<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl" media="all"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
<title>Roastidio.us in webspace https://www.theregister.com/</title>
<link>https://roastidio.us/webspace/62</link>
<atom:link href="https://roastidio.us/webspace?url=https%3A%2F%2Fwww.theregister.com%2F" rel="self" type="application/rss+xml"></atom:link>
<description>Roastidio.us in webspace https://www.theregister.com/</description>
<item>
<title>Anthropic admits it dumbed down Claude with &#39;úpgrades&#39; • The Register</title>
<link>https://www.theregister.com/2026/04/23/anthropic_says_it_has_fixed/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2021/06/02/bug.jpg"></enclosure>
<guid isPermaLink="false">KRt0wkkCRHAf84X-STlnFpiTCcAb5bsywthzbA==</guid>
<pubDate>Sun, 26 Apr 2026 01:10:43 +0000</pubDate>
<description>: System changes and bugs overlapped to create the impression of general decline</description>
<content:encoded>&lt;p&gt;Claude users who complained about the AI service producing lower-quality responses over the past month weren’t imagining it.&lt;/p&gt;&lt;p&gt;Anthropic on Thursday &lt;a href=&quot;https://www.anthropic.com/engineering/april-23-postmortem&quot;&gt;published&lt;/a&gt; the results of a company investigation that found three distinct changes in March and April made things worse for customers using Claude Code, the Claude Agent SDK, and Claude Cowork.&lt;/p&gt;&lt;p&gt;Claude&amp;#39;s API, the company says, was not affected.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;Claude users &lt;a href=&quot;https://www.theregister.com/2026/04/13/claude_outage_quality_complaints/&quot;&gt;complained bitterly&lt;/a&gt; about the quality of Claude&amp;#39;s output during March and April, and service availability problems only made matters worse.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Anthropic insists it didn&amp;#39;t degrade its models intentionally. Rather, several adjustments went awry and those missteps created the perception of creeping AI incompetency.&lt;/p&gt;&lt;p&gt;First, on March 4, Anthropic adjusted Claude Code&amp;#39;s default reasoning &lt;a href=&quot;https://code.claude.com/docs/en/model-config#adjust-effort-level&quot;&gt;effort level&lt;/a&gt; from high to medium. Effort level controls how much effort the model puts into a particular reasoning task. Anthropic hoped the change it made would reduce the latency that followed from longer periods of cogitation.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;&amp;quot;This was the wrong tradeoff,&amp;quot; the company said. &amp;quot;We reverted this change on April 7 after users told us they&amp;#39;d prefer to default to higher intelligence and opt into lower effort for simple tasks.&amp;quot;&lt;/p&gt;&lt;p&gt;Presumably, turning down the default effort level on Opus 4.6 and Sonnet 4.6 would also have lightened the inference burden – models would &amp;quot;think&amp;quot; less and consume fewer tokens, using limited capacity more judiciously.&lt;/p&gt;&lt;p&gt;The latest Claude Code build, v2.1.118, defaults to &amp;quot;xhigh&amp;quot; on Sonnet 4.6.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;Anthropic’s second misfire was a bug introduced on March 26 when a cache optimization change ended up clearing cached session data with every turn of the prompt and response cycle.&lt;/p&gt;&lt;p&gt;Claude caches input tokens for an hour, which benefits the user by making sequential API calls faster and cheaper. Company engineers decided they wanted to clear output tokens (thinking sessions) for users who were idle for an hour, since the cache would not be used after that much time.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/22/github_opts_all_cli_users/&quot;&gt;GitHub opts all CLI users into telemetry collection whether they want it or not&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/23/microsoft_gives_your_word_documents/&quot;&gt;Microsoft gives your Word documents an AI co-author you didn&amp;#39;t ask for&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/23/job_scam_targeted_developer/&quot;&gt;Dev targeted by sophisticated job scam: &amp;#39;I let my guard down, and ran the freaking code&amp;#39;&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/23/ai_now_gobbling_up_power/&quot;&gt;AI now gobbling up power and management chips for servers&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Anthropic’s motive for the change was to reduce the cost of resuming a session by disposing of old thinking traces that would no longer be relevant. Instead, engineers – Claude? – introduced a bug that cleared thinking sessions with each turn. The result was that Claude became &amp;quot;forgetful and repetitive.&amp;quot; This was fixed April 10 for Sonnet 4.6 and Opus 4.6.&lt;/p&gt;&lt;p&gt;Third, on April 16 Anthropic revised its system prompt, among other measures, in an effort to make Claude models less verbose. The added passage sounds harmless:&lt;/p&gt;&lt;div&gt;

&lt;p&gt;&amp;quot;Length limits: keep text between tool calls to ≤25 words. Keep final responses to ≤100 words unless the task requires more detail.&amp;quot;&lt;/p&gt;
&lt;/div&gt;&lt;p&gt;Following several weeks of internal testing, model quality evaluations suggested the change was safe. But after shipping the amended system prompt in conjunction with the release of Opus 4.7, subsequent ablation tests – which involve removing system prompt instructions to measure the effect of their absence – revealed a three percent performance drop for both Opus 4.6 and 4.7. The relevant system prompt adjustment was reverted on April 20.&lt;/p&gt;&lt;p&gt;Anthropic is promising it will conduct more internal tests for future public builds of Claude Code, improvements in its Code Review tool, better evaluation of system prompt changes, and a new @ClaudeDevs account on social media site X &amp;quot;to give us the room to explain product decisions and the reasoning behind them in depth.&amp;quot;&lt;/p&gt;&lt;p&gt;This only a day after head of growth Amol Avasare took to X to explain &lt;a href=&quot;https://www.theregister.com/2026/04/22/anthropic_removes_claude_code_pro/&quot;&gt;an unannounced A/B test&lt;/a&gt; and &lt;a href=&quot;https://x.com/TheAmolAvasare/status/2046725498592722972?s=20&quot;&gt;said&lt;/a&gt; the company would try to communicate more directly, so people don&amp;#39;t have to hear about issues through social media channels like X and Reddit.&lt;/p&gt;&lt;p&gt;To help customers rediscover the state of being comfortably numb, the AI reset account usage levels for everyone.&lt;/p&gt;&lt;p&gt;&amp;quot;This isn&amp;#39;t the experience users should expect from Claude Code,&amp;quot; the company said. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>YouTuber has DIMM idea, builds working DRAM in backyard • The Register</title>
<link>https://www.theregister.com/2026/04/23/youtuber_builds_working_dram/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2021/10/11/close_upstackofddrramdoubledataraterandomaccess.jpg"></enclosure>
