10 interesting stories served every morning and every evening.
After years of staring down the world’s biggest tech companies and setting the bar for tough regulation worldwide, Europe has blinked. Under intense pressure from industry and the US government, Brussels is stripping protections from its flagship General Data Protection Regulation (GDPR) — including simplifying its infamous cookie permission pop-ups — and relaxing or delaying landmark AI rules in an effort to cut red tape and revive sluggish economic growth.
The changes, proposed by the European Commission, the bloc’s executive branch, changes core elements of the GDPR, making it easier for companies to share anonymized and pseudonymized personal datasets. They would allow AI companies to legally use personal data to train AI models, so long as that training complies with other GDPR requirements.
The proposal also waters down a key part of Europe’s sweeping artificial intelligence rules, the AI Act, which came into force in 2024 but had many elements that would only come into effect later. The change extends the grace period for rules governing high-risk AI systems that pose “serious risks” to health, safety, or fundamental rights, which were due to come into effect next summer. The rules will now only apply once it’s confirmed that “the needed standards and support tools are available” to AI companies.
One change that’s likely to please almost everyone is a reduction in Europe’s ubiquitous cookie banners and pop-ups. Under the new proposal, some “non-risk” cookies won’t trigger pop-ups at all, and users would be able to control others from central browser controls that apply to websites broadly.
Other amendments in the new Digital Omnibus include simplified AI documentation requirements for smaller companies, a unified interface for companies to report cybersecurity incidents, and centralizing oversight of AI into the bloc’s AI Office.
“We have all the ingredients in the EU to succeed. But our companies, especially our start-ups and small businesses, are often held back by layers of rigid rules,” said Henna Virkkunen, executive vice-president for tech sovereignty at the European Commission. “By cutting red tape, simplifying EU laws, opening access to data and introducing a common European Business Wallet we are giving space for innovation to happen and to be marketed in Europe. This is being done in the European way: by making sure that fundamental rights of users remain fully protected.”
The proposal now heads to the European Parliament and the EU’s 27 member states — where it will need a qualified majority — for approval, a process that could drag on for months and potentially introduce significant changes.
The proposed overhaul won’t land quietly in Brussels, and if the development of the GDPR and AI Act are anything to go by, a political and lobbying firestorm is on its way. The GDPR is a cornerstone of Europe’s tech strategy and as close to sacred as a policy can be. Leaked drafts have already provoked outrage among civil rights groups and politicians, who have accused the Commission of weakening fundamental safeguards and bowing to pressure from Big Tech.
The decision follows months of intense pressure from Big Tech and Donald Trump — as well as high-profile internal figures like ex-Italian prime minister and former head of the European Central Bank Mario Draghi — urging the bloc to weaken burdensome tech regulation. The Commission has sought to frame the changes as simplifying the EU’s tech laws, not weakening them — a way of soothing growing fears in Brussels that its tough rules are hampering its ability to compete globally. With very few exceptions, Europe doesn’t have any credible competitors in the global AI race, which is dominated by US and Chinese companies like DeepSeek, Google, and OpenAI.
...
Read the original on www.theverge.com »
The U. S. Patent and Trademark Office (USPTO) has proposed new rules that would effectively end the public’s ability to challenge improperly granted patents at their source—the Patent Office itself. If these rules take effect, they will hand patent trolls exactly what they’ve been chasing for years: a way to keep bad patents alive and out of reach. People targeted with troll lawsuits will be left with almost no realistic or affordable way to defend themselves.
We need EFF supporters to file public comments opposing these rules right away. The deadline for public comments is December 2. The USPTO is moving quickly, and staying silent will only help those who profit from abusive patents.
Tell USPTO: The public has a right to challenge bad patents
We’re asking supporters who care about a fair patent system to file comments using the federal government’s public comment system. Your comments don’t need to be long, or use legal or technical vocabulary. The important thing is that everyday users and creators of technology have the chance to speak up, and be counted.
Below is a short, simple comment you can copy and paste. Your comment will carry more weight if you add a personal sentence or two of your own. Please note that comments should be submitted under your real name and will become part of the public record.
I oppose the USPTO’s proposed rule changes for inter partes review (IPR), Docket No. PTO-P-2025-0025. The IPR process must remain open and fair. Patent challenges should be decided on their merits, not shut out because of legal activity elsewhere. These rules would make it nearly impossible for the public to challenge bad patents, and that will harm innovation and everyday technology users.
