New 4TB Xbox Expansion Card Costs More Than the Xbox Series S (theverge.com) 9

An anonymous reader shares a report: Seagate has announced a new 4TB version of its storage expansion card for the Xbox Series X and S consoles. It's the first time the company has introduced a new capacity since launching 2TB and 512GB versions of the expansion card in late 2021.

The 4TB card is available starting today through Seagate's online store and Best Buy for $499.99, but is discounted to $429.99 as part of a limited-time launch promotion. For comparison, the Xbox Series S starts at $379.99, while the Xbox Series X starts at $599.99.

XBox (Games)

Microsoft Announces Upcoming Windows-Powered Handheld Xbox Device: the 'ROG Xbox Ally' (engadget.com) 44

Nintendo's new Switch 2 console sold a record 3 million units after its launch Thursday. But then today Microsoft announced their own upcoming handheld gaming device that's Xbox-branded (and Windows-powered).

Working with ASUS' ROG division, they build a device that weighs more than the Nintendo Switch 2, and "is marginally heavier than the Steam Deck," reports Engadget. But "at least those grips look more ergonomic than those on the Nintendo Switch 2 (which is already cramping my hands) or even the Steam Deck." There are two variants of the handheld: the ROG Xbox Ally and ROG Xbox Ally X. Microsoft didn't reveal pricing, but the handhelds are coming this holiday... Critically, Microsoft and ROG aren't locking the devices to only playing Xbox games (though you can do that natively, via the cloud or by accessing an Xbox console remotely). You'll be able to play games from Battle.net and "other leading PC storefronts" too. Obviously, there's Game Pass integration here, as well as support for the Xbox Play Anywhere initiative, which enables you to play games with synced progress across a swathe of devices after buying them once...

There's a dedicated physical Xbox button that can bring up a Game Bar overlay, which seemingly makes it easy to switch between apps and games, tweak settings, start chatting with friends and more... You'll be able to mod games on either system as well.

The Xbox Ally is powered by the AMD Ryzen Z2 A Processor, and has 16GB of RAM and 512GB of SSD storage. The Xbox Ally X is the more powerful model. It has a AMD Ryzen AI Z2 Extreme processor, 24GB of RAM and 1TB of storage. They each have a microSD card reader, so you won't need to worry about shelling out for proprietary storage options to have extra space for your games... Both systems boast "HD haptics..." Both systems should be capable of outputting video to a TV or monitor, as they have two USB-C ports with support for DisplayPort 2.1 and Power Delivery 3.0.

"Microsoft has needed to respond to SteamOS ever since the Steam Deck launched three years ago," argues The Verge, "and it has steadily been tweaking its Xbox app and the Xbox Game Bar on Windows to make both more handheld-friendly..." But there was always a bigger overhaul of Windows required, and we're starting to see parts of that today. "The reality is that we've made tremendous progress on this over the last couple of years, and this is really the device that galvanized those teams and got everybody marching and working towards a moment that we're just really excited to put into the hands of players," says Roanne Sones, corporate vice president of gaming Devices and ecosystem at Xbox, in a briefing with The Verge...

I'll need to try this new interface fully to really get a feel for the Windows changes here, but Microsoft is promising that this isn't just lipstick on top of Windows. "This isn't surface-level changes, we've made significant improvements," says Potvin. "Some of our early testing with the components we've turned off in Windows, we get about 2GB of memory going back to the games while running in the full-screen experience."

Nintendo

Nintendo Warns Switch 2 GameChat Users: 'Your Chat Is Recorded' (arstechnica.com) 68

Ars Technica's Kyle Orland reports: Last month, ahead of the launch of the Switch 2 and its GameChat communication features, Nintendo updated its privacy policy to note that the company "may also monitor and record your video and audio interactions with other users." Now that the Switch 2 has officially launched, we have a clearer understanding of how the console handles audio and video recorded during GameChat sessions, as well as when that footage may be sent to Nintendo or shared with partners, including law enforcement. Before using GameChat on Switch 2 for the first time, you must consent to a set of GameChat Terms displayed on the system itself. These terms warn that chat content is "recorded and stored temporarily" both on your system and the system of those you chat with. But those stored recordings are only shared with Nintendo if a user reports a violation of Nintendo's Community Guidelines, the company writes.

That reporting feature lets a user "review a recording of the last three minutes of the latest three GameChat sessions" to highlight a particular section for review, suggesting that chat sessions are not being captured and stored in full. The terms also lay out that "these recordings are available only if the report is submitted within 24 hours," suggesting that recordings are deleted from local storage after a full day. If a report is submitted to Nintendo, the company warns that it "may disclose certain information to third parties, such as authorities, courts, lawyers, or subcontractors reviewing the reported chats." If you don't consent to the potential for such recording and sharing, you're prevented from using GameChat altogether.

Nintendo is extremely clear that the purpose of its recording and review system is "to protect GameChat users, especially minors" and "to support our ability to uphold our Community Guidelines." This kind of human moderator review of chats is pretty common in the gaming world and can even apply to voice recordings made by various smart home assistants. [...] Overall, the time-limited, local-unless-reported recordings Nintendo makes here seem like a minimal intrusion on the average GameChat user's privacy. Still, if you're paranoid about Nintendo potentially seeing and hearing what's going on in your living room, it's good to at least be aware of it.

