10 interesting stories served every morning and every evening.
Say hello to MacBook Neo
Apple’s all-new MacBook features a durable aluminum design, a stunning 13-inch Liquid Retina display, the power of Apple silicon, and all-day battery life — all for the breakthrough starting price of just $599
Apple today unveiled MacBook Neo, an all-new laptop that delivers the magic of the Mac at a breakthrough price, making it even more accessible to millions of people around the world. MacBook Neo starts with a beautiful Apple design, featuring a durable aluminum enclosure in an array of gorgeous colors — blush, indigo, silver, and a fresh new citrus. Its stunning 13-inch Liquid Retina display brings websites, photos, videos, and apps to life with high resolution and brightness, and support for 1 billion colors. Powered by A18 Pro, MacBook Neo can fly through everyday tasks, from browsing the web and streaming content, to editing photos, exploring creative hobbies, or using AI capabilities across apps. In fact, it’s up to 50 percent faster for everyday tasks like web browsing,1 and up to 3x faster when running on-device AI workloads like applying advanced effects to photos,2 compared to the bestselling PC with the latest shipping Intel Core Ultra 5. Providing up to 16 hours of battery life, MacBook Neo allows users to go all day on a single charge.3 A 1080p FaceTime HD camera and dual mics make it easy to look and sound great, and the dual side-firing speakers with Spatial Audio deliver crisp, immersive sound. MacBook Neo also features Apple’s renowned Magic Keyboard for comfortable and precise typing, and a large Multi-Touch trackpad with support for intuitive gestures, enabling smooth and precise control. Completing the MacBook Neo experience is macOS Tahoe, with powerful built-in apps like Messages, Pages, Calendar, and Safari; seamless integration with iPhone; Apple Intelligence; as well as broad compatibility with third-party apps. And starting at just $599 and $499 for education, MacBook Neo is Apple’s most affordable laptop ever, providing an unprecedented combination of quality and value. MacBook Neo is available to pre-order starting today, with availability beginning Wednesday, March 11.
“We’re incredibly excited to introduce MacBook Neo, which delivers the magic of the Mac at a breakthrough price,” said John Ternus, Apple’s senior vice president of Hardware Engineering. “Built from the ground up to be more affordable for even more people, MacBook Neo is a laptop only Apple could create. It features a durable aluminum design in four beautiful colors; a brilliant Liquid Retina display; Apple silicon-powered performance; all-day battery life; a high-quality camera, mics, and speakers; a Magic Keyboard and Multi-Touch trackpad; and the intuitive and powerful features of macOS. There is simply no other laptop like it.”
MacBook Neo provides an unmatched combination of quality and affordability for students, families, small business owners, new Mac users, and more.
A fanned-out array of MacBook Neo models in its four colors: silver, blush, citrus, and indigo.
MacBook Neo comes in four beautiful colors — silver, blush, citrus, and indigo.
MacBook Neo comes in four beautiful colors — blush, indigo, silver, and citrus.
MacBook Neo comes in four beautiful colors — blush, indigo, silver, and citrus.
MacBook Neo comes in four beautiful colors — blush, indigo, silver, and citrus.
MacBook Neo comes in four beautiful colors — blush, indigo, silver, and citrus.
A user answers emails and browses the web on their citrus MacBook Neo.
A person uses ChatGPT and Canva on their blush MacBook Neo.
A person multitasks between apps on their indigo MacBook Neo.
With A18 Pro, MacBook Neo can power through a wide range of everyday tasks, from browsing the web to sending emails and effortlessly multitasking between apps.
With A18 Pro, MacBook Neo can power through a wide range of everyday tasks, from browsing the web to sending emails and effortlessly multitasking between apps.
With A18 Pro, MacBook Neo can power through a wide range of everyday tasks, from browsing the web to sending emails and effortlessly multitasking between apps.
A18 Pro features a 5-core GPU to facilitate smooth performance for everything from FaceTime calls to casual gameplay.
A student uses their citrus MacBook Neo in a classroom setting.
A person lounges in bed using MacBook Neo while listening to music on AirPods Max.
A person uses their silver MacBook Neo in an auditorium-like setting.
MacBook Neo delivers up to 16 hours of battery life on a single charge, making it a perfect on-the-go companion for school, work, or play.
MacBook Neo delivers up to 16 hours of battery life on a single charge, making it a perfect on-the-go companion for school, work, or play.
MacBook Neo delivers up to 16 hours of battery life on a single charge, making it a perfect on-the-go companion for school, work, or play.
MacBook Neo delivers up to 16 hours of battery life on a single charge, making it a perfect on-the-go companion for school, work, or play.
Customers can pre-order the new MacBook Neo starting today at apple.com/store and in the Apple Store app in 30 countries and regions, including the U. S. It will begin arriving to customers, and will be in Apple Store locations and Apple Authorized Resellers, starting Wednesday, March 11.
MacBook Neo starts at $599 (U.S.) and $499 (U.S.) for education. It is available in four colors — blush, indigo, silver, and citrus. Additional technical specifications, configure-to-order options, and accessories are available at apple.com/mac.
With Apple Trade In, customers can trade in their current computer and get credit toward a new Mac. Customers can visit apple.com/shop/trade-in to see what their device is worth.
AppleCare delivers exceptional service and support, with flexible options for Apple users. Customers can choose AppleCare+ to cover their new Mac, or in the U.S., AppleCare One to protect multiple products in one simple plan. Both plans include coverage for accidents like drops and spills, theft and loss protection on eligible products, battery replacement service, and 24/7 support from Apple Experts. For more information, visit apple.com/applecare.
Every customer who buys directly from Apple Retail gets access to Personal Setup. In these guided online sessions, a Specialist can walk them through setup, or focus on features that help them make the most of their new device. Customers can also learn more about getting started and going further with their new device with a Today at Apple session at their nearest Apple Store.
Customers in the U.S. who shop at Apple using Apple Card can pay monthly at 0 percent APR when they choose to check out with Apple Card Monthly Installments, and they’ll get 3 percent Daily Cash back — all up front. More information — including details on eligibility, exclusions, and Apple Card terms — is available at apple.com/apple-card/monthly-installments.
Apple’s all-new MacBook features a durable aluminum design, a stunning 13-inch Liquid Retina display, the power of Apple silicon, and all-day battery life — all for the breakthrough starting price of just $599
CUPERTINO, CALIFORNIA Apple today unveiled MacBook Neo, an all-new laptop that delivers the magic of the Mac at a breakthrough price, making it even more accessible to millions of people around the world. MacBook Neo starts with a beautiful Apple design, featuring a durable aluminum enclosure in an array of gorgeous colors — blush, indigo, silver, and a fresh new citrus. Its stunning 13-inch Liquid Retina display brings websites, photos, videos, and apps to life with high resolution and brightness, and support for 1 billion colors. Powered by A18 Pro, MacBook Neo can fly through everyday tasks, from browsing the web and streaming content, to editing photos, exploring creative hobbies, or using AI capabilities across apps. In fact, it’s up to 50 percent faster for everyday tasks like web browsing,1 and up to 3x faster when running on-device AI workloads like applying advanced effects to photos,2 compared to the bestselling PC with the latest shipping Intel Core Ultra 5. Providing up to 16 hours of battery life, MacBook Neo allows users to go all day on a single charge.3 A 1080p FaceTime HD camera and dual mics make it easy to look and sound great, and the dual side-firing speakers with Spatial Audio deliver crisp, immersive sound. MacBook Neo also features Apple’s renowned Magic Keyboard for comfortable and precise typing, and a large Multi-Touch trackpad with support for intuitive gestures, enabling smooth and precise control. Completing the MacBook Neo experience is macOS Tahoe, with powerful built-in apps like Messages, Pages, Calendar, and Safari; seamless integration with iPhone; Apple Intelligence; as well as broad compatibility with third-party apps. And starting at just $599 and $499 for education, MacBook Neo is Apple’s most affordable laptop ever, providing an unprecedented combination of quality and value. MacBook Neo is available to pre-order starting today, with availability beginning Wednesday, March 11.