<guid isPermaLink="false">Rvs5pvdIL0uKp7yFXecksZ6qPrdze6O7bAQH3g==</guid>
<pubDate>Fri, 24 Apr 2026 00:22:12 +0000</pubDate>
<description>: What are you doing to solve the memory crisis?</description>
<content:encoded>&lt;p&gt;If you follow PC hardware prices, you’ll know AI demand has pushed memory prices higher as manufacturers prioritize memory for datacenters. To deal with that, you can pay through the nose, buy less memory, or ... try to build your own DRAM.&lt;/p&gt;&lt;p&gt;Dr. Semiconductor is a YouTuber who joined the platform in February and has only &lt;a href=&quot;https://www.youtube.com/@Dr.Semiconductor&quot;&gt;published&lt;/a&gt; two videos so far. One shows his process of &lt;a href=&quot;https://www.youtube.com/watch?v=HfSO-LCKmrA&quot;&gt;turning&lt;/a&gt; a backyard shed into a cleanroom tidy enough to make his own semiconductors, while the other shows him producing working sample memory cells.&lt;/p&gt;&lt;p&gt;
  &lt;a href=&quot;https://www.youtube.com/watch?v=h6GWikWlAQA&quot;&gt;Youtube Video&lt;/a&gt;
&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;The YouTuber opens his &lt;a href=&quot;https://www.youtube.com/watch?v=h6GWikWlAQA&quot;&gt;second video&lt;/a&gt; on the making of his sample chips with an acknowledgment that the whole experiment has been driven by RAM prices skyrocketing &lt;a href=&quot;https://www.theregister.com/2025/12/20/memory_prices_dram/&quot;&gt;last year&lt;/a&gt; and into the &lt;a href=&quot;https://www.theregister.com/2026/02/02/dram_prices_expected_to_double/&quot;&gt;beginning of 2026&lt;/a&gt;, leading to vendor quotes that &lt;a href=&quot;https://www.theregister.com/2026/02/18/memory_shortage_persists_vendor_change_terms/&quot;&gt;constantly fluctuate&lt;/a&gt; and even &lt;a href=&quot;https://www.theregister.com/2026/02/13/ai_memory_router_prices/&quot;&gt;delays in broadband expansions&lt;/a&gt; caused by a lack of memory chips. &lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Against that backdrop is Dr. Semiconductor, whose video walks through the process inside a tiny cleanroom equipped to make DIY RAM cells.&lt;/p&gt;&lt;p&gt;Like any good RAM manufacturing process, Dr. Semiconductor started by designing a 5x4 array of capacitors and transistors - barely a fraction of the number of cells on a modern DRAM chip - then transferring the design onto silicon, coating it with photoresist for patterning and etching, and doping parts of the chip with phosphorus to increase conductivity. He then built up microscopic layers one by one without any of the industrial automation available to Samsung, SK hynix, or Micron.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;After making a few small sample chips, Dr. Semiconductor tested them using his parameter analyzers. Some additional DIY manipulation was necessary to probe the tiny chips, as the 5x4 array is small enough that the device had to be measured with micromanipulators and extremely fine probe tips.&lt;/p&gt;&lt;p&gt;&amp;quot;Because the devices are at the nanoscale you can&amp;#39;t just attach regular wires,&amp;quot; the self-described doctor explained. &amp;quot;So for testing purposes I have a number of micromanipulators with some incredibly fine probe tips in order to feed current and voltage into the device.&amp;quot; &lt;/p&gt;&lt;p&gt;The tests showed that the DIY RAM cells all functioned as expected, though higher voltage led to punch through due to the source and drain portions of each RAM cell being just a single micron apart. This &amp;quot;shows the trouble with scaling,&amp;quot; according to Dr. Semiconductor, but he said it won&amp;#39;t be a problem unless he tries to feed higher voltage into his memory. &lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;As for the capacitors in the homemade chip, each was found to be able to hold 12.3 picofarads, which was right in line with what Dr. Semiconductor hoped to achieve, describing it as &amp;quot;pretty close to the perfect ideal theoretical of a little less than 15 pF I designed for.&amp;quot; &lt;/p&gt;&lt;p&gt;Unfortunately, the capacitors in the DIY RAM cells in his test chip were only able to hold a charge for around 4 milliseconds - far less than commercial RAM, which he noted can retain charge for more than 64 milliseconds.&lt;/p&gt;&lt;p&gt;Not perfect, but for a first try at creating homemade DRAM in a backyard microfab, it&amp;#39;s quite the start. &lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/01/googles_turboquant_reality/&quot;&gt;Google&amp;#39;s TurboQuant saves memory, but won&amp;#39;t save us from DRAM-pricing hell&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/02/raspberry_pi_ram_shortage_price_hike/&quot;&gt;Let them eat Pi: RAM shortage bumps Raspberry prices as much as $60&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/14/microsoft_surface_hikes/&quot;&gt;Microsoft raises UK Surface prices as RAM crisis reaches the checkout&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/05/pc_prices_rising/&quot;&gt;Curse of AI to push up PC prices as memory and CPU shortages bite&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&amp;quot;This is awesome - first time ever RAM has been made at home,&amp;quot; Dr. Semiconductor said in the video. We can&amp;#39;t confirm that claim, but we&amp;#39;re not aware of anyone else making RAM in their backyard shed. &lt;/p&gt;&lt;p&gt;That said, the fact that it&amp;#39;s an array of just 5x4 cells means this RAM isn&amp;#39;t going to meet any important memory metrics anytime soon. &lt;/p&gt;&lt;p&gt;&amp;quot;While you can store data on it, you can&amp;#39;t run DOOM in it quite yet - this is just a few cells to prove it will work,&amp;quot; Dr. Semiconductor explained. He&amp;#39;s not done here, though. Next up is chaining a bunch of his homemade cells together to see if they can actually serve as memory for a PC.&lt;/p&gt;&lt;p&gt;When the results of that test might be published is unknown, but don&amp;#39;t get too excited: Just because one enterprising individual managed to fabricate homemade RAM cells doesn&amp;#39;t mean a cottage (or shed, to be fair) computing industry is likely to pop up overnight. &lt;/p&gt;&lt;p&gt;AI memory demand may become more efficient, and there may be &lt;a href=&quot;https://www.theregister.com/2026/03/31/google_turboquant_memory_market_impact/&quot;&gt;early signs&lt;/a&gt; of pricing pressure easing, but the shortage is &lt;a href=&quot;https://www.theregister.com/2025/12/20/memory_prices_dram/&quot;&gt;unlikely to end&lt;/a&gt; anytime soon. Buckle up, or consider building your own fab. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Anthropic Mythos model can find and exploit 0-days • The Register</title>
<link>https://www.theregister.com/2026/04/07/anthropic_all_your_zerodays_are_belong_to_us/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2017/05/08/worldserpent.jpg"></enclosure>
<guid isPermaLink="false">TTHlLXpFhJHaYomwfT17jsL2INyQLF-gDoIjBA==</guid>