Inter partes review, (IPR), isn’t perfect. It hasn’t eliminated patent trolling, and it’s not available in every case. But it is one of the few practical ways for ordinary developers, small companies, nonprofits, and creators to challenge a bad patent without spending millions of dollars in federal court. That’s why patent trolls hate it—and why the USPTO’s new rules are so dangerous.
IPR isn’t easy or cheap, but compared to years of litigation, it’s a lifeline. When the system works, it removes bogus patents from the table for everyone, not just the target of a single lawsuit.
IPR petitions are decided by the Patent Trial and Appeal Board (PTAB), a panel of specialized administrative judges inside the USPTO. Congress designed IPR to provide a fresh, expert look at whether a patent should have been granted in the first place—especially when strong prior art surfaces. Unlike full federal trials, PTAB review is faster, more technical, and actually accessible to small companies, developers, and public-interest groups.
Here are three real examples of how IPR protected the public:
Personal Audio claimed it had “invented” podcasting and demanded royalties from audio creators using its so-called podcasting patent. EFF crowdsourced prior art, filed an IPR, and ultimately knocked out the patent—benefiting the entire podcasting world.
Under the new rules, this kind of public-interest challenge could easily be blocked based on procedural grounds like timing, before the PTAB even examines the patent.
SportBrain sued more than 80 companies over a patent that claimed to cover basic gathering of user data and sending it over a network. A panel of PTAB judges canceled every claim.
Under the new rules, this patent could have survived long enough to force dozens more companies to pay up.
For more than a decade, Shipping & Transit sued companies over extremely broad “delivery notifications”patents. After repeated losses at PTAB and in court (including fee awards), the company finally collapsed.
Under the new rules, a troll like this could keep its patents alive and continue carpet-bombing small businesses with lawsuits.
IPR hasn’t ended patent trolling. But when a troll waves a bogus patent at hundreds or thousands of people, IPR is one of the only tools that can actually fix the underlying problem: the patent itself. It dismantles abusive patent monopolies that never should have existed, saving entire industries from predatory litigation. That’s exactly why patent trolls and their allies have fought so hard to shut it down. They’ve failed to dismantle IPR in court or in Congress—and now they’re counting on the USPTO’s own leadership to do it for them.
First, they want you to give up your defenses in court. Under this proposal, a defendant can’t file an IPR unless they promise to never challenge the patent’s validity in court.
For someone actually being sued or threatened with patent infringement, that’s simply not a realistic promise to make. The choice would be: use IPR and lose your defenses—or keep your defenses and lose IPR.
Second, the rules allow patents to become “unchallengeable” after one prior fight. That’s right. If a patent survives any earlier validity fight, anywhere, these rules would block everyone else from bringing an IPR, even years later and even if new prior art surfaces. One early decision—even one that’s poorly argued, or didn’t have all the evidence—would block the door on the entire public.
Third, the rules will block IPR entirely if a district court case is projected to move faster than PTAB.
So if a troll sues you with one of the outrageous patents we’ve seen over the years, like patents on watching an ad, showing picture menus, or clocking in to work, the USPTO won’t even look at it. It’ll be back to the bad old days, where you have exactly one way to beat the troll (who chose the court to sue in)—spend millions on experts and lawyers, then take your chances in front of a federal jury.
The USPTO claims this is fine because defendants can still challenge patents in district court. That’s misleading. A real district-court validity fight costs millions of dollars and takes years. For most people and small companies, that’s no opportunity at all.
IPR was created by Congress in 2013 after extensive debate. It was meant to give the public a fast, affordable way to correct the Patent Office’s own mistakes. Only Congress—not agency rulemaking—can rewrite that system.
The USPTO shouldn’t be allowed to quietly undermine IPR with procedural traps that block legitimate challenges.
Bad patents still slip through every year. The Patent Office issues hundreds of thousands of new patents annually. IPR is one of the only tools the public has to push back.
These new rules rely on the absurd presumption that it’s the defendants—the people and companies threatened by questionable patents—who are abusing the system with multiple IPR petitions, and that they should be limited to one bite at the apple.
That’s utterly upside-down. It’s patent trolls like Shipping & Transit and Personal Audio that have sued, or threatened, entire communities of developers and small businesses.
When people have evidence that an overbroad patent was improperly granted, that evidence should be heard. That’s what Congress intended. These rules twist that intent beyond recognition.
In 2023, more than a thousand EFF supporters spoke out and stopped an earlier version of this proposal—your comments made the difference then, and they can again.