“We’re incredibly excited to introduce MacBook Neo, which delivers the magic of the Mac at a breakthrough price,” said John Ternus, Apple’s senior vice president of Hardware Engineering. “Built from the ground up to be more affordable for even more people, MacBook Neo is a laptop only Apple could create. It features a durable aluminum design in four beautiful colors; a brilliant Liquid Retina display; Apple silicon-powered performance; all-day battery life; a high-quality camera, mics, and speakers; a Magic Keyboard and Multi-Touch trackpad; and the intuitive and powerful features of macOS. There is simply no other laptop like it.”
MacBook Neo features a beautifully crafted aluminum design that’s built to last. With its soft, rounded corners, MacBook Neo looks elegant while feeling solid and comfortable to hold. At just 2.7 pounds, it’s also easy to carry in a backpack or handbag. Bringing a fun touch of personality and style to everyday computing, MacBook Neo comes in a spectrum of four gorgeous colors: blush, indigo, silver, and citrus. These colors extend to the Magic Keyboard in lighter shades and new wallpapers, creating a cohesive design aesthetic and making MacBook Neo the most colorful MacBook yet.
A gorgeous 13-inch Liquid Retina display features a 2408-by-1506 resolution, 500 nits of brightness, and support for 1 billion colors, bringing to life sharp, crystal-clear text and vibrant images. The display is both brighter and higher in resolution than most PC laptops in this price range, putting it in a class of its own. Finally, an anti-reflective coating provides a comfortable viewing experience in a variety of lighting conditions, allowing users to watch movies, edit photos, or take video calls from anywhere.
At the heart of MacBook Neo is A18 Pro, enabling users to power through things they do every day, like browsing the web, creating documents, streaming content, editing photos, and taking advantage of AI. Users can seamlessly work between their favorite apps, like Messages, WhatsApp, Canva, Excel, Safari, and more. MacBook Neo with A18 Pro is up to 50 percent faster for everyday tasks than the bestselling PC with the latest shipping Intel Core Ultra 5.1 And for more demanding activities, it’s up to 3x faster for on-device AI workloads2 and up to 2x faster for tasks like photo editing.4 The integrated 5-core GPU brings graphics to life while playing action-packed games or exploring creative hobbies. And a 16-core Neural Engine supports fast on-device Apple Intelligence features and everyday AI tasks like summarizing notes in Bear or using the Clean Up tool in the Photos app, while ensuring user data stays private and secure. MacBook Neo is also fanless, so it runs completely silent.
Thanks to the incredible power efficiency of Apple silicon, MacBook Neo delivers up to 16 hours of battery life on a single charge.3 This makes it a perfect on-the-go companion for work or play, from the classroom to the coffee shop, and everywhere in between.
MacBook Neo features Apple’s much-loved Magic Keyboard, which provides a comfortable, precise typing experience, while a large Multi-Touch trackpad lets users click, scroll, swipe, and pinch anywhere on its surface. The MacBook Neo model with Touch ID enables easy, quick, and secure login authentication, and the ability to conveniently authorize purchases using Apple Pay.
The 1080p FaceTime HD camera on MacBook Neo has optimized image processing to deliver vibrant video calls. Dual mics with directional beamforming are designed to reduce background noise and isolate a user’s voice, allowing it to come across loud and clear for an excellent video conferencing experience. And dual side-firing speakers with support for Spatial Audio and Dolby Atmos produce immersive sound for watching a movie, listening to music, or using apps like GarageBand.
MacBook Neo features two USB-C ports for connecting accessories or an external display.5 Both ports can be used for charging. MacBook Neo also includes a headphone jack for wired audio. Wi-Fi 6E provides fast wireless connectivity, and Bluetooth 6 ensures reliable wireless connections for peripherals and accessories.
macOS is Apple’s powerful and intuitive operating system for Mac.6 With incredible features and built-in apps like Safari, Photos, Messages, and FaceTime, macOS enables users to get started right out of the box. Apple Intelligence features like Writing Tools, Live Translation, and more are deeply integrated across macOS, elevating the user experience by bringing intelligence to the apps users rely on every day.7 Advanced privacy and security also come standard, featuring industry‑leading encryption, robust virus protections, and automatic free security updates to help keep users protected.
iPhone users can tap in to Continuity features built in to macOS to make working across iPhone and Mac a breeze. Handoff lets users start a task on MacBook Neo and continue it on iPhone, while Universal Clipboard allows users to copy and paste content between devices. With iPhone Mirroring, users can view and interact with their iPhone directly on MacBook Neo, and users switching to Mac for the first time can use iPhone to conveniently and securely transfer settings, files, photos, passwords, and more.
Built with the Environment in Mind
MacBook Neo was built from the ground up to be Apple’s lowest-carbon MacBook, and brings the company even closer to reaching its ambitious plan to be carbon neutral across its entire footprint by 2030. It features 60 percent recycled content — the highest percentage of any Apple product.8 This includes 90 percent recycled aluminum overall and 100 percent recycled cobalt in the battery. The enclosure is manufactured with a material-efficient forming process that uses 50 percent less aluminum compared to traditional machining methods. MacBook Neo is manufactured with 45 percent renewable electricity, like wind and solar, across the supply chain. It also meets Apple’s high standards for energy efficiency and safe chemistry. Additionally, the paper packaging is 100 percent fiber-based and can be easily recycled.9
Customers can pre-order the new MacBook Neo starting today at apple.com/store and in the Apple Store app in 30 countries and regions, including the U.S. It will begin arriving to customers, and will be in Apple Store locations and Apple Authorized Resellers, starting Wednesday, March 11.
MacBook Neo starts at $599 (U.S.) and $499 (U.S.) for education. It is available in four colors — blush, indigo, silver, and citrus. Additional technical specifications, configure-to-order options, and accessories are available at apple.com/mac.
With Apple Trade In, customers can trade in their current computer and get credit toward a new Mac. Customers can visit apple.com/shop/trade-in to see what their device is worth.
AppleCare delivers exceptional service and support, with flexible options for Apple users. Customers can choose AppleCare+ to cover their new Mac, or in the U.S., AppleCare One to protect multiple products in one simple plan. Both plans include coverage for accidents like drops and spills, theft and loss protection on eligible products, battery replacement service, and 24/7 support from Apple Experts. For more information, visit apple.com/applecare.
Every customer who buys directly from Apple Retail gets access to Personal Setup. In these guided online sessions, a Specialist can walk them through setup, or focus on features that help them make the most of their new device. Customers can also learn more about getting started and going further with their new device with a Today at Apple session at their nearest Apple Store.
Customers in the U.S. who shop at Apple using Apple Card can pay monthly at 0 percent APR when they choose to check out with Apple Card Monthly Installments, and they’ll get 3 percent Daily Cash back — all up front. More information — including details on eligibility, exclusions, and Apple Card terms — is available at apple.com/apple-card/monthly-installments.
About Apple
Apple revolutionized personal technology with the introduction of the Macintosh in 1984. Today, Apple leads the world in innovation with iPhone, iPad, Mac, AirPods, Apple Watch, and Apple Vision Pro. Apple’s six software platforms — iOS, iPadOS, macOS, watchOS, visionOS, and tvOS — provide seamless experiences across all Apple devices and empower people with breakthrough services including the App Store, Apple Music, Apple Pay, iCloud, and Apple TV. Apple’s more than 150,000 employees are dedicated to making the best products on earth and to leaving the world better than we found it.
Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Speedometer 3.1 performance benchmark tested with pre-release Safari 26.3 on macOS Tahoe, and both Chrome 144.0.7559.110 and Edge 144.0.3719.104 on Windows 11 Home. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Adobe Photoshop 2026 27.3.0 tested using the following filters and functions: super zoom, depth blur, JPEG artifact removal, style transfer, photo restoration, and landscape mixer. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
Testing was conducted by Apple in January 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD. Wireless web battery life tested by browsing 25 popular websites while connected to Wi-Fi. Video streaming battery life tested with 1080p content in Safari while connected to Wi-Fi. All systems tested with display brightness set to eight clicks from bottom. Battery life varies by use and configuration. See apple.com/batteries for more information.
Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Tested with Affinity v3.0.3.4027 using the built-in benchmark 30000. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
MacBook Neo features two USB-C ports — USB 3 (left) and USB 2 (right). External display connectivity supported on left USB 3 port only.
macOS Tahoe is available as a free software update. Some features may not be available in all regions or in all languages. See requirements at apple.com/os/macos.
Apple Intelligence is available in beta with support for these languages: English, Danish, Dutch, French, German, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Vietnamese, Chinese (simplified), Chinese (traditional), Japanese, and Korean. Some features may not be available in all regions or languages. For feature and language availability and system requirements, see support.apple.com/en-us/121115.
Product recycled or renewable content is the mass of certified recycled material relative to the overall mass of the device, not including packaging or in-box accessories. Comparison excludes accessories.
Breakdown of U.S. retail packaging by weight. Adhesives, inks, and coatings are excluded from calculations.
Copy text
* Customers can pre-order the new MacBook Neo starting today at apple.com/store and in the Apple Store app in 30 countries and regions, including the U.S. It will begin arriving to customers, and will be in Apple Store locations and Apple Authorized Resellers, starting Wednesday, March 11.
* MacBook Neo starts at $599 (U.S.) and $499 (U.S.) for education. It is available in four colors — blush, indigo, silver, and citrus. Additional technical specifications, configure-to-order options, and accessories are available at apple.com/mac.
* With Apple Trade In, customers can trade in their current computer and get credit toward a new Mac. Customers can visit apple.com/shop/trade-in to see what their device is worth.
* AppleCare delivers exceptional service and support, with flexible options for Apple users. Customers can choose AppleCare+ to cover their new Mac, or in the U.S., AppleCare One to protect multiple products in one simple plan. Both plans include coverage for accidents like drops and spills, theft and loss protection on eligible products, battery replacement service, and 24/7 support from Apple Experts. For more information, visit apple.com/applecare.
* Every customer who buys directly from Apple Retail gets access to Personal Setup. In these guided online sessions, a Specialist can walk them through setup, or focus on features that help them make the most of their new device. Customers can also learn more about getting started and going further with their new device with a Today at Apple session at their nearest Apple Store.
* Customers in the U.S. who shop at Apple using Apple Card can pay monthly at 0 percent APR when they choose to check out with Apple Card Monthly Installments, and they’ll get 3 percent Daily Cash back — all up front. More information — including details on eligibility, exclusions, and Apple Card terms — is available at apple.com/apple-card/monthly-installments.
* Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Speedometer 3.1 performance benchmark tested with pre-release Safari 26.3 on macOS Tahoe, and both Chrome 144.0.7559.110 and Edge 144.0.3719.104 on Windows 11 Home. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
* Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Adobe Photoshop 2026 27.3.0 tested using the following filters and functions: super zoom, depth blur, JPEG artifact removal, style transfer, photo restoration, and landscape mixer. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
* Testing was conducted by Apple in January 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD. Wireless web battery life tested by browsing 25 popular websites while connected to Wi-Fi. Video streaming battery life tested with 1080p content in Safari while connected to Wi-Fi. All systems tested with display brightness set to eight clicks from bottom. Battery life varies by use and configuration. See apple.com/batteries for more information.
* Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Tested with Affinity v3.0.3.4027 using the built-in benchmark 30000. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
* MacBook Neo features two USB-C ports — USB 3 (left) and USB 2 (right). External display connectivity supported on left USB 3 port only.
* macOS Tahoe is available as a free software update. Some features may not be available in all regions or in all languages. See requirements at apple.com/os/macos.
* Apple Intelligence is available in beta with support for these languages: English, Danish, Dutch, French, German, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Vietnamese, Chinese (simplified), Chinese (traditional), Japanese, and Korean. Some features may not be available in all regions or languages. For feature and language availability and system requirements, see support.apple.com/en-us/121115.
* Product recycled or renewable content is the mass of certified recycled material relative to the overall mass of the device, not including packaging or in-box accessories. Comparison excludes accessories.
* Breakdown of U.S. retail packaging by weight. Adhesives, inks, and coatings are excluded from calculations.
Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Speedometer 3.1 performance benchmark tested with pre-release Safari 26.3 on macOS Tahoe, and both Chrome 144.0.7559.110 and Edge 144.0.3719.104 on Windows 11 Home. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Adobe Photoshop 2026 27.3.0 tested using the following filters and functions: super zoom, depth blur, JPEG artifact removal, style transfer, photo restoration, and landscape mixer. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
Testing was conducted by Apple in January 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD. Wireless web battery life tested by browsing 25 popular websites while connected to Wi-Fi. Video streaming battery life tested with 1080p content in Safari while connected to Wi-Fi. All systems tested with display brightness set to eight clicks from bottom. Battery life varies by use and configuration. See apple.com/batteries for more information.
Testing was conducted by Apple in January and February 2026 using preproduction MacBook Neo systems with Apple A18 Pro, 6-core CPU, 5-core GPU, 8GB of unified memory, and 256GB SSD, as well as production Intel Core Ultra 5-based PC systems with Intel Graphics, 8GB of RAM, 256GB SSD, and the latest version of Windows 11 Home available at the time of testing. Bestselling PC laptop with the latest shipping Intel Core Ultra 5 processor is based on publicly available sales data over the prior six months. Tested with Affinity v3.0.3.4027 using the built-in benchmark 30000. Performance tests are conducted using specific computer systems and reflect the approximate performance of MacBook Neo.
MacBook Neo features two USB-C ports — USB 3 (left) and USB 2 (right). External display connectivity supported on left USB 3 port only.
macOS Tahoe is available as a free software update. Some features may not be available in all regions or in all languages. See requirements at apple.com/os/macos.
Apple Intelligence is available in beta with support for these languages: English, Danish, Dutch, French, German, Italian, Norwegian, Portuguese, Spanish, Swedish, Turkish, Vietnamese, Chinese (simplified), Chinese (traditional), Japanese, and Korean. Some features may not be available in all regions or languages. For feature and language availability and system requirements, see support.apple.com/en-us/121115.
Product recycled or renewable content is the mass of certified recycled material relative to the overall mass of the device, not including packaging or in-box accessories. Comparison excludes accessories.
Breakdown of U. S. retail packaging by weight. Adhesives, inks, and coatings are excluded from calculations.
...
Read the original on www.apple.com »
I’m behind on writing about Qwen 3.5, a truly remarkable family of open weight models released by Alibaba’s Qwen team over the past few weeks. I’m hoping that the 3.5 family doesn’t turn out to be Qwen’s swan song, seeing as that team has had some very high profile departures in the past 24 hours.
It all started with this tweet from Junyang Lin (@JustinLin610):
Junyang Lin was the lead researcher building Qwen, and was key to releasing their open weight models from 2024 onwards.
As far as I can tell a trigger for this resignation was a re-org within Alibaba where a new researcher hired from Google’s Gemini team was put in charge of Qwen, but I’ve not confirmed that detail.