<pubDate>Thu, 23 Apr 2026 11:13:49 +0000</pubDate>
<description>: Hasn&#39;t released it to the public, because it would break the internet - in a bad way</description>
<content:encoded>&lt;p&gt;For years, the infosec community’s biggest existential worry has been quantum computers blowing away all classical encryption and revealing the world’s secrets. Now they have a new Big Bad: an AI model that can generate zero-day vulnerabilities.&lt;/p&gt;&lt;p&gt;Anthropic made the model and named it Mythos. Thankfully, the AI company decided not to release it, because it would break the internet – and not in a good way.&lt;/p&gt;&lt;p&gt;&amp;quot;AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities,&amp;quot; the company said.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;Mythos is markedly different from Claude Opus 4.6, which Anthropic only recently said was not very skilled at developing working exploit code. Where Opus 4.6 managed an exploit development success rate of just over zero percent, Mythos Preview generated a working exploit 72.4 percent of the time.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;What Anthropic is describing is literally a zero-day engine: &amp;quot;Engineers at Anthropic with no formal security training have asked Mythos Preview to find remote code execution vulnerabilities overnight, and woken up the following morning to a complete, working exploit.&amp;quot;&lt;/p&gt;&lt;p&gt;Fortunately, instead of releasing Mythos, Anthropic chose to provide a preview version to a set of industry partners so they can use it to find flaws in their systems before adversaries do.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;The AI biz calls its limited release initiative &lt;a href=&quot;https://www.anthropic.com/glasswing&quot;&gt;Project Glasswing&lt;/a&gt;. Participants include: Amazon Web Services, Anthropic, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorganChase, the Linux Foundation, Microsoft, NVIDIA, and Palo Alto Networks.&lt;/p&gt;&lt;p&gt;And while this tech industry anti-rogues’ gallery scans their own systems with the purportedly perspicacious Mythos, Anthropic invited around 40 other organizations to participate in this introspective bug hunt, subsidized by up to $100M in usage credits for Mythos Preview and $4M in direct donations to open-source security organizations.&lt;/p&gt;&lt;p&gt;If that sounds a bit like an arsonist handing out fire extinguishers, well, that&amp;#39;s on you for being so cynical.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/06/anthropic_claude_code_dumber_lazier_amd_ai_director/&quot;&gt;AMD&amp;#39;s AI director slams Claude Code for becoming dumber and lazier since last update&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/07/aws_garman_humanx_ai_underhyped/&quot;&gt;AWS CEO: It&amp;#39;s funny when people ask me if AI is overhyped&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/07/microsoft_device_code_phishing/&quot;&gt;Hundreds of orgs compromised daily in Microsoft device code phishing attacks&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/07/intel_elon_space_delusion/&quot;&gt;Intel gets trapped in Elon&amp;#39;s reality distortion field as it joins in megafab delusions&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Word of Mythos leaked last month when &lt;a href=&quot;https://m1astra-mythos.pages.dev/&quot;&gt;a draft blog post&lt;/a&gt; from Anthropic surfaced. The details &lt;a href=&quot;https://red.anthropic.com/2026/mythos-preview/&quot;&gt;published on Tuesday&lt;/a&gt; paint a stark picture for the security community: &amp;quot;During our testing, we found that Mythos Preview is capable of identifying and then exploiting zero-day vulnerabilities in every major operating system and every major web browser when directed by a user to do so.&amp;quot;&lt;/p&gt;&lt;p&gt;The 22 Anthropic researchers listed as authors of its Tuesday post insist that the vulns are often subtle and difficult to detect. Some are decades old, like the &lt;a href=&quot;https://ftp.openbsd.org/pub/OpenBSD/patches/7.8/common/025_sack.patch.sig&quot;&gt;now-patched&lt;/a&gt; 27-year-old bug in OpenBSD.&lt;/p&gt;&lt;blockquote&gt;&amp;quot;The exploits it constructs are not just run-of-the-mill &lt;a href=&quot;https://en.wikipedia.org/wiki/Stack_buffer_overflow&quot;&gt;stack-smashing exploits&lt;/a&gt; (though as we&amp;#39;ll show, it can do those too). In one case, Mythos Preview wrote a web browser exploit that chained together four vulnerabilities, writing a complex &lt;a href=&quot;https://en.wikipedia.org/wiki/JIT_spraying&quot;&gt;JIT heap spray&lt;/a&gt; that escaped both renderer and OS sandboxes. It autonomously obtained local privilege escalation exploits on Linux and other operating systems by exploiting subtle race conditions and KASLR-bypasses. And it autonomously wrote a remote code execution exploit on FreeBSD&amp;#39;s NFS server that granted full root access to unauthenticated users by splitting a 20-gadget ROP chain over multiple packets.&amp;quot;&lt;/blockquote&gt;&lt;p&gt;According to Anthropic, Mythos identified &amp;quot;thousands of additional high- and critical-severity vulnerabilities.&amp;quot; The company is in the process of disclosing them responsibly.&lt;/p&gt;&lt;p&gt;Uh, thanks? ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>AI agent hacked McKinsey chatbot for read-write access • The Register</title>
<link>https://www.theregister.com/2026/03/09/mckinsey_ai_chatbot_hacked/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2026/03/09/shutterstock_robotic_arm_wrestling.jpg"></enclosure>
<guid isPermaLink="false">ygN25JU5GCteRQ3_14O8FzgNwGfNY5WxPmtNOQ==</guid>
<pubDate>Thu, 23 Apr 2026 10:21:02 +0000</pubDate>
<description>: David and Goliath…but with AI agents</description>
<content:encoded>&lt;p&gt;Researchers at red-team security startup CodeWall say their AI agent hacked McKinsey&amp;#39;s internal AI platform and gained full read and write access to the chatbot in just two hours.&lt;/p&gt;&lt;p&gt;It&amp;#39;s yet another indicator that &lt;a href=&quot;https://www.theregister.com/2026/03/08/deploy_and_manage_attack_infrastructure/&quot;&gt;agentic AI is becoming a more effective&lt;/a&gt; tool for conducting cyberattacks, including those against other AI systems.&lt;/p&gt;&lt;p&gt;This attack wasn’t conducted with malicious intent. However, threat hunters tell us that miscreants are increasingly using agents in real-world attacks, indicating that machine-speed intrusions aren&amp;#39;t going away.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;McKinsey, a mega-management consultancy that specializes in gnarly strategy work for huge corporations and governments, rolled out its generative AI platform called Lilli in July 2023. According to the company, &lt;a href=&quot;https://www.mckinsey.com/capabilities/tech-and-ai/how-we-help-clients/rewiring-the-way-mckinsey-works-with-lilli&quot;&gt;72 percent of its employees&lt;/a&gt; – that&amp;#39;s upwards of 40,000 people – now use the chatbot, which processes more than 500,000 prompts every month.