Our principle is simple: the public has a right to challenge bad patents. These rules would take that right away. That’s why it’s vital to speak up now.
I oppose the USPTO’s proposed rule changes for inter partes review (IPR), Docket No. PTO-P-2025-0025. The IPR process must remain open and fair. Patent challenges should be decided on their merits, not shut out because of legal activity elsewhere. These rules would make it nearly impossible for the public to challenge bad patents, and that will harm innovation and everyday technology users.
...
Read the original on www.eff.org »
Who controls what you can do on your mobile phone? What happens when your device can only run what the government decides is OK? We are dangerously close to this kind of totalitarian control, thanks to a combination of government overreach and technocratic infrastructure choices.
Most Americans have a smartphone, and the average American spends over 5 hours a day on their phone. While these devices are critical to most people’s daily lives, what they can actually do is shaped by what apps are readily available. A slim majority of American smartphone users use an iPhone, which means they can only install apps available from Apple’s AppStore. Nearly all the rest of US smartphone users use some variant of Android, and by default they get their apps from Google’s Play Store.
Collectively, these two app stores shape the universe of what is available to most people as they use the Internet and make their way through their daily lives. When those app stores block or limit apps based on government requests, they are shaping what people can do, say, communicate, and experience.
Recently, Apple pulled an app called ICEBlock from the AppStore, making it unavailable in one fell swoop. This app was designed to let people anonymously report public sightings of ICE agents. In the United States people absolutely have a First Amendment right to inform others about what they have seen government officials doing and where — very much including immigration agents whose tactics have been controversial and violent. Apple pulled the ICEBlock app at the demand of the US Department of Justice. The following day, Google pulled a similar app called Red Dot from the Google Play Store.
The DOJ’s pressuring of Apple is an unacceptable, censorious overreach. And Google’s subsequent removal of Red Dot looks like troubling premature capitulation. While some experts and activists have expressed concerns over ICEBlock’s design and development practices, those concerns are no reason for the government to meddle in software distribution. The administration’s ostensible free speech warriors are trying to shape how Americans can communicate with each other about matters of pressing political concern.
Infrastructure choices
But the government’s overreach isn’t the whole story here. The current structure of the mobile phone ecosystem enables this kind of abuse and control.
Apple’s iOS (the operating system for any iPhone) is designed to only be able to run apps from the AppStore. If Apple hasn’t signed off on it, the app won’t run. This centralized control is ripe for abuse:
Unlike Apple, Google’s Android operating system has traditionally allowed relatively easy access to “sideloading”, which just means installing apps through means other than Google’s Play Store. Although most installations default to getting apps from the Play Store, the availability of sideloading means that even if Google censors apps in the Play Store, people can still install them. Even apps critical of Google can make it onto an Android device. It’s also possible to run a variant of Android without the Play Store at all, such as GrapheneOS.
Unfortunately that is all set to change with a recent Google announcement that it will block apps from “certified Android” devices (which is nearly all Android phones) unless they come from what Google calls a “verified developer.” This means that the common Android user trying to install an app will have to get Google’s blessing: does this app come from someone that Google has “verified”? How Google will decide who is allowed to be verified and who is not is still unclear. Can a developer become “unverified”?
This upcoming change is framed by Google as a security measure, but merely knowing the identity of the developer of an app doesn’t provide any security. So the only way that the “verified developer” requirement can offer security is if Google withholds “verified developer” status from people it deems bad actors. But Google’s ability to withhold that status can be abused in the same way that Apple’s AppStore lock-in is being abused. A government will simply make a demand: “treat this developer as a bad actor” and effectively cut off any app by targeting its developer.
When a lever of control is available, the would-be censors will try to use it. It has never been true that someone who buys a Lenovo or Dell laptop, for example, has to let Lenovo or Dell tell them what programs they can and cannot install on their computer. Yet that will soon be the situation with regards to nearly all cell phones used in the United States.
Note that American iPhones are limited to only apps from the AppStore, but European Union (EU) iPhones don’t have that restriction. The EU’s Digital Markets Act (DMA) required Apple to permit alternate app stores and sideloading (which Apple calls “web distribution”). As a result, marketplaces like AltStore are starting to become available — but Apple only lets EU customers use them. The European regime is not perfect, however; while sideloaded apps and alternative app stores aren’t subject to the app store’s constraints, they are still obliged to follow Apple’s “Notarization” requirements, which requires Apple to review all iOS apps — even from these alternate sources — on the basis of several vaguely worded rationales. For example, if the DoJ were to claim that ICEBlock “promoted physical harm” (even though it clearly does not), Apple could use this as an excuse to justify revoking their notarization of the app, which would prevent it from being installed even from these alternate channels.