More information is available in this article from 36kr.com. Here’s Wikipedia on 36Kr confirming that it’s a credible media source established in 2010 with a good track record reporting on the Chinese technology industry.
The article is in Chinese—here are some quotes translated via Google Translate:
At approximately 1:00 PM Beijing time on March 4th, Tongyi Lab held an emergency All Hands meeting, where Alibaba Group CEO Wu Yongming frankly told Qianwen employees.
Twelve hours ago (at 0:11 AM Beijing time on March 4th), Lin Junyang, the technical lead for Alibaba’s Qwen Big Data Model, suddenly announced his resignation on X. Lin Junyang was a key figure in promoting Alibaba’s open-source AI models and one of Alibaba’s youngest P10 employees. Amidst the industry uproar, many members of Qwen were also unable to accept the sudden departure of their team’s key figure.
“Given far fewer resources than competitors, Junyang’s leadership is one of the core factors in achieving today’s results,” multiple Qianwen members told 36Kr. […]
Regarding Lin Junyang’s whereabouts, no new conclusions were reached at the meeting. However, around 2 PM, Lin Junyang posted again on his WeChat Moments, stating, “Brothers of Qwen, continue as originally planned, no problem,” without explicitly confirming whether he would return. […]
That piece also lists several other key members who have apparently resigned:
With Lin Junyang’s departure, several other Qwen members also announced their departure, including core leaders responsible for various sub-areas of Qwen models, such as:
Binyuan Hui: Lead Qwen code development, principal of the Qwen-Coder series models, responsible for the entire agent training process from pre-training to post-training, and recently involved in robotics research.
Bowen Yu: Lead Qwen post-training research, graduated from the University of Chinese Academy of Sciences, leading the development of the Qwen-Instruct series models.
Kaixin Li: Core contributor to Qwen 3.5/VL/Coder, PhD from the National University of Singapore.
Besides the aforementioned individuals, many young researchers also resigned on the same day.
Based on the above it looks to me like everything is still very much up in the air. The presence of Alibaba’s CEO at the “emergency All Hands meeting” suggests that the company understands the significance of these resignations and may yet retain some of the departing talent.
This story hits particularly hard right now because the Qwen 3.5 models appear to be exceptionally good.
I’ve not spent enough time with them yet but the scale of the new model family is impressive. They started with Qwen3.5-397B-A17B on February 17th—an 807GB model—and then followed with a flurry of smaller siblings in 122B, 35B, 27B, 9B, 4B, 2B, 0.8B sizes.
I’m hearing positive noises about the 27B and 35B models for coding tasks that still fit on a 32GB/64GB Mac, and I’ve tried the 9B, 4B and 2B models and found them to be notably effective considering their tiny sizes. That 2B model is just 4.57GB—or as small as 1.27GB quantized—and is a full reasoning and multi-modal (vision) model.
It would be a real tragedy if the Qwen team were to disband now, given their proven track record in continuing to find new ways to get high quality results out of smaller and smaller models.
If those core Qwen team members either start something new or join another research lab I’m excited to see what they do next.
...
Read the original on simonwillison.net »
Subscribe
Patterns for getting the best results out of coding agents like Claude Code and OpenAI Codex. See my introduction for more on this project.
Principles
Hoard things you know how to do
Testing and QA
...
Read the original on simonwillison.net »
Anthropic co-founder and CEO Dario Amodei is not happy — perhaps predictably so — with OpenAI chief Sam Altman. In a memo to staff, reported by The Information, Amodei referred to OpenAI’s dealings with the Department of Defense as “safety theater.”
“The main reason [OpenAI] accepted [the DoD’s deal] and we did not is that they cared about placating employees, and we actually cared about preventing abuses,” Amodei wrote.
Last week, Anthropic and the U. S. Department of Defense (DoD) failed to come to an agreement over the military’s request for unrestricted access to the AI company’s technology. Anthropic, which already had a $200 million contract with the military, insisted the DoD affirm that it would not use the company’s AI to enable domestic mass surveillance or autonomous weaponry.
Instead, the DoD — known under the Trump administration as the Department of War — struck a deal with OpenAI. Altman stated that his company’s new defense contract would include protections against the same red lines that Anthropic had asserted.
In a letter to staff, Amodei refers to OpenAI’s messaging as “straight up lies,” stating that Altman is falsely “presenting himself as a peacemaker and dealmaker.”
Amodei might not be speaking solely from a position of bitterness, here. Anthropic specifically took issue with the DoD’s insistence on the company’s AI being available for “any lawful use.” OpenAI said in a blog post that its contract allows use of its AI systems for “all lawful purposes.”
“It was clear in our interaction that the DoW considers mass domestic surveillance illegal and was not planning to use it for this purpose,” OpenAI’s blog post stated. “We ensured that the fact that it is not covered under lawful use was made explicit in our contract.”
Critics have pointed out that the law is subject to change, and what is considered illegal now might end up being allowed in the future.
And the public seems to be siding with Anthropic. ChatGPT uninstalls jumped 295% after OpenAI made its deal with the DoD.
“I think this attempted spin/gaslighting is not working very well on the general public or the media, where people mostly see OpenAI’s deal with the DoW as sketchy or suspicious, and see us as the heroes (we’re #2 in the App Store now!),” Amodei wrote to his staff. “It is working on some Twitter morons, which doesn’t matter, but my main worry is how to make sure it doesn’t work on OpenAI employees.”
...
Read the original on techcrunch.com »
One CLI for all of Google Workspace — built for humans and AI agents.
Drive, Gmail, Calendar, and every Workspace API. Zero boilerplate. Structured JSON output. 40+ agent skills included.
npm install -g @googleworkspace/cli
gws doesn’t ship a static list of commands. It reads Google’s own Discovery Service at runtime and builds its entire command surface dynamically. When Google Workspace adds an API endpoint or method, gws picks it up automatically.
npm install -g @googleworkspace/cli
gws auth setup # walks you through Google Cloud project config + OAuth login
gws drive files list –params ‘{“pageSize”: 5}’
cargo install –path .
A Nix flake is also available at github:googleworkspace/cli
nix run github:googleworkspace/cli
For humans — stop writing curl calls against REST docs. gws gives you tab‑completion, –help on every resource, –dry-run to preview requests, and auto‑pagination.
For AI agents — every response is structured JSON. Pair it with the included agent skills and your LLM can manage Workspace without custom tooling.
# List the 10 most recent files
gws drive files list –params ‘{“pageSize”: 10}’
# Create a spreadsheet
gws sheets spreadsheets create –json ‘{“properties”: {“title”: “Q1 Budget”}}’
# Send a Chat message
gws chat spaces messages create \
–params ‘{“parent”: “spaces/xyz”}’ \
–json ‘{“text”: “Deploy complete.“}’ \
–dry-run
# Introspect any method’s request/response schema
gws schema drive.files.list
# Stream paginated results as NDJSON
gws drive files list –params ‘{“pageSize”: 100}’ –page-all | jq -r ‘.files[].name’
The CLI supports multiple auth workflows so it works on your laptop, in CI, and on a server.
Credentials are encrypted at rest (AES-256-GCM) with the key stored in your OS keyring.
gws auth setup # one-time: creates a Cloud project, enables APIs, logs you in
gws auth login # subsequent logins
Requires the gcloud CLI to be installed and authenticated.
Use this when gws auth setup cannot automate project/client creation, or when you want explicit control.
Configure OAuth branding/audience if prompted:
Download the client JSON and save it to:
gws auth login
You can complete OAuth either manually or with browser automation.
* Agent-assisted flow: the agent opens the URL, selects account, handles consent prompts, and returns control once the localhost callback succeeds.
If consent shows “Google hasn’t verified this app” (testing mode), click Continue. If scope checkboxes appear, select required scopes (or Select all) before continuing.