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;CodeWall uses AI agents to continuously attack customers&amp;#39; infrastructure, to help them improve their security posture. According to the startup, its own security agent suggested targeting McKinsey, citing the consulting company&amp;#39;s public &lt;a href=&quot;https://hackerone.com/mckinsey-company&quot;&gt;responsible disclosure policy&lt;/a&gt; and recent updates to Lilli.&lt;/p&gt;&lt;p&gt;&amp;quot;So we decided to point our autonomous offensive agent at it,&amp;quot; the researchers &lt;a href=&quot;https://codewall.ai/blog/how-we-hacked-mckinseys-ai-platform&quot;&gt;wrote&lt;/a&gt; in a Monday blog, noting that the agent didn&amp;#39;t have access to any credentials for McKinsey’s assets.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;CodeWall’s researchers claim that within two hours of starting their red team raid, they achieved full read and write access to the entire production database and were able to access 46.5 million chat messages about strategy, mergers and acquisitions, and client engagements, all in plaintext, along with 728,000 files containing confidential client data, 57,000 user accounts, and 95 system prompts controlling the AI&amp;#39;s behavior. These prompts were all writable, meaning an attacker could poison everything Lilli spits out to all of the tens of thousands of consultants using the chatbot.&lt;/p&gt;&lt;p&gt;CodeWall&amp;#39;s agent found the SQL injection flaw at the end of February, and the researchers disclosed the full attack chain on March 1. By the following day, McKinsey had patched all unauthenticated endpoints, taken the development environment offline, and blocked public API documentation.&lt;/p&gt;&lt;p&gt;A McKinsey spokesperson told &lt;em&gt;The Register&lt;/em&gt; that it fixed all of the issues identified by CodeWall within hours of learning about the problems.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;&amp;quot;Our investigation, supported by a leading third-party forensics firm, identified no evidence that client data or client confidential information were accessed by this researcher or any other unauthorized third party,&amp;quot; the spokesperson told us. &amp;quot;McKinsey&amp;#39;s cybersecurity systems are robust, and we have no higher priority than the protection of client data and information we have been entrusted with.&amp;quot;&lt;/p&gt;&lt;h3&gt;AI vs AI&lt;/h3&gt;&lt;p&gt;CodeWall CEO Paul Price declined to tell us the exact prompts his team used to exploit the chatbot, but said the entire process was &amp;quot;fully autonomous from researching the target, analyzing, attacking, and reporting.&amp;quot;&lt;/p&gt;&lt;p&gt;The CodeWall agent initially gained access to Lilli after finding publicly exposed API documentation, including 22 endpoints that didn&amp;#39;t require authentication. One of these wrote user search queries, and the agent found that the JSON keys (these are the field names) were concatenated into SQL and vulnerable to SQL injection.&lt;/p&gt;&lt;p&gt;&amp;quot;When it found JSON keys reflected verbatim in database error messages, it recognised a SQL injection that standard tools wouldn&amp;#39;t flag,&amp;quot; the researchers wrote, adding that the error messages eventually began outputting live production data.&lt;/p&gt;&lt;p&gt;It gets worse: Lilli&amp;#39;s system prompts were stored in the same database, which gave the agent access to these as well.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/08/deploy_and_manage_attack_infrastructure/&quot;&gt;AI agents now help attackers, including North Korea, manage their drudge work&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/09/claude_legacy_code_vulns/&quot;&gt;Microsoft Azure CTO set Claude on his 1986 Apple II code, says it found vulns&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/04/fake_openclaw_installers_malware/&quot;&gt;Malware-laced OpenClaw installers get Bing AI search boost&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/25/chinese_law_enforcement_chatgpt_abuse/&quot;&gt;OpenAI says Chinese cops used ChatGPT to plan and track smear ops against opponents&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Because the SQL injection flaw was read and write, an attacker could abuse this to silently rewrite Lilli&amp;#39;s prompts, thus poisoning how the chatbot answered consultants&amp;#39; queries, what guardrails it followed, and how it cited sources. &amp;quot;No deployment needed,&amp;quot; the blog says. &amp;quot;No code change. Just a single UPDATE statement wrapped in a single HTTP call.&amp;quot;&lt;/p&gt;&lt;p&gt;These security holes are now closed – but the larger threat remains, Price told &lt;em&gt;The Register&lt;/em&gt;.&lt;/p&gt;&lt;p&gt;&amp;quot;We used a specific AI research agent to autonomously select the target, it did this without zero human input,&amp;quot; he said. &amp;quot;Hackers will be using the same technology and strategies to attack indiscriminately, with a specific objective in mind,&amp;quot; such as &amp;quot;financial blackmail for data loss or ransomware.&amp;quot; ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Manage attack infrastructure? AI agents can now help • The Register</title>
<link>https://www.theregister.com/2026/03/08/deploy_and_manage_attack_infrastructure/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2022/06/21/shutterstock_laptops.jpg"></enclosure>
<guid isPermaLink="false">39bFPWA5nEUyb5PwGnNX8OOxHik1Af7LZYiArw==</guid>
<pubDate>Thu, 23 Apr 2026 10:21:02 +0000</pubDate>
<description>interview: Crims &#39;will do what gets them their objective easiest and fastest,&#39; Microsoft threat intel boss tells The Reg</description>
<content:encoded>&lt;p&gt;&lt;span&gt;interview&lt;/span&gt; AI agents allow cybercriminals and nation-state hackers to outsource the &amp;quot;janitorial-type work&amp;quot; needed to plan and carry out cyberattacks, according to Sherrod DeGrippo, Microsoft&amp;#39;s GM of global threat intelligence. North Korea is taking advantage.&lt;/p&gt;&lt;p&gt;This includes tasks such as performing reconnaissance on compromised computers, and standing up and managing attack infrastructure - which may not sound as thrilling as &lt;a href=&quot;https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/&quot;&gt;plotting and carrying out digital intrusions&lt;/a&gt;, but are real-world &lt;a href=&quot;https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/&quot;&gt;criminal use cases for agentic AI&lt;/a&gt; that should make threat hunters sit up and take notice.&lt;/p&gt;&lt;p&gt;&amp;quot;Agentic, automated reconnaissance against systems is something that is worth taking a look at,&amp;quot; DeGrippo said during an interview with &lt;em&gt;The Register&lt;/em&gt;. &amp;quot;Go find out about XYZ, and come back to me with everything you&amp;#39;ve seen. Go scan the net blocks owned by this particular entity.