App store security and surveillance
Both Apple and Google make claims that their app distribution mechanisms improve security for their users. And clearly, these tech giants do block some abusive apps by exercising the control they have.
But both of them also regularly allow apps that contain common malicious patterns, including many apps built with surveillance tooling that sell their users’ data to data brokers. If either tech giant were serious about user security, they could ban these practices, but they do not. Google’s security claims are also undermined by the fact that the cellphone hacking company Cellebrite tells law enforcement that Google’s Pixel phones can be hacked, while those running GrapheneOS, created by a small non-profit, cannot. (Asked by a reporter why that was so, Google did not respond.)
Making matters worse, organizations like Google are unclear about their policies, and some of their policy statements can put developers and users at risk. Discussing blocking Red Dot, for example, Google told 404Media that “apps that have user generated content must also conduct content moderation.” This implies that Google could become unwilling to distribute fully end-to-end encrypted apps, like Signal Private Messenger or Delta Chat, since those app vendors by design are incapable of reviewing user-generated content. End-to-end encrypted apps are the gold standard for secure communications, and no app store that signals a willingness to remove them can claim to put security first.
In addition, even if you’ve carefully curated the apps you have installed from these dominant app stores to avoid spyware and use strongly secure apps, the stores themselves monitor the devices, keeping dossiers of what apps are installed on each device, and maybe more. Being a user of these app stores means being under heavy, regular surveillance.
Other options exist
These centralized, surveilled, censorship-enabling app stores are not the only way to distribute software. Consider alternative app stores for Android, like Accrescent, which prioritizes privacy and security requirements in its apps, and F-Droid, which enables installation of free and open source apps. In addition to offering quality tools and auditing, F-Droid’s policies incentivize the apps distributed on the platform to trim out overwhelming amounts of corporate spyware that infest both Google and Apple’s app stores. Neither F-Droid nor Accrescent do any surveillance of their users at all.
The F-Droid developers recently wrote about the impact that Google’s upcoming developer registration requirements are likely to have on the broader ecosystem of privacy-preserving Android apps. The outcome doesn’t look good: the ability to install free and open source software on a common device might be going away. Those few people left using unusual devices (“uncertified” Android deployments like GrapheneOS, or even more obscure non-Android operating systems like phosh) will still have the freedom to install tools that they want, but the overwhelming majority of people will be stuck with what can quickly devolve into a government-controlled cop-in-your-pocket.
How we can push back
In an increasingly centralized world, it will take very little for an abusive government to cause an effective organizing tool to disappear, to block an app that belongs to a critical dissenting media outlet, or to force invasive malware into a software update used by everyone. We need a shared infrastructure that doesn’t permit this kind of centralized control. We can disrupt oligopolistic control over software through user choice (e.g., preferring and installing free software), building good protocol frameworks (e.g., demanding tools that use open standards for interoperability), and through regulatory intervention (e.g., breaking up monopolistic actors, or mandating that an OS must allow sideloading, as the EU did with the DMA).
The device you carry with you that is privy to much of your life should be under your control, not under the control of an abusive government or corporations that do its bidding.
...
Read the original on www.aclu.org »
Posts from this author will be added to your daily email digest and your homepage feed.
This time I’m really going to do it. I am going to put Linux on my gaming PC. Calling it now. 2026 is the year of Linux on the desktop. Or at least on mine.
To be clear, my desktop works fine on Windows 11. But the general ratio of cool new features to egregious bullshit is low. I do not want to talk to my computer. I do not want to use OneDrive. I’m sure as hell not going to use Recall. I am tired of Windows trying to get me to use Edge, Edge trying to get me to use Bing, and everything trying to get me to use Copilot. I paid for an Office 365 subscription so I could edit Excel files. Then Office 365 turned into Microsoft 365 Copilot, and I tried to use it to open a Word document and it didn’t know how.
Meanwhile, Microsoft is ending support for Windows 10, including security updates, forcing people to buy new hardware or live with the risks. It’s disabling workarounds that let you set up Windows 11 with a local account or with older hardware. It’s turning Xboxes into PCs and PCs into upsells for its other businesses. Just this week, the company announced that it’s putting AI agents in the taskbar to turn Windows into a “canvas for AI.” I do not think Windows is going to be a better operating system in a year, so it feels like a good time to try Linux again.