On the headless machine:
export GOOGLE_WORKSPACE_CLI_CREDENTIALS_FILE=/path/to/credentials.json
gws drive files list # just works
Point to your key file; no login needed.
export GOOGLE_WORKSPACE_CLI_CREDENTIALS_FILE=/path/to/service-account.json
gws drive files list
export GOOGLE_WORKSPACE_CLI_IMPERSONATED_USER=admin@example.com
Useful when another tool (e.g. gcloud) already mints tokens for your environment.
export GOOGLE_WORKSPACE_CLI_TOKEN=$(gcloud auth print-access-token)
Environment variables can also live in a .env file.
The repo ships 100+ Agent Skills (SKILL.md files) — one for every supported API, plus higher-level helpers for common workflows and 50 curated recipes for Gmail, Drive, Docs, Calendar, and Sheets. See the full Skills Index for the complete list.
# Install all skills at once
npx skills add https://github.com/googleworkspace/cli
# Or pick only what you need
npx skills add https://github.com/googleworkspace/cli/tree/main/skills/gws-drive
npx skills add https://github.com/googleworkspace/cli/tree/main/skills/gws-gmail
Install the extension into the Gemini CLI:
gemini extensions install https://github.com/googleworkspace/cli
Installing this extension gives your Gemini CLI agent direct access to all gws commands and Google Workspace agent skills. Because gws handles its own authentication securely, you simply need to authenticate your terminal once prior to using the agent, and the extension will automatically inherit your credentials.
gws mcp starts a Model Context Protocol server over stdio, exposing Google Workspace APIs as structured tools that any MCP-compatible client (Claude Desktop, Gemini CLI, VS Code, etc.) can call.
gws mcp -s drive # expose Drive tools
gws mcp -s drive,gmail,calendar # expose multiple services
gws mcp -s all # expose all services (many tools!)
“mcpServers”: {
“gws”: {
“command”: “gws”,
“args”: [“mcp”, “-s”, “drive,gmail,calendar”]
gws drive files create –json ‘{“name”: “report.pdf”}’ –upload ./report.pdf
Integrate Google Cloud Model Armor to scan API responses for prompt injection before they reach your agent.
gws gmail users messages get –params ‘…’ \
–sanitize “projects/P/locations/L/templates/T”
Build a clap::Command tree from the document’s resources and methods
If a required Google API is not enabled for your GCP project, you will see a 403 error with reason accessNotConfigured:
“error”: {
“code”: 403,
“message”: “Gmail API has not been used in project 549352339482 …”,
“reason”: “accessNotConfigured”,
“enable_url”: “https://console.developers.google.com/apis/api/gmail.googleapis.com/overview?project=549352339482”
gws also prints an actionable hint to stderr:
Click the enable_url link (or copy it from the enable_url JSON field).
cargo build # dev build
cargo clippy — -D warnings # lint
cargo test # unit tests
./scripts/coverage.sh # HTML coverage report → target/llvm-cov/html/
...
Read the original on github.com »
If you ever want a good laugh, ask an academic to explain what they get paid to do, and who pays them to do it.
In STEM fields, it works like this: the university pays you to teach, but unless you’re at a liberal arts college, you don’t actually get promoted or recognized for your teaching. Instead, you get promoted and recognized for your research, which the university does not generally pay you for. You have to ask someone else to provide that part of your salary, and in the US, that someone else is usually the federal government. If you’re lucky—and these days, very lucky—you get a chunk of money to grow your bacteria or smash your electrons together or whatever, you write up your results for publication, and this is where the monkey business really begins.
In most disciplines, the next step is sending your paper to a peer-reviewed journal, where it gets evaluated by an editor and (if the editor sees some promise in it) a few reviewers. These people are academics just like you, and they generally do not get paid for their time. Editors maybe get a small stipend and a bit of professional cred, while reviewers get nothing but the warm fuzzies of doing “service to the field”, or the cold thrill of tanking other people’s papers.
If you’re lucky again, your paper gets accepted by the journal, which now owns the copyright to your work. They do not pay you for this! If anything, you pay them an “article processing charge” for the privilege of no longer owning the rights to your paper. This is considered a great honor.
The journals then paywall your work, sell the access back to you and your colleagues, and pocket the profit. Universities cover these subscriptions and fees by charging the government “indirect costs” on every grant—money that doesn’t go to the research itself, but to all the things that support the research, like keeping the lights on, cleaning the toilets, and accessing the journals that the researchers need to read.
Nothing about this system makes sense, which is why I think we should build a new one. In the meantime, though, we should also fix the old one. But that’s hard, for two reasons. First, many people are invested in things working exactly the way they do now, so every stupid idea has a constituency behind it. Second, our current administration seems to believe in policy by bloodletting: if something isn’t working, just slice it open at random. Thanks to these haphazard cuts and cancellations, we now have a system that is both dysfunctional and anemic.
I see a way to solve both problems at once. We can satisfy both the scientists and the scalpel-wielding politicians by ridding ourselves of the one constituency that should not exist. Of all the crazy parts of our crazy system, the craziest part is where taxpayers pay for the research, then pay private companies to publish it, and then pay again so scientists can read it. We may not agree on much, but we can all agree on this: it is time, finally and forever, to get rid of for-profit scientific publishers.
The writer G. K. Chesterton once said that before you knock anything down, you ought to know how it got there in the first place. So before we show for-profit publishers the pointy end of a pitchfork, we ought to know where they came from and why they persist.
It used to be a huge pain to produce a physical journal—someone had to operate the printing presses, lick the stamps, and mail the copies all over the world. Unsurprisingly, academics didn’t care much about doing those things. When government money started flowing into universities post-World War II and the number of articles exploded, private companies were like, “Hey, why don’t we take these journals off your hands—you keep doing the scientific stuff and we’ll handle all the boring stuff.” And the academics were like “Sounds good, we’re sure this won’t have any unforeseen consequences.”
Those companies knew they had a captive audience, so they bought up as many journals as they could. Journal articles aren’t interchangeable commodities like corn or soybeans—if your science supplier starts gouging you, you can’t just switch to a new one. Adding to this lock-in effect, publishing in “high-impact” journals became the key to success in science, which meant if you wanted to move up, your university had to pay up. So, even as the internet made it much cheaper to produce a journal, publishers made it much more expensive to subscribe to one.
The people running this scam had no illusions about it, even if they hoped that other people did. Here’s how one CEO described it:
You have no idea how profitable these journals are once you stop doing anything. When you’re building a journal, you spend time getting good editorial boards, you treat them well, you give them dinners. […] [and then] we stop doing all that stuff and then the cash just pours out and you wouldn’t believe how wonderful it is.
So here’s the report we can make to Mr. Chesterton: for-profit scientific publishers arose to solve the problem of producing physical journals. The internet mostly solved that problem. Now the publishers are the problem. These days, Springer Nature, Elsevier, Wiley, and the like are basically giant operations that proofread, format, and store PDFs. That’s not nothing, but it’s pretty close to nothing.
No one knows how much publishers make in return for providing these modest services, but we can guess. In 2017, the Association of Research Libraries surveyed its 123 member institutions and found they were paying a collective $1 billion in journal subscriptions every year. The ARL covers some of the biggest universities, but not nearly all of them, so let’s guess that number accounts for half of all university subscription spending. In 2023, the federal government estimated it paid nearly $380 million in article processing charges alone, and those are separate from subscriptions. So it wouldn’t be crazy if American universities were paying something like $2.5 billion to publishers every year, with the majority of that ultimately coming from taxpayers.