&amp;quot;&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;An attacker could do this manually, but it would take a lot more time than asking an agent to do it for them. It&amp;#39;s &amp;quot;a great example of AI that can be used for regular, standard business purposes and can also be used by threat actors for malicious purposes,&amp;quot; she said.  &lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;In a Friday blog, &lt;a href=&quot;https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/&quot;&gt;Microsoft says&lt;/a&gt; that this is one of the ways miscreants are using AI to improve the efficiency and productivity of their criminal operations, resulting in attacks that are better, bigger, and faster.&lt;/p&gt;&lt;p&gt;Infrastructure management is another area where AI agents come in handy, DeGrippo said. &amp;quot;We have always seen threat actors stand up the infrastructure, whether that means compromising existing legitimate infrastructure and using it for malicious purposes, or purchasing accounts and setting up their own infrastructure to launch threat campaigns,&amp;quot; she said.  &lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;Microsoft Threat Intelligence has observed North Korea&amp;#39;s Coral Sleet - one of the crews behind the &lt;a href=&quot;https://www.theregister.com/2026/02/01/ai_security_startup_ceo_posts/&quot;&gt;fake IT worker scam&lt;/a&gt; - using development platforms to quickly create and manage their attack infrastructure at scale, allowing more rapid campaign staging, testing, and command-and-control operations, according to the Friday blog.&lt;/p&gt;&lt;p&gt;&amp;quot;From an agentic AI use case, this is very interesting because you can talk to your malicious infrastructure with natural language and convey your ideas just by expressing them,&amp;quot; DeGrippo said. &lt;/p&gt;&lt;p&gt;Both uses save attackers time and effort, and also lower barriers for less technically savvy criminals, especially when it comes to building infrastructure that won&amp;#39;t be detected by defenders.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;&amp;quot;Threat actors will do what works, and they will do what gets them their objective easiest and fastest,&amp;quot; DeGrippo said. &amp;quot;And so handing threat actors these really powerful tools is going to allow them to do more of that.&amp;quot;&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/23/ai_cyberattack_google_security/&quot;&gt;AI-powered cyberattack kits are &amp;#39;just a matter of time,&amp;#39; warns Google exec&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/08/criminals_vibe_coding_malware/&quot;&gt;Yes, criminals are using AI to vibe-code malware&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/&quot;&gt;AI agents can&amp;#39;t yet pull off fully autonomous cyberattacks – but they are already very helpful to crims&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/&quot;&gt;Chinese spies told Claude to break into about 30 critical orgs. Some attacks succeeded&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;While Microsoft&amp;#39;s threat intel team and other security researchers have documented attackers using &lt;a href=&quot;https://www.theregister.com/2026/01/08/criminals_vibe_coding_malware/&quot;&gt;agentic AI to generate malware&lt;/a&gt;, agents&amp;#39; code-writing skills can&amp;#39;t yet rival those of humans, DeGrippo told us. But, she added, there are two parts to this use case.&lt;/p&gt;&lt;p&gt;&amp;quot;When we detect AI-generated or AI-enabled malware, traditionally, we have noticed that it&amp;#39;s different from regular malware,&amp;quot; she said. &amp;quot;It does have those hallmarks that when a human looks at the code, they can say, &amp;#39;I think this was AI generated.&amp;#39;&amp;quot;&lt;/p&gt;&lt;p&gt;The second part, which involves malware that can call different AI functions and libraries, is the more interesting use, &amp;quot;and more sophisticated,&amp;quot; according to DeGrippo.&lt;/p&gt;&lt;p&gt;&amp;quot;Anybody who has a software development background, regardless of if they&amp;#39;re developing benign software or malicious software, is thinking about how to better enhance their workflows with AI,&amp;quot; she said. &amp;quot;It doesn&amp;#39;t matter if you&amp;#39;re building the next SaaS CRM application, a phone app to manage your kids&amp;#39; soccer games, or malware that&amp;#39;s intended to steal money or do espionage. Anyone developing any kind of code is thinking about how to use an AI assistant to do that.&amp;quot; ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>AWS would prefer to forget March in UAE region • The Register</title>
<link>https://www.theregister.com/2026/03/26/aws_would_prefer_to_forget/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2026/03/26/see-no-evil.jpg"></enclosure>
<guid isPermaLink="false">S2pzBYqIhm_fgTZ6Uowxds70nSe2Cw0tTLo1kw==</guid>
<pubDate>Wed, 22 Apr 2026 21:15:02 +0000</pubDate>
<description>: Cloud giant waives an entire month of charges, then erases the billing data. There is literally nothing to see here.</description>
<content:encoded>&lt;p&gt;I received an email / billing notification from AWS this week that may be the most diplomatically crafted communication in the history of cloud computing. Here it is, stripped of the usual boilerplate around it:&lt;/p&gt;&lt;p&gt;&amp;quot;AWS is waiving all usage-related charges in the ME-CENTRAL-1 Region for March 2026. This waiver applies automatically to your account(s), and no action is required from you.&amp;quot;&lt;/p&gt;&lt;p&gt;No explanation. No mention of the &lt;a href=&quot;https://www.theregister.com/2026/03/02/amazon_outages_middle_east/&quot;&gt;Iranian drone strikes&lt;/a&gt; that physically destroyed two of three availability zones in the region on March 1st. No reference to the 109 services that went down, nor the customers who spent weeks unable to terminate EC2 instances via the console because the control plane was as dead as the hardware underneath it. No acknowledgment that an entire month of cloud infrastructure effectively ceased to exist. Not even a link to their remarkably short (presumably because it wasn&amp;#39;t &lt;a href=&quot;https://www.lastweekinaws.com/blog/2-ways-to-correct-the-financial-times-at-aws-so-far/&quot;&gt;insulting the Financial Times&amp;#39; reporting&lt;/a&gt;) &lt;a href=&quot;https://www.aboutamazon.com/news/aws-bahrain-region-middle-east-conflict&quot;&gt;corporate blog post&lt;/a&gt; explaining that you probably shouldn&amp;#39;t expect that region to be working reliably again any time soon.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;Just: we&amp;#39;re waiving the charges. You&amp;#39;re welcome. Move along.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;I want to be clear: I have no problem with this. It&amp;#39;s a tough situation, and it&amp;#39;s not AWS&amp;#39; fault, given that there is not yet an Amazon standing military force.