That’s not to say I know what I’m doing. I’ve used Macs for a decade for work, and I dabbled in Ubuntu 20-something years ago, but otherwise I’ve been a Windows guy since 3.1. At first, that’s because it’s what we had at home, later because that’s where the games were, and finally out of force of habit (and because that’s where the games were). I brought a desktop to college instead of a laptop (so I could play games), and I’ve been building my own PCs for 18 years. I started my journalism career at Maximum PC magazine, testing gaming PC components.
I try to stay familiar with all the major operating systems because of my job, so in addition to my work MacBook I also have a Chromebook, a ThinkPad, and a collection of older hardware I refuse to get rid of. I can work pretty well in Windows, in macOS, or in ChromeOS.
All of those projects, except the Chromebook one, took longer than expected, and cut into my vanishingly rare discretionary time. That’s also the time I use for gaming, reading, staring into the void, and half-starting organizational projects, so you can see how precious it is to me.
The prospect of instead using that time trying to get my computer back to a baseline level of functionality — that is, as useful as it was before I tried installing Linux — is tempting, but it’s also why I haven’t done it yet.
It’s a good time to try gaming on Linux. Antonio and Sean have been having fun with Bazzite, a Linux distro that mimics SteamOS; my friend and former colleague Will Smith is cohosting a PCWorld podcast called Dual Boot Diaries with this exact premise.
And what better device to try it on than my personal desktop with an AMD Ryzen 7 9800X3D processor and Nvidia GeForce RTX 4070 Super graphics card? I just rebuilt this thing. The Windows install is only like six months old. It’s working about as well as Windows does.
Based on listening to two and a half episodes of Dual Boot Diaries and a brief text conversation with Will, I’m going to install CachyOS, an Arch-based distro optimized for gaming on modern hardware, with support for cutting-edge CPUs and GPUs and an allegedly easy setup.
I don’t expect things to go smoothly. I don’t really know what I’m doing, and Linux is still a very small percentage of the PC gaming world. As of the most recent Steam Hardware & Software Survey — the best proxy we have for PC gaming hardware info as a whole — just over 3 percent of Steam users are running Linux. Of those, 27 percent are using SteamOS (and therefore a Steam Deck), 10 percent are using Arch, 6 percent are using CachyOS, 4 percent are using Bazzite, and the rest are split over a bunch of distros.
So if anything goes wrong in my install, it’ll be a lot of forum-hopping and Discord searching to figure it all out. But I’ve cleverly arranged it so the stakes are only medium: I have other machines to work on while my desktop is inevitably borked (and to run programs like Adobe Creative Suite), and if I end up spending hours of my discretionary time learning Linux instead of gaming, well, that’s not the worst outcome.
...
Read the original on www.theverge.com »
If your organization uses Microsoft Exchange-based email, you’ll be happy to hear that Thunderbird’s latest monthly Release version 145, now officially supports native access via the Exchange Web Services (EWS) protocol. With EWS now built directly into Thunderbird, a third-party add-on is no longer required for email functionality. Calendar and address book support for Exchange accounts remain on the roadmap, but email integration is here and ready to use!
Until now, Thunderbird users in Exchange hosted environments often relied on IMAP/POP protocols or third-party extensions. With full native Exchange support for email, Thunderbird now works more seamlessly in Exchange environments, including full folder listings, message synchronization, folder management both locally and on the server, attachment handling, and more. This simplifies life for users who depend on Exchange for email but prefer Thunderbird as their client.
For many people switching from Outlook to Thunderbird, the most common setup involves Microsoft-hosted Exchange accounts such as Microsoft 365 or Office 365. Thunderbird now uses Microsoft’s standard sign-in process (OAuth2) and automatically detects your account settings, so you can start using your email right away without any extra setup.
If this applies to you, setup is straightforward:
Create a new account in Thunderbird 145 or newer.
In the new Account Hub, select Exchange (or Exchange Web Services in legacy setup).
Important note: If you see something different, or need more details or advice, please see our support page and wiki page. Also, some authentication configurations are not supported yet and you may need to wait for a further update that expands compatibility, please refer to the table below for more details.
As mentioned earlier, EWS support in version 145 currently enables email functionality only. Calendar and address book integration are in active development and will be added in future releases. The chart below provides an at-a-glance view of what’s supported today.
While many people and organizations still rely on Exchange Web Services (EWS), Microsoft has begun gradually phasing it out in favor of a newer, more modern interface called Microsoft Graph. Microsoft has stated that EWS will continue to be supported for the foreseeable future, but over time, Microsoft Graph will become the primary way to connect to Microsoft 365 services.