To put those costs in perspective: if the federal government cut out the publishers, it would probably save more money every year than it has “saved” in its recent attempts to cut off scientific funding to universities. It’s unclear how much money will ultimately be clawed back, as grants continue to get frozen, unfrozen, litigated, and negotiated. But right now, it seems like ~$1.4 billion in promised science funding is simply not going to be paid out. We could save more than that every year if we just stopped writing checks to John Wiley & Sons.
How can such a scam continue to exist? In large part, it’s because of a computer hacker from Kazakhstan.
The political scientist James C. Scott once wrote that many systems only “work” because people disobey them. For instance, the Soviet Union attempted to impose agricultural regulations so strict that people would have starved if they followed the letter of the law. Instead, citizens grew and traded food in secret. This made it look like the regulations were successful, when in fact they were a sham.
Something similar is happening right now in science, except Russia is on the opposite side of the story this time. In the early 2010s, a Kazakhstani computer programmer named Alexandra Elbakyan started downloading articles en masse and posting them publicly on a website called SciHub. The publishers sued her, so she’s hiding out in Russia, which protects her from extradition. As you can see in the map below, millions of people now use SciHub to access scientific articles, including lots of people who seem to work at universities:
Why would researchers resort to piracy when they have legitimate access themselves? Maybe because journals’ interfaces are so clunky and annoying that it’s faster to go straight to SciHub. Or maybe it’s because those researchers don’t actually have access. Universities are always trying to save money by canceling journal subscriptions, so academics often have to rely on bootleg copies. Either way, SciHub seems to be our modern-day version of those Soviet secret gardens: for-profit publishing only “works” because people find ways to circumvent it.
In a punk rock kind of way, it’s kinda cool that so many American scientists can only do their work thanks to a database maintained by a Russia-backed fugitive. But it ought to be a huge embarrassment to the US government.
Instead, for some reason, the government insists on siding with publishers against citizens. Sixteen years ago, the US had its own Elbakyan. His name was Aaron Swartz. He downloaded millions of paywalled journal articles using a connection at MIT, possibly intending to share them publicly. Government agents arrested him, charged him with wire fraud, and intended to fine him $1 million and imprison him for 35 years. Instead, he killed himself. He was 26.
Scientists have tried to take on the middlemen themselves. They’ve founded open-access journals. They’ve published preprints. They’ve tried alternative ways of evaluating research. A few high-profile professors have publicly and dramatically sworn off all “luxury” outlets, and less-famous folks have followed suit: in 2012, over 10,000 researchers signed a pledge not to publish in any journals owned by Elsevier.
None of this has worked. The biggest for-profit publishers continue making more money year after year. “Diamond” open access journals—that is, publications that don’t charge authors or readers—only account for ~10% of all articles. Four years after that massive pledge, 38% of signers had broken their promise and published in an Elsevier journal.
These efforts have fizzled because this isn’t a problem that can be solved by any individual, or even many individuals. Academia is so cutthroat that anyone who righteously gives up an advantage will be outcompeted by someone who has fewer scruples. What we have here is a collective action problem.
Fortunately, we have an organization that exists for the express purpose of solving collective action problems. It’s called the government. And as luck would have it, they’re also the one paying most of the bills!
So the solution here is straightforward: every government grant should stipulate that the research it supports can’t be published in a for-profit journal. That’s it! If the public paid for it, it shouldn’t be paywalled.
The Biden administration tried to do this, but they did it in a stupid way. They mandated that NIH-funded research papers have to be “open access”, which sounds like a solution, but it’s actually a psyop. By replacing subscription fees with “article processing charges”, publishers can simply make authors pay for writing instead of making readers pay for reading. The companies can keep skimming money off the system, and best of all, they get to call the result “open access”.
These fees can be wild. When my PhD advisor and I published one of our papers together, the journal charged us an “open access” fee of $12,000. This arrangement is a tiny bit better than the alternative, because at least everybody can read our paper now, including people who aren’t affiliated with a university. But those fees still have to come from somewhere, and whether you charge writers or readers, you’re ultimately charging the same account—namely, the US government.
The Trump administration somehow found a way to make a stupid policy even stupider. They sped up the timeline while also firing a bunch of NIH staffers—exactly the people who would make sure that government-sponsored publications are, in fact, publicly accessible. And you need someone to check on that, because researchers are notoriously bad about this kind of stuff. They’re already required to upload the results of clinical trials to a public database, but more than half the time they just…don’t.
To do this right, you cannot allow the rent-seekers to rebrand. You have to cut them out entirely. I don’t think this will fix everything that’s wrong with science; it will merely fix the wrongest thing. Nonprofit journals still charge fees, but at least the money goes to organizations that ostensibly care about science, rather than going to CEOs who make $17 million a year. And almost every journal, for-profit or not, uses the same failed system of peer review. The biggest benefit of shaking things up, then, would be allowing different approaches to have a chance at life, the same way an occasional forest fire clears away the dead wood, opens up the pinecones, and gives seedlings a shot at the sunlight.
Science philanthropies should adopt the same policy, and some of them already have. The Navigation Fund, which oversees billions of dollars in scientific funding, no longer bankrolls journal publications at all. Seemay Chou, its director, reports that the experiment has been a great success:
Our researchers began designing experiments differently from the start. They became more creative and collaborative. The goal shifted from telling polished stories to uncovering useful truths. All results had value, such as failed attempts, abandoned inquiries, or untested ideas, which we frequently release through Arcadia’s Icebox. The bar for utility went up, as proxies like impact factors disappeared.
Fifteen years ago, the open science movement was all about abolishing for-profit journals—that’s what open science meant. It seemed like every speech would end with “ELSEVIER DELENDA EST”.
Now people barely bring it up at all. It’s like a tiger has escaped the zoo and it’s gulping down schoolchildren, but when people suggest zoo improvements, all the agenda items are like, “We should add another Dippin’ Dots kiosk”. If you bring up the loose tiger, everyone gets annoyed at you, like “Of course, no one likes the tiger”.
I think two things happened. First, we got cynical about cyberspace. In the 1990s and 2000s, we really thought the internet would solve most of our problems. When those problems persisted despite all of us getting broadband, we shifted to thinking that the internet was, in fact, causing the problems. And so it became cringe to think the internet could ever be a force for good. In 1995, for-profit publishers were going to be “the internet’s first victim”; in 2015, they were “the business the internet could not kill”.
Second, when the replication crisis hit in the early 2010s, the open science movement got a new villain—namely, naughty researchers. The fakers, the fraudsters, the over-claimers: those are the real bad boys of science. It’s no longer cool to hate international publishing conglomerates. Now it’s cool to hate your colleagues.
Both of these shifts were a shame. The internet utopians were right that the web would eliminate the need for journals, but they were wrong to think that would be enough. The replication police were right to call out scientific malfeasance, but they were wrong to forget our old foes. The for-profit publishers are just as bad as they ever were, and while the internet has made them more vulnerable then ever, now we know they won’t go unless they’re pushed.
If we want better science, we should catch the tiger. Not only because it’s bad for the tiger to be loose, but because it’s bad for us to look the other way. If you allow an outrageous scam to go unchecked, if you participate in it, normalize it—then what won’t you do? Why not also goose your stats a bit? Why not publish some junk research? Look around: no one cares!
There are so many problems with our current way of doing things, and most of those problems are complicated and difficult to solve. This one isn’t. Let’s heave this succubus off our scientific system and end this scam once and for all. After that, Dippin’ Dots all around.
...