&lt;/p&gt;&lt;p&gt;But here&amp;#39;s the part that caught my attention. The email continues: &amp;quot;You will not see any March 2026 usage for the ME-CENTRAL-1 Region in your Cost and Usage Report or Cost Explorer once processing is complete.&amp;quot;&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;They&amp;#39;re not just waiving customer charges for a month; they&amp;#39;re erasing the billing and inventory data!&lt;/p&gt;&lt;h3&gt;The bill is the only inventory you&amp;#39;ve got&lt;/h3&gt;&lt;p&gt;For most organizations, the AWS bill isn&amp;#39;t just an invoice. It&amp;#39;s the canonical record of what infrastructure exists, where it&amp;#39;s running, and how long it&amp;#39;s been there. The Cost and Usage Report (CUR) is the closest thing many companies have to a single source of truth that accurately describes their cloud footprint. Even the relatively-recently-launched &lt;a href=&quot;https://aws.amazon.com/resourceexplorer/&quot;&gt;AWS Resource Explorer&lt;/a&gt;, which purports to be an inventory service, is missing some key resource types. The one thing that lists everything remains the AWS bill; a single source of truth around what the hell&amp;#39;s living in your cloud environment.&lt;/p&gt;&lt;p&gt;Compliance teams rely on it. Auditors request it. FinOps teams build their entire practice on it. When your security team wants to know if you had resources running in the Middle East in March beyond what CloudTrail says, they&amp;#39;ll check the CUR. And as of March 31st, when they ask Amazon’s answer will be: No. You didn&amp;#39;t. Nothing was there. A clean, empty month.&lt;/p&gt;&lt;p&gt;The infrastructure existed, kinda. It ran, or at least it sure tried to. Customers were billed for resources they couldn&amp;#39;t turn off because the API was unreachable, because nothing works properly when you have two of three availability zones non-responsive or flat out destroyed. And now the record of all of that is being zeroed out.&lt;/p&gt;&lt;h3&gt;In fairness, nobody plans for this&lt;/h3&gt;&lt;p&gt;Before anyone starts composing their &amp;quot;AWS should have been prepared for this&amp;quot; hot take: No. Stop.&lt;/p&gt;&lt;p&gt;AWS engineers availability zones for certain classes of failure. Hardware dies, power goes out, a fiber gets cut by its natural predator &amp;quot;The Mighty Backhoe,&amp;quot; a cooling system fails, or the like? AZs handle these. They&amp;#39;re designed so that a problem in one zone doesn&amp;#39;t cascade to another. That model works. It&amp;#39;s been tested repeatedly. It&amp;#39;s the backbone of every well-architected deployment on AWS. Know it or not, virtually every AWS customer&amp;#39;s data recovery strategy depends upon this being true.&lt;/p&gt;&lt;p&gt;AZs are not designed for a state actor deciding the data center shouldn&amp;#39;t exist anymore.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;Nobody&amp;#39;s fault-tree analysis includes &amp;quot;building hit by military drone.&amp;quot; No disaster recovery runbook in the world has a section titled &amp;quot;Regional Armed Conflict.&amp;quot;&lt;/p&gt;&lt;p&gt;And honestly? It shouldn&amp;#39;t. Try putting that into your company data recovery plan, and you&amp;#39;ll get uninvited from business continuity planning faster than I was at investment firm BlackRock when I pointed out that if both San Francisco and us-east-1 were unavailable, absolutely nobody was going to care about our roboadvisor for the foreseeable future, if ever. (I can&amp;#39;t imagine why I was let go from that job.) The entire premise of cloud infrastructure is that you&amp;#39;re renting capacity from someone who handles the physical concerns so you can focus on your software. That contract didn&amp;#39;t account for the data center becoming a military target, and it&amp;#39;s hard to blame anyone this side of the Pentagon for not having that particular item on the risk register.&lt;/p&gt;&lt;p&gt;So why erase the data?&lt;/p&gt;&lt;p&gt;I can think of two explanations, and they&amp;#39;re not mutually exclusive.&lt;/p&gt;&lt;p&gt;First, the data might not exist to provide. When multiple AZs go offline because the physical hardware is melted and TLS now terminates &amp;quot;on the floor,&amp;quot; the metering and billing infrastructure goes with it. You can&amp;#39;t generate a usage report for resources running on servers that no longer have power, or physical cohesion. AWS may genuinely not have reliable telemetry for what was running, what stopped, and when. You can&amp;#39;t charge for what you can&amp;#39;t measure – and you can&amp;#39;t report what you didn&amp;#39;t record.&lt;/p&gt;&lt;p&gt;Second, pragmatism. Customers couldn&amp;#39;t terminate resources with the AWS console because termination commands require acknowledgement; they&amp;#39;re not hurled over the fence like a dead dog for your neighbor to worry about. EC2 instances were stuck in stopped states for weeks. Elastic IPs were trapped on dead hardware. If AWS had tried to bill normally and then process refunds, it would have meant thousands upon thousands of individual support tickets, each one a paper trail documenting precisely what failed and when. Life would have become absolute hell for the hardworking folks at AWS Support. A blanket waiver with a clean data slate is operationally simpler and diplomatically tidier in a single move.&lt;/p&gt;&lt;p&gt;I suspect it&amp;#39;s both.&lt;/p&gt;&lt;h3&gt;The precedent is the point&lt;/h3&gt;&lt;p&gt;Whatever the underlying reason, AWS made the right call. Customers shouldn&amp;#39;t pay for resources they couldn&amp;#39;t control in a region that was physically destroyed by military action. The waiver is the correct outcome.&lt;/p&gt;&lt;p&gt;But.&lt;/p&gt;&lt;p&gt;The mechanism now exists, and it&amp;#39;s been exercised. AWS can zero out an entire month of usage data across a region, and the result is indistinguishable from that month never happening. The bill, the one canonical source of truth, simply won&amp;#39;t show it.&lt;/p&gt;&lt;p&gt;Today the reason is a war, and it&amp;#39;s a good reason. But precedents don&amp;#39;t come with permanent context attached. The next time a month of data goes missing from CUR, will there be an email? Will there be an explanation? Will there be a *reason* you&amp;#39;d accept?&lt;/p&gt;&lt;p&gt;I don&amp;#39;t know. AWS isn&amp;#39;t saying. They probably can&amp;#39;t say much. And after March 31st, the data won&amp;#39;t be saying anything either.&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Meta staff protest surveillance software on work PCs • The Register</title>
<link>https://www.theregister.com/2026/04/22/meta_employee_surveillance_software/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2025/08/28/shutterstock_surprised_man.jpg"></enclosure>
<guid isPermaLink="false">R_o6yk48wVECdHodzlm63L42cqp1ucwCrrWWDw==</guid>
<pubDate>Wed, 22 Apr 2026 12:47:29 +0000</pubDate>
<description>: Zuck reportedly needs to capture workers’ keystrokes to build AI</description>