Because EWS remains widely used today, we wanted to ensure full support for it first to ensure compatibility for existing users. At the same time, we’re actively working to add support for Microsoft Graph, so Thunderbird will be ready as Microsoft transitions to its new standard.
While Exchange email is available now, calendar and address book integration is on the way, bringing Thunderbird closer to being a complete solution for Exchange users. For many people, having reliable email access is the most important step, but if you depend on calendar and contact synchronization, we’re working hard to bring this to Thunderbird in the near future, making Thunderbird a strong alternative to Outlook.
Keep an eye on future releases for additional support and integrations, but in the meantime, enjoy a smoother Exchange email experience within your favorite email client!
If you want to know more about Exchange support in Thunderbird, please refer to the dedicated page on support.mozilla.org. Organization admins can also find out more on the Mozilla wiki page. To follow ongoing and future work in this area, please refer to the relevant meta-bug on Bugzilla.
...
Read the original on blog.thunderbird.net »
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
Skip to main content
Sign in to view more content
Create your free account or sign in to continue your search
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.
...
Read the original on www.linkedin.com »
Blackouts led to loss of steering and propulsion on 984-foot-long vessel
WASHINGTON (Nov. 18, 2025) — The NTSB said Tuesday that a single loose wire on the 984-foot-long containership Dali caused an electrical blackout that led to the giant vessel veering and contacting the nearby Francis Scott Key Bridge in Baltimore, which then collapsed, killing six highway workers.
At Tuesday’s public meeting at NTSB headquarters, investigators said the loose wire in the ship’s electrical system caused a breaker to unexpectedly open — beginning a sequence of events that led to two vessel blackouts and a loss of both propulsion and steering near the 2.37-mile-long Key Bridge on March 26, 2024. Investigators found that wire-label banding prevented the wire from being fully inserted into a terminal block spring-clamp gate, causing an inadequate connection.
Illustration showing how placement of wire-label banding affects the way wires are seated in their terminal blocks. (Source: NTSB)
After the initial blackout, the Dali’s heading began swinging to starboard toward Pier 17 of the Key Bridge. Investigators found that the pilots and the bridge team attempted to change the vessel’s trajectory, but the loss of propulsion so close to the bridge rendered their actions ineffective. A substantial portion of the bridge subsequently collapsed into the river, and portions of the pier, deck and truss spans collapsed onto the vessel’s bow and forwardmost container bays.
A seven-person road maintenance crew and one inspector were on the bridge when the vessel struck. Six of the highway workers died. The NTSB found that the quick actions of the Dali pilots, shoreside dispatchers and the Maryland Transportation Authority to stop bridge traffic prevented greater loss of life.
”Our investigators routinely accomplish the impossible, and this investigation is no different,’ said NTSB Chairwoman Jennifer Homendy. “The Dali, at almost 1,000 feet, is as long as the Eiffel Tower is high, with miles of wiring and thousands of electrical connections. Finding this single wire was like hunting for a loose rivet on the Eiffel Tower.
“But like all of the accidents we investigate,this was preventable,” Homendy said. “Implementing NTSB recommendations in this investigation will prevent similar tragedies in the future.”
Contributing to the collapse of the Key Bridge and the loss of life was the lack of countermeasures to reduce the bridge’s vulnerability to collapse due to impact by ocean-going vessels, which have only grown larger since the Key Bridge’s opening in 1977. When the Japan-flagged containership Blue Nagoya contacted the Key Bridge after losing propulsion in 1980, the 390-foot-long vessel caused only minor damage. The Dali, however, is 10 times the size of the Blue Nagoya.
The comparative sizes of the Blue Nagoya and the Dali relative to the Key Bridge. (Source: NTSB)
As part of the investigation, the NTSB in March released an initial report on the vulnerability of bridges nationwide to large vessel strikes. The report found that the Maryland Transportation Authority—and many other owners of bridges spanning navigable waterways used by ocean-going vessels—were likely unaware of the potential risk that a vessel collision could pose to their structures. This was despite longstanding guidance from the American Association of State Highway and Transportation Officials recommending that bridge owners perform these assessments.
The NTSB sent letters to 30 bridge owners identified in the report, urging them to evaluate their bridges and, if needed, develop plans to reduce risks. All recipients have since responded, and the status of each recommendation is available on the NTSB’s website.