Read the original on www.experimental-history.com »
This is an Internet Standards Track document.¶
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841.¶
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc9849.¶
Copyright (c) 2026 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Although TLS 1.3 [RFC8446] encrypts most of the handshake, including the server certificate, there are several ways in which an on-path attacker can learn private information about the connection. The plaintext Server Name Indication (SNI) extension in ClientHello messages, which leaks the target domain for a given connection, is perhaps the most sensitive information left unencrypted in TLS 1.3.¶
This document specifies a new TLS extension called Encrypted Client Hello (ECH) that allows clients to encrypt their ClientHello to the TLS server. This protects the SNI and other potentially sensitive fields, such as the Application-Layer Protocol Negotiation (ALPN) list
[RFC7301]. Co-located servers with consistent externally visible TLS configurations and behavior, including supported versions and cipher suites and how they respond to incoming client connections, form an anonymity set. (Note that implementation-specific choices, such as extension ordering within TLS messages or division of data into record-layer boundaries, can result in different externally visible behavior, even for servers with consistent TLS configurations.) Usage of this mechanism reveals that a client is connecting to a particular service provider, but does not reveal which server from the anonymity set terminates the connection. Deployment implications of this feature are discussed in Section 8.¶
ECH is not in itself sufficient to protect the identity of the server. The target domain may also be visible through other channels, such as plaintext client DNS queries or visible server IP addresses. However, encrypted DNS mechanisms such as DNS over HTTPS [RFC8484], DNS over TLS/DTLS [RFC7858] [RFC8094], and DNS over QUIC [RFC9250]
provide mechanisms for clients to conceal DNS lookups from network inspection, and many TLS servers host multiple domains on the same IP address. Private origins may also be deployed behind a common provider, such as a reverse proxy. In such environments, the SNI remains the primary explicit signal available to observers to determine the server’s identity.¶
ECH is supported in TLS 1.3 [RFC8446], DTLS 1.3 [RFC9147], and newer versions of the TLS and DTLS protocols.¶
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174]
when, and only when, they appear in all capitals, as shown here. All TLS notation comes from [RFC8446], Section 3.¶
This protocol is designed to operate in one of two topologies illustrated below, which we call “Shared Mode” and “Split Mode”. These modes are described in the following section.¶
A client-facing server enables ECH by publishing an ECH configuration, which is an encryption public key and associated metadata. Domains which wish to use ECH must publish this configuration, using the key associated with the client-facing server. This document defines the ECH configuration’s format, but delegates DNS publication details to [RFC9460]. See
[RFC9848] for specifics about how ECH configurations are advertised in SVCB and HTTPS records. Other delivery mechanisms are also possible. For example, the client may have the ECH configuration preconfigured.¶
When a client wants to establish a TLS session with some backend server, it constructs a private ClientHello, referred to as the ClientHelloInner. The client then constructs a public ClientHello, referred to as the
ClientHelloOuter. The ClientHelloOuter contains innocuous values for sensitive extensions and an “encrypted_client_hello” extension (Section 5), which carries the encrypted ClientHelloInner. Finally, the client sends ClientHelloOuter to the server.¶
The server takes one of the following actions:¶
If it does not support ECH or cannot decrypt the extension, it completes the handshake with ClientHelloOuter. This is referred to as rejecting ECH.¶
If it successfully decrypts the extension, it forwards the ClientHelloInner
to the backend server, which completes the handshake. This is referred to as accepting ECH.¶
Upon receiving the server’s response, the client determines whether or not ECH was accepted (Section 6.1.4) and proceeds with the handshake accordingly. When ECH is rejected, the resulting connection is not usable by the client for application data. Instead, ECH rejection allows the client to retry with up-to-date configuration (Section 6.1.6).¶
The primary goal of ECH is to ensure that connections to servers in the same anonymity set are indistinguishable from one another. Moreover, it should achieve this goal without affecting any existing security properties of TLS 1.3. See Section 10.1 for more details about the ECH security and privacy goals.¶
ECH uses Hybrid Public Key Encryption (HPKE) for public key encryption [HPKE]. The ECH configuration is defined by the following ECHConfig structure.¶
The structure contains the following fields:¶
The ECHConfigContents structure contains the following fields:¶
The HpkeKeyConfig structure contains the following fields:¶
The client-facing server advertises a sequence of ECH configurations to clients, serialized as follows.¶
The ECHConfigList structure contains one or more ECHConfig structures in decreasing order of preference. This allows a server to support multiple versions of ECH and multiple sets of ECH parameters.¶
To offer ECH, the client sends an “encrypted_client_hello” extension in the
ClientHelloOuter. When it does, it MUST also send the extension in
ClientHelloInner.¶
The payload of the extension has the following structure:¶
The outer extension uses the outer variant and the inner extension uses the
inner variant. The inner extension has an empty payload, which is included because TLS servers are not allowed to provide extensions in ServerHello which were not included in ClientHello. The outer extension has the following fields:¶
When a client offers the outer version of an “encrypted_client_hello” extension, the server MAY include an “encrypted_client_hello” extension in its EncryptedExtensions message, as described in Section 7.1, with the following payload:¶
The response is valid only when the server used the ClientHelloOuter. If the server sent this extension in response to the inner variant, then the client
MUST abort with an “unsupported_extension” alert.¶
Finally, when the client offers the “encrypted_client_hello”, if the payload is the inner variant and the server responds with HelloRetryRequest, it MUST
include an “encrypted_client_hello” extension with the following payload:¶
The value of ECHHelloRetryRequest.confirmation is set to
hrr_accept_confirmation as described in Section 7.2.1.¶
This document also defines the “ech_required” alert, which the client MUST send when it offered an “encrypted_client_hello” extension that was not accepted by the server. (See Section 11.2.)¶
Clients that implement the ECH extension behave in one of two ways: either they offer a real ECH extension, as described in Section 6.1, or they send a Generate Random Extensions And Sustain Extensibility (GREASE) [RFC8701]
ECH extension, as described in Section 6.2. The client offers ECH if it is in possession of a compatible ECH configuration and sends GREASE ECH (see Section 6.2) otherwise. Clients of the latter type do not negotiate ECH; instead, they generate a dummy ECH extension that is ignored by the server. (See Section 10.10.4 for an explanation.) It is also possible for clients to always send GREASE ECH without implementing the remainder of this specification.¶
As described in Section 3.1, servers can play two roles, either as the client-facing server or as the backend server. Depending on the server role, the ECHClientHello will be different:¶
A client-facing server expects an ECHClientHello.type of outer, and proceeds as described in Section 7.1 to extract a
ClientHelloInner, if available.¶
A backend server expects an ECHClientHello.type of inner, and proceeds as described in Section 7.2.¶
If ECHClientHello.type is not a valid ECHClientHelloType, then the server MUST abort with an “illegal_parameter” alert.¶
In split mode, a client-facing server which receives a ClientHello
with ECHClientHello.type of inner MUST abort with an “illegal_parameter” alert. Similarly, in split mode, a backend server which receives a ClientHello with ECHClientHello.type of outer
MUST abort with an “illegal_parameter” alert.¶
In shared mode, a server plays both roles, first decrypting the
ClientHelloOuter and then using the contents of the
ClientHelloInner. A shared mode server which receives a
ClientHello with ECHClientHello.type of inner MUST abort with an “illegal_parameter” alert, because such a ClientHello should never be received directly from the network.¶
If the “encrypted_client_hello” is not present, then the server completes the handshake normally, as described in [RFC8446].¶
The design of ECH as specified in this document necessarily requires changes to client, client-facing server, and backend server. Coordination between client-facing and backend server requires care, as deployment mistakes can lead to compatibility issues. These are discussed in Section 8.1.¶
Beyond coordination difficulties, ECH deployments may also create challenges for uses of information that ECH protects. In particular, use cases which depend on this unencrypted information may no longer work as desired. This is elaborated upon in Section 8.2.¶