<content:encoded>&lt;p&gt;Meta, the company built on watching everything its billions of users do online so it can keep them clicking on ragebait and targeted ads, is reportedly now installing surveillance software on employees’ work computers.&lt;/p&gt;&lt;p&gt;Newswire &lt;a href=&quot;https://www.itnews.com.au/news/meta-to-start-capturing-employee-mouse-movements-keystrokes-625249&quot;&gt;Reuters&lt;/a&gt; reports that Meta management sent staff a memo informing them that they’ll soon run a new tool called “Model Capability Initiative” that will record their keystrokes, mouse movements, and even take occasional screenshots – all in the name of gathering data the social networking giant can use to build better AI models.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.businessinsider.com/meta-new-ai-tool-tracks-staff-activity-sparks-concern-2026-4&quot;&gt;Business Insider&lt;/a&gt; claims it’s got the memo, which apparently says surveillance will observe workers as they use “work-related applications and URLs” including Gmail, GChat, VCCode, and an internal app called “Metamate”.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;The document reportedly explains that Meta feels AI models don’t understand how people use computers, so the company needs real-life examples of how meatbags click their way through a working day so it can build agents. CTO Andrew Bosworth apparently said collecting this data from Meta staff will help the company to realize a vision for a world “where our agents primarily do the work and our role is to direct, review and help them improve.”&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Meta is not alone in pursuing such a vision: Anthropic debuted tech capable of doing this &lt;a href=&quot;https://www.theregister.com/2024/10/24/anthropic_claude_model_can_use_computers/&quot;&gt;in 2024&lt;/a&gt; and OpenAI last year announced &lt;a href=&quot;https://www.theregister.com/2025/01/23/openai_unveils_operator_agent/&quot;&gt;“Operator”&lt;/a&gt; – a tool that can use a web browser on a human’s behalf.&lt;/p&gt;&lt;p&gt;Microsoft has even created a &lt;a href=&quot;https://www.theregister.com/2025/11/19/microsoft_virtual_pc_update/&quot;&gt;special type of cloud PC&lt;/a&gt; for agents to use.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;All imagine that in the not-too-distant future many of us will designate some tasks that we currently undertake with our own brains and fingers on a physical PC to an agent that uses a virtual PC. AI folk imagine asking an agent to book an airfare, respond to email, or constantly scan e-tail sites to spot a discount for a desired item and then swoop in to make a purchase.&lt;/p&gt;&lt;p&gt;Meta’s term for this sort of thing is a &lt;a href=&quot;https://www.meta.com/superintelligence/&quot;&gt;“personal superintelligence”&lt;/a&gt; that CEO-for-life Mark Zuckerberg says “helps you achieve your goals, create what you want to see in the world, experience any adventure, be a better friend to those you care about, and grow to become the person you aspire to be.”&lt;/p&gt;&lt;p&gt;So long as your goals and aspirations don’t include workplace privacy.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;This situation is replete with irony, given Meta has for years mined its users for information and often &lt;a href=&quot;https://www.theregister.com/2023/05/18/meta_facing_third_gdpr_fine/&quot;&gt;run&lt;/a&gt; &lt;a href=&quot;https://www.theregister.com/2023/11/11/meta_youtube_criminal_charges/&quot;&gt;afoul&lt;/a&gt; of privacy laws.&lt;/p&gt;&lt;p&gt;Now the company’s &lt;a href=&quot;https://www.theregister.com/2026/03/25/meta_cuts_700/&quot;&gt;remaining staff&lt;/a&gt; can get a taste of the unease users have felt for years. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>AI-authored code needs more attention, contains worse bugs • The Register</title>
<link>https://www.theregister.com/2025/12/17/ai_code_bugs/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2016/10/06/ai.jpg"></enclosure>
<guid isPermaLink="false">lRSbyzH5wSnZl80nrr6OOyl3L4Z2zc8U9grH5g==</guid>
<pubDate>Wed, 22 Apr 2026 09:02:30 +0000</pubDate>
<description>: CodeRabbit review of pull requests shows meatbags beat clankers</description>
<content:encoded>&lt;p&gt;Generating code using AI increases the number of issues that need to be reviewed and the severity of those issues.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.coderabbit.ai/&quot;&gt;CodeRabbit&lt;/a&gt;, an AI-based code review platform, made that determination by looking at 470 open source pull requests for its State of AI vs Human Code Generation report.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.coderabbit.ai/whitepapers/state-of-AI-vs-human-code-generation-report&quot;&gt;The report&lt;/a&gt; finds that AI-generated code contains significantly more defects of logic, maintainability, security, and performance than code created by people.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;On average, AI-generated pull requests (PRs) include about 10.83 issues each, compared with 6.45 issues in human-generated PRs. That&amp;#39;s about 1.7x more when AI is involved, meaning longer code reviews and increased risk of defects.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Problems caused by AI-generated PRs also tend to be more severe than human-made messes. AI-authored PRs contain 1.4x more critical issues and 1.7x more major issues on average than human-written PRs, the report says.&lt;/p&gt;&lt;p&gt;Machine-generated code therefore seems to require reviewers to deal with a large volume of issues that are more severe than those present in human-generated code.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;These findings echo a report issued last month by Cortex, maker of an AI developer portal. The company&amp;#39;s &lt;a href=&quot;https://go.cortex.io/rs/563-WJM-722/images/2026-Benchmark-Report.pdf?version=0&quot;&gt;Engineering in the Age of AI: 2026 Benchmark Report&lt;/a&gt; [PDF] found that PRs per author increased 20 percent year-over-year even as incidents per pull request increased by 23.5 percent, and change failure rates rose around 30 percent.&lt;/p&gt;&lt;p&gt;The CodeRabbit report found that AI-generated code falls short of meatbag-made code across the major issue categories. The bots created more logic and correctness errors (1.75x), more code quality and maintainability errors (1.64x), more security findings (1.57x), and more performance issues (1.42x).&lt;/p&gt;&lt;p&gt;In terms of specific security concerns, AI-generated code was 1.88x more likely to introduce improper password handling, 1.91x more likely to make insecure object references, 2.74x more likely to add XSS vulnerabilities, and 1.82x more likely to implement insecure deserialization than human devs.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;One area where AI outshone people was spelling – spelling errors were 1.76x more common in human PRs than machine-generated ones. Also, human-authored code had 1.32x more testability issues than AI stuff.