As a result of the investigation, the NTSB issued new safety recommendations to the US Coast Guard; US Federal Highway Administration; the American Association of State Highway and Transportation Officials; the Nippon Kaiji Kyokai (ClassNK); the American National Standards Institute; the American National Standards Institute Accredited Standards Committee on Safety in Construction and Demolitions Operations A10; HD Hyundai Heavy Industries; Synergy Marine Pte. Ltd; and WAGO Corporation, the electrical component manufacturer; and multiple bridge owners across the nation.
A synopsis of actions taken Tuesday, including the probable cause, findings and recommendations, can be found on ntsb.gov. The complete investigation report will be released in the coming weeks.
...
Read the original on www.ntsb.gov »
Former Treasury Secretary Larry Summers on Wednesday took leave from his post at Harvard University and said he will not teach classes there for the rest of this semester amid a furor over the release of emails between him and the notorious sex offender Jeffrey Epstein.
Earlier Wednesday, Summers said that he will resign from the board of OpenAI.
Harvard on Wednesday had said it would investigate Summers’ relationship with Epstein in light of the disclosure of their emails.
Summers is a former president of Harvard. He is the director of the Mossavar-Rahmani Center for Business and Government at the Harvard Kennedy School.
His spokesman, Steven Goldberg, in a statement Wednesday night said, “Mr. Summers has decided it’s in the best interest of the Center for him to go on leave from his role as Director as Harvard undertakes its review.”
“His co-teachers will complete the remaining three class sessions of the courses he has been teaching with them this semester, and he is not scheduled to teach next semester,” Goldberg said.
A Harvard spokesman, in a statement to The Crimson, the student newspaper, said that Harvard is “conducting a review of information concerning individuals at Harvard included in the newly released Jeffrey Epstein documents to evaluate what actions may be warranted.”
Summers had announced on Monday that he would be stepping back from all public commitments, but that he would continue teaching classes at Harvard. He was mum until Wednesday about remaining on the board of directors at the artificial intelligence startup OpenAI.
“I am grateful for the opportunity to have served, excited about the potential of the company, and look forward to following their progress,” Summers said in a statement to CNBC confirming he resignation.
“We appreciate his many contributions and the perspective he brought to the Board,” the OpenAI board of directors said in a statement.
Details of Summers’ correspondence with Epstein were made public last week after the House Oversight and Government Reform Committee released more than 20,000 documents it obtained pursuant to a subpoena from Epstein’s estate. Summers has faced intense scrutiny following the release of those files.
Summers joined OpenAI’s board in 2023 during a turbulent period for the startup. OpenAI CEO Sam Altman was briefly ousted from the company, though he returned to the chief executive role days later.
In the wake of “The Blip,” as some OpenAI employees call it, Summers was appointed to the board alongside Bret Taylor, former co-CEO of Salesforce, and Quora CEO Adam D’Angelo, who was the only member of OpenAI’s previous board who still held a seat.
Axios was first to report Summers’ resignation from the board.
...
Read the original on www.cnbc.com »
IT-Security Researchers from the University of Vienna and SBA Research identified and responsibly disclosed a large-scale privacy weakness in WhatsApp’s contact discovery mechanism that allowed the enumeration of 3.5 billion accounts. In collaboration with the researchers, Meta has since addressed and mitigated the issue. The study underscores the importance of continuous, independent security research on widely used communication platforms and highlights the risks associated with the centralization of instant messaging services. The preprint of the study has now been published, and the results will be presented in 2026 at the Network and Distributed System Security (NDSS) Symposium.
WhatsApp’s contact discovery mechanism can use a user’s address book to find other WhatsApp users by their phone number. Using the same underlying mechanism, the researchers demonstrated that it was possible to query more than 100 million phone numbers per hour through WhatsApp’s infrastructure, confirming more than 3.5 billion active accounts across 245 countries. “Normally, a system shouldn’t respond to such a high number of requests in such a short time — particularly when originating from a single source,” explains lead author Gabriel Gegenhuber from the University of Vienna. “This behavior exposed the underlying flaw, which allowed us to issue an effectively unlimited requests to the server and, in doing so, map user data worldwide.”
The accessible data items used in the study are the same that are public for anyone who knows a user’s phone number and consist of: phone number, public keys, timestamps, and, if set to public, about text and profile picture. From these data points, the researchers were able to extract additional information, which allowed them to infer a user’s operating system, account age, as well as the number of linked companion devices. The study shows that even this limited amount of data per user can reveal important information, both on macroscopic and individual levels.