Movies

Man Who Stole 1,000 DVDs From Employer Strikes Plea Deal Over Movie Leaks (arstechnica.com) 61

An anonymous reader quotes a report from Ars Technica: An accused movie pirate who stole more than 1,000 Blu-ray discs and DVDs while working for a DVD manufacturing company struck a plea deal (PDF) this week to lower his sentence after the FBI claimed the man's piracy cost movie studios millions. Steven Hale no longer works for the DVD company. He was arrested in March, accused of "bypassing encryption that prevents unauthorized copying" and ripping pre-release copies of movies he could only access because his former employer was used by major movie studios. As alleged by the feds, his game was beating studios to releases to achieve the greatest possible financial gains from online leaks.

Among the popular movies that Hale is believed to have leaked between 2021 and 2022 was Spider-Man: No Way Home, which the FBI alleged was copied "tens of millions of times" at an estimated loss of "tens of millions of dollars" for just one studio on one movie. Other movies Hale ripped included animated hits like Encanto and Sing 2, as well as anticipated sequels like The Matrix: Resurrections and Venom: Let There Be Carnage. The cops first caught wind of Hale's scheme in March 2022. They seized about 1,160 Blu-rays and DVDs in what TorrentFreak noted were the days just "after the Spider-Man movie leaked online." It's unclear why it took close to three years before Hale's arrest, but TorrentFreak suggested that Hale's case is perhaps part of a bigger investigation into the Spider-Man leaks.
A plea deal for Hale significantly reduced the estimated damages from his piracy case to under $40,000 and led to the dismissal of two charges, though he still faces up to five years in prison and a $250,000 fine for one remaining copyright infringement charge. His final sentence and restitution amount will be decided at a court hearing in Tennessee at the end of August.
AI

Gemini Can Now Watch Google Drive Videos For You 36

Google's Gemini AI can now analyze and summarize video files stored in Google Drive, letting users ask questions about content like meeting takeaways or product updates without watching the footage. The Verge reports: The Gemini in Drive feature provides a familiar chatbot interface that can provide quick summaries describing the footage or pull specific information. For example, users can ask Gemini to list action items mentioned in recorded meetings or highlight the biggest updates and new products in an announcement video, saving time spent on manually combing through and taking notes.

The feature requires captions to be enabled for videos, and can be accessed using either Google Drive's overlay previewer or a new browser tab window. It's available in English for Google Workspace and Google One AI Premium users, and anyone who has previously purchased Gemini Business or Enterprise add-ons, though it may take a few weeks to fully roll out.
You can learn more about the update in Google's blog post.
United States

California Has Got Really Good at Building Giant Batteries 108

California's battery power capacity rose from 500 megawatts in 2018 to nearly 16,000 megawatts in 2025. Nearly a quarter of America's battery capacity is now in California alone, according to Bloomberg.

At their daily peak around 8pm, batteries can provide as much as 30% of the state's electricity. The batteries charge in the afternoon when solar power is cheap and release energy in the evenings when Californians get home and crank up their air conditioners. In the middle of the day, when the sun is strongest, as much as three-quarters of the state's electricity can come from solar.

California relied on regulation to achieve this scale. In 2013, the California Public Utilities Commission ordered the state's three big investor-owned utilities to procure 1,325 megawatts of energy storage by 2020 to help meet renewable targets and stabilize the grid. That goal was easily met. Mark Jacobson, an engineering professor at Stanford University, told Economist that most days this year contained periods when solar, hydropower and wind, helped by batteries, met 100% of California's demand -- even though just 54% of the state's electricity generation comes from renewables.
Encryption

How Many Qubits Will It Take to Break Secure Public Key Cryptography Algorithms? (googleblog.com) 53

Wednesday Google security researchers published a preprint demonstrating that 2048-bit RSA encryption "could theoretically be broken by a quantum computer with 1 million noisy qubits running for one week," writes Google's security blog.

"This is a 20-fold decrease in the number of qubits from our previous estimate, published in 2019... " The reduction in physical qubit count comes from two sources: better algorithms and better error correction — whereby qubits used by the algorithm ("logical qubits") are redundantly encoded across many physical qubits, so that errors can be detected and corrected... [Google's researchers found a way to reduce the operations in a 2024 algorithm from 1000x more than previous work to just 2x. And "On the error correction side, the key change is tripling the storage density of idle logical qubits by adding a second layer of error correction."]

Notably, quantum computers with relevant error rates currently have on the order of only 100 to 1000 qubits, and the National Institute of Standards and Technology (NIST) recently released standard PQC algorithms that are expected to be resistant to future large-scale quantum computers. However, this new result does underscore the importance of migrating to these standards in line with NIST recommended timelines.

The article notes that Google started using the standardized version of ML-KEM once it became available, both internally and for encrypting traffic in Chrome...

"The initial public draft of the NIST internal report on the transition to post-quantum cryptography standards states that vulnerable systems should be deprecated after 2030 and disallowed after 2035. Our work highlights the importance of adhering to this recommended timeline."
Data Storage

Internet Archive Now Livestreams History As It's Being Preserved (9to5mac.com) 2

The Internet Archive has begun livestreaming its microfiche digitization center on YouTube, showcasing the real-time preservation of fragile film cards into searchable public documents. The work is part of Democracy's Library, a global initiative to digitize and share millions of government records. 9to5Mac reports: The livestream was brought to life by Sophia Tung, who previously gained attention for her viral robotaxi depot stream. Her new video explains how and why this new livestream project came together [...].

The livestream features five scanning stations at work, with one shown in close-up as operators digitize microfiche cards in real time. Each card holds up to 100 pages of public records. High-resolution cameras capture the images, software stitches and crops the pages, and the results are made text-searchable and freely accessible through Democracy's Library. Live scanning takes place Monday through Friday, 7:30 a.m. to 3:30 p.m. PT, excluding U.S. holidays, with a second shift expected to begin soon.

Slashdot Top Deals