In the absence of an application profile standard specifying otherwise, a compliant ECH application MUST implement the following HPKE cipher suite:¶
This section contains security considerations for ECH.¶
ECH considers two types of attackers: passive and active. Passive attackers can read packets from the network, but they cannot perform any sort of active behavior such as probing servers or querying DNS. A middlebox that filters based on plaintext packet contents is one example of a passive attacker. In contrast, active attackers can also write packets into the network for malicious purposes, such as interfering with existing connections, probing servers, and querying DNS. In short, an active attacker corresponds to the conventional threat model
[RFC3552] for TLS 1.3 [RFC8446].¶
Passive and active attackers can exist anywhere in the network, including between the client and client-facing server, as well as between the client-facing and backend servers when running ECH in split mode. However, for split mode in particular, ECH makes two additional assumptions:¶
The channel between each client-facing and each backend server is authenticated such that the backend server only accepts messages from trusted client-facing servers. The exact mechanism for establishing this authenticated channel is out of scope for this document.¶
The attacker cannot correlate messages between a client and client-facing server with messages between client-facing and backend server. Such correlation could allow an attacker to link information unique to a backend server, such as their server name or IP address, with a client’s encrypted ClientHelloInner. Correlation could occur through timing analysis of messages across the client-facing server, or via examining the contents of messages sent between client-facing and backend servers. The exact mechanism for preventing this sort of correlation is out of scope for this document.¶
Given this threat model, the primary goals of ECH are as follows.¶
Security preservation. Use of ECH does not weaken the security properties of TLS without ECH.¶
Handshake privacy. TLS connection establishment to a server name within an anonymity set is indistinguishable from a connection to any other server name within the anonymity set. (The anonymity set is defined in Section 1.)¶
Downgrade resistance. An attacker cannot downgrade a connection that attempts to use ECH to one that does not use ECH.¶
These properties were formally proven in [ECH-Analysis].¶
With regards to handshake privacy, client-facing server configuration determines the size of the anonymity set. For example, if a client-facing server uses distinct ECHConfig values for each server name, then each anonymity set has size k = 1. Client-facing servers
SHOULD deploy ECH in such a way so as to maximize the size of the anonymity set where possible. This means client-facing servers should use the same ECHConfig for as many server names as possible. An attacker can distinguish two server names that have different
ECHConfig values based on the ECHClientHello.config_id value.¶
This also means public information in a TLS handshake should be consistent across server names. For example, if a client-facing server services many backend origin server names, only one of which supports some cipher suite, it may be possible to identify that server name based on the contents of the unencrypted handshake message. Similarly, if a backend origin reuses KeyShare values, then that provides a unique identifier for that server.¶
Beyond these primary security and privacy goals, ECH also aims to hide, to some extent, the fact that it is being used at all. Specifically, the GREASE ECH extension described in Section 6.2 does not change the security properties of the TLS handshake at all. Its goal is to provide “cover” for the real ECH protocol (Section 6.1), as a means of addressing the “do not stick out” requirements of [RFC8744]. See Section 10.10.4 for details.¶
The following procedure processes the “ech_outer_extensions” extension (see
Section 5.1) in linear time, ensuring that each referenced extension in the ClientHelloOuter is included at most once:¶
Let I be initialized to zero and N be set to the number of extensions in ClientHelloOuter.¶
For each extension type, E, in OuterExtensions:¶
If E is “encrypted_client_hello”, abort the connection with an “illegal_parameter” alert and terminate this procedure.¶
While I is less than N and the I-th extension of
ClientHelloOuter does not have type E, increment I.¶
If I is equal to N, abort the connection with an “illegal_parameter” alert and terminate this procedure.¶
Otherwise, the I-th extension of ClientHelloOuter has type E. Copy it to the EncodedClientHelloInner and increment I.¶
This document draws extensively from ideas in [PROTECTED-SNI], but is a much more limited mechanism because it depends on the DNS for the protection of the ECH key. , , ,
, , , and also provided important ideas and contributions.¶
...
Read the original on www.rfc-editor.org »
On a fresh installation of Firefox on MacOS, right-clicking an image while some text on the page is highlighted (to show as many buttons as possible) looks like so:
To be blunt: holy fucking shit, what the fuck is all of this shit? 26 rows of which 2 are greyed-out (aka: fucking useless), 7 dividers, 2 submenus; because a single row for “Ask an AI Chatbot” wasn’t enough, they just had to make another submenu. Amazing.
The “Inspect Accessibility Properties” button was added because I opened the DevTools (Inspector) once. It’s not obvious how to actually disable it ever again. Why am I shown “Copy Clean Link” if there is no clean link (or the link is already clean)? The same goes for “Copy Clean Link to Highlight”. Why can’t I make it so it always defaults to the “clean link” no matter what (and get rid of “Copy Link” completely, instead)? “Ask an AI Chatbot”? No, fuck you.
The rest? Completely useless. Thanks for showing me every feature you’ve ever shipped, with no authoritative selection of what users actually care about — and making it completely non-obvious how to disable the useless shit here.
Enough venting, let’s clean this all up. The following settings in about:config can be used to disable a ton of these useless right-click menu buttons. Note, some of them actually disable other functionality, so choose wisely. We can set the following to false:
* browser.translations.select.enable — Removes the “Translate Selection” button from the right-click menu.
* screenshots.browser.component.enabled — Disables the built-in Firefox screenshot functionality, which also removes the “Take Screenshot” button.
* dom.text_fragments.enabled — Disables Text Fragments support, which also removes the “Copy Link to Highlight” button (and disables the auto-focus on URLs that include #:~:text=…).
* devtools.accessibility.enabled — Disables the DevTools Accessibility Inspector and removes the “Inspect Accessibility Properties” button.
* browser.ml.linkPreview.enabled — Disables Link Previews (and the AI-generated key points inside them), removing “Preview Link” button.
* dom.text-recognition.enabled — Disables OCR on images, removing the “Copy Text From Image” button.
* extensions.formautofill.addresses.enabled — Disables address autofill and the associated menu/button that sometimes appears in forms.
* extensions.formautofill.creditCards.enabled — Disables credit card/payment method autofill and removes the associated menu/button that sometimes appears in forms.
* widget.macos.native-context-menus — Turns off native macOS context menus so Firefox uses its own menus. This removes the “Services” button.
* print.enabled — Completely disables Firefox’ printing UI and capabilities, which also removes the “Print” and “Print Selection…” buttons.
How do we look now?
Great, much better, we’re down from 26 buttons to just 15. Here’s what it looks like when you right-click on a page and when you right-click a link:
We still have the following useless buttons though:
Why do all of the above have …? (edit: according to this, “it means that more information is required to complete the task (e.g. requesting the filename for saving a file)”. But the real bad news is that we can’t get rid of these things by simply toggling some option in about:config.
We also have these when we right-click in a form:
Despite the browser only being used in one language, there is no way to get rid of the “Languages” menu there. It’s possible to get rid of “Check Spelling” by completely disabling spellcheck, but that’s a useful feature for me, so I don’t.
Those remaining useless buttons can only be removed by creating a custom userChrome.css. I’ll cover how to do that in my next post.
For what it’s worth, it is nice that these buttons can be enabled/disabled, and userChrome.css is cool. But at the same time, imagine being a completely new Firefox user, who has zero use for any of this? How are they supposed to figure out how to do all of this? It took me a significant amount of time to find those settings to disable (and some of them are hacks, like disabling print.enabled). Maybe Firefox should implement something similar to their “Customize Toolbar”, which makes it easy to plug & play each of the right-click buttons. “PRs welcome” as they say, I suppose.
...
Read the original on joshua.hu »
To add this web app to your iOS home screen tap the share button and select "Add to the Home Screen".
10HN is also available as an iOS App
If you visit 10HN only rarely, check out the the best articles from the past week.
If you like 10HN please leave feedback and share
Visit pancik.com for more.