* Millions of active WhatsApp accounts were identified in countries where the platform was officially banned, including China, Iran, and Myanmar.
* Population-level insights into platform usage, such as the global distribution of Android (81%) versus iOS (19%) devices, regional differences in privacy behavior (e.g., use of public profile pictures or “about” tagline), and variations in user growth across countries.
* A small number of cases showed re-use of cryptographic keys across different devices or phone numbers, pointing to potential weaknesses in non-official WhatsApp clients or fraudulent use.
* Nearly half of all phone numbers that appeared in the 2021 Facebook data leak of 500 million phone numbers (caused by a scraping incident in 2018) were still active on WhatsApp. This highlights the enduring risks for leaked numbers (e.g., being targeted in scam calls) associated with such exposures.
The study did not involve access to message content, and no personal data was published or shared. All retrieved data was deleted by the researchers prior to publication. Message content on WhatsApp is “end-to-end encrypted” and was not affected at any time. “This end-to-end encryption protects the content of messages, but not necessarily the associated metadata,” explains last author Aljosha Judmayer from the University of Vienna. “Our work shows that privacy risks can also arise when such metadata is collected and analysed on a large scale.”
“These findings remind us that even mature, widely trusted systems can contain design or implementation flaws that have real-world consequences,” says lead author Gabriel Gegenhuber from the University of Vienna: “They show that security and privacy are not one-time achievements, but must be continuously re-evaluated as technology evolves.”
“Building on our previous findings on delivery receipts and key management, we are contributing to a long-term understanding of how messaging systems evolve and where new risks arise,” adds co-author Maximilian Günther from the University of Vienna.
“We are grateful to the University of Vienna researchers for their responsible partnership and diligence under our Bug Bounty program. This collaboration successfully identified a novel enumeration technique that surpassed our intended limits, allowing the researchers to scrape basic publicly available information. We had already been working on industry-leading anti-scraping systems, and this study was instrumental in stress-testing and confirming the immediate efficacy of these new defenses. Importantly, the researchers have securely deleted the data collected as part of the study, and we have found no evidence of malicious actors abusing this vector. As a reminder, user messages remained private and secure thanks to WhatsApp’s default end-to-end encryption, and no non-public data was accessible to the researchers”, says Nitin Gupta, Vice President of Engineering at WhatsApp.
The research was conducted with strict ethical guidelines and in accordance with responsible disclosure principles. The findings were promptly reported to Meta, the operator of WhatsApp, which has since implemented countermeasures (e.g., rate-limiting, stricter profile information visibility) to close the identified vulnerability. The authors argue that transparency, academic scrutiny, and independent testing are essential to maintaining trust in global communication services. They emphasize that proactive collaboration between researchers and industry can significantly improve user privacy and prevent abuse.
This publication represents the third study by researchers from the University of Vienna and SBA Research examining the security and privacy of prevalent instant messengers such as WhatsApp and Signal. The team investigates how design and implementation choices in end-to-end encrypted messaging services can unintentionally expose user information or weaken privacy guarantees.
Earlier this year, the researchers published “Careless Whisper: Exploiting Silent Delivery Receipts to Monitor Users on Mobile Instant Messengers” (distinguished with the Best Paper Award at RAID 2025), which demonstrated how silent pings and their delivery receipts could be abused to infer user activity patterns and online behavior on WhatsApp and similar messaging platforms. Later that same year, “Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp’s Handshake Mechanism” (presented at USENIX WOOT 2025) analyzed the cryptographic foundations of WhatsApp’s prekey distribution mechanism, revealing implementation weaknesses of the Signal-based protocol.
“By building on our earlier findings about delivery receipts and key management, we’re contributing to a long-term understanding of how messaging systems evolve, and where new risks emerge.” said Maximilian Günther (University of Vienna).
The current study, “Hey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacy”, extends this line of research to the global scope, showing how contact discovery mechanisms can unintentionally allow large-scale user enumeration at an unprecedented magnitude. It will appear in the proceedings of the NDSS Symposium 2026, one of the leading international conferences on computer and network security.
Publication: Gabriel K. Gegenhuber, Philipp É. Frenzel, Maximilian Günther, Johanna Ullrich und Aljosha Judmayer: Hey there! You are using WhatsApp: Enumerating Three Billion Accounts for Security and Privacy. In: Network and Distributed System Security Symposium (NDSS), 2026. Preprint available here.
...
Read the original on www.univie.ac.at »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.