What Can Europe Learn From China’s Critical-Tech Innovation Push?

Conor here: Noting the authors’ backgrounds, their argument is unsurprising. But seeing that so much of what is sold as tech breakthroughs and AI innovation is really just theft on an unprecedented scale, demands for endless resources for the benefit a few, shredding the social contract, environmental destruction, new and improved surveillance, and tools that […]

27 mins read

Pakistan considers rupee-backed stablecoin to boost financial access

Key Takeaways Pakistan may launch a rupee-backed stablecoin to enhance financial access and modernize payments. The initiative is considered alongside the creation of comprehensive digital asset regulations. Share this article Pakistan is exploring the launch of a rupee-backed stablecoin, a cryptocurrency designed to maintain value stability through asset pegging, as part of broader efforts to […]

1 min read

The Download: A new home under the sea, and cloning pets

—Senator Bernie Sanders reacts to Tesla shareholders’ decision to award Elon Musk a $1 trillion pay package in a post on X. One more thing Finding forgotten Indigenous landscapes with electromagnetic technology The fertile river valleys of the American Midwest hide tens of thousands of Indigenous earthworks, according to experts: geometric structures consisting of walls, […]

1 min read

70% of top Bitcoin miners are already using AI income to survive bear market

Seven of the top ten miners by hashrate report AI or high-performance computing initiatives already generating revenue, with the other three planning to follow suit. The shift pairs miners’ energized land and interconnections with contracted revenue from GPU customers, creating a second line of business that competes with running ASICs at full power. AI partnerships […]

9 mins read

Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic

Microsoft has disclosed details of a novel side-channel attack targeting remote language models that could enable a passive adversary with capabilities to observe network traffic to glean details about model conversation topics despite encryption protections under certain circumstances. This leakage of data exchanged between humans and streaming-mode language models could pose serious risks to the privacy of user […]

6 mins read