&lt;/p&gt;&lt;p&gt;&amp;quot;These findings reinforce what many engineering teams have sensed throughout 2025,&amp;quot; said David Loker, director of AI at CodeRabbit, in a statement. &amp;quot;AI coding tools dramatically increase output, but they also introduce predictable, measurable weaknesses that organizations must actively mitigate.&amp;quot;&lt;/p&gt;&lt;p&gt;CodeRabbit cautions that its methodology has limitations, such as its inability to be certain that PRs labeled as human-authored actually were exclusively authored by humans.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/12/16/chrome_edge_privacy_extensions_quietly/&quot;&gt;Browser &amp;#39;privacy&amp;#39; extensions have eye on your AI, log all your chats&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/12/16/mozilla_corporation_new_ceo/&quot;&gt;Mozilla Corporation installs Firefox driver in CEO reboot&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/12/16/mi6_chief_well_be_as/&quot;&gt;MI6 chief: We&amp;#39;ll be as fluent in Python as we are in Russian&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/12/15/salesforce_ai_monetization/&quot;&gt;Salesforce willing to lose money on AI agent licenses when customers are locked in&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Other studies based on different data have come to different conclusions.&lt;/p&gt;&lt;p&gt;For example, an August 2025 &lt;a href=&quot;https://arxiv.org/abs/2508.21634&quot;&gt;paper&lt;/a&gt; by University of Naples researchers, &amp;quot;Human-Written vs. AI-Generated Code: A Large-Scale Study of Defects, Vulnerabilities, and Complexity,&amp;quot; found that AI-generated Python and Java code &amp;quot;is generally simpler and more repetitive, yet more prone to unused constructs and hardcoded debugging, while human-written code exhibits greater structural complexity and a higher concentration of maintainability issues.&amp;quot;&lt;/p&gt;&lt;p&gt;Back in January 2025, researchers from Monash University (Australia) and University of Otago (New Zealand) published &lt;a href=&quot;https://arxiv.org/html/2501.16857v1&quot;&gt;a paper&lt;/a&gt; titled &amp;quot;Comparing Human and LLM Generated Code: The Jury is Still Out!&amp;quot;&lt;/p&gt;&lt;p&gt;&amp;quot;Our results show that although GPT-4 is capable of producing coding solutions, it frequently produces more complex code that may need more reworking to ensure maintainability,&amp;quot; the southern hemisphere boffins wrote. &amp;quot;On the contrary, however, our outcomes show that a higher number of test cases passed for code generated by GPT-4 across a range of tasks than code that was generated by humans.&amp;quot;&lt;/p&gt;&lt;p&gt;As to the impact of AI tools on developer productivity, researchers from Model Evaluation &amp;amp; Threat Research (METR) &lt;a href=&quot;https://arxiv.org/abs/2507.09089&quot;&gt;reported&lt;/a&gt; in July that &amp;quot;AI tooling slowed developers down.&amp;quot;&lt;/p&gt;&lt;p&gt;Your mileage may vary.&lt;/p&gt;&lt;p&gt;We note that Microsoft patched 1,139 CVEs in 2025, according to Trend Micro researcher Dustin Childs, who claims that&amp;#39;s the second-largest year for CVEs by volume after 2020.&lt;/p&gt;&lt;p&gt;Microsoft says &lt;a href=&quot;https://www.theregister.com/2025/04/30/microsoft_meta_autocoding/&quot;&gt;30 percent of code in certain repos was written by AI&lt;/a&gt; and Copilot Actions comes with &lt;a href=&quot;https://support.microsoft.com/en-us/windows/experimental-agentic-features-a25ede8a-e4c2-4841-85a8-44839191dfb3&quot;&gt;a caution&lt;/a&gt; about &amp;quot;the security implications of enabling an agent on your computer.&amp;quot;&lt;/p&gt;&lt;p&gt;&amp;quot;As Microsoft&amp;#39;s portfolio continues to increase and as AI bugs become more prevalent, this number is likely to go higher in 2026,&amp;quot; Childs &lt;a href=&quot;https://www.zerodayinitiative.com/blog/2025/12/9/the-december-2025-security-update-review&quot;&gt;wrote&lt;/a&gt; in his post.&lt;/p&gt;&lt;p&gt;But at least we can expect fewer typos in code comments. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>UK&#39;s corporate registry fixes data exposing technical error • The Register</title>
<link>https://www.theregister.com/2026/03/16/companies_house_breach/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2026/03/16/companies_house_press_image_search_the_register.jpg"></enclosure>
<guid isPermaLink="false">DY8AEbVJYhF5GS-CG1fKU8Jch7Uo9umTkgkJaA==</guid>
<pubDate>Sat, 18 Apr 2026 23:18:57 +0000</pubDate>
<description>: Back button blunder in WebFiling service run by Companies House revealed confidential paperwork</description>
<content:encoded>&lt;p&gt;Companies House was forced to pull down its record-filing platform for the entire weekend to rectify a &amp;quot;security issue&amp;quot; that exposed the personal details of company directors and other data to any logged in users.&lt;/p&gt;&lt;p&gt;The government agency, which manages the UK&amp;#39;s register of all businesses and their directors, temporarily shut down its WebFiling service on March 13 at 13.30 UTC following reports that hidden company details could be seen and modified.&lt;/p&gt;&lt;p&gt;In a statement, it confirmed techies resolved the flaw on and WebFiling was online again from 09.00 today.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;While the mishap allowed directors to read and change hidden data belonging to other companies, in theory any individual could have created a company on the platform and abused the flaw.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;&amp;quot;Our investigation has established that specific data from individual companies not normally published on the Companies House register may have been visible to other logged-in WebFiling users,&amp;quot; Companies House CEO Andy King &lt;a href=&quot;https://www.gov.uk/government/news/update-on-companies-house-webfiling-security-issue&quot;&gt;said on Monday&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;&amp;quot;This includes dates of birth, residential addresses, and company email addresses. It may also have been possible for unauthorized filings – such as accounts or changes of director – to have been made on another company&amp;#39;s record.&amp;quot;&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;King said passwords were not among the types of data accessible by other users, nor were documents related to identity verification, such as passports. &amp;quot;No existing filed documents, such as accounts or confirmation statements could have been altered.&lt;/p&gt;&lt;p&gt;&amp;quot;We believe that this issue could not have been used to extract data in large volumes or to access records systematically,&amp;quot; he added. &amp;quot;Any access would have been limited to individual company records, viewed one at a time by a registered WebFiling user.&amp;quot;&lt;/p&gt;&lt;p&gt;An internal investigation revealed that changes made to the WebFiling platform in October 2025 introduced the unexpected behavior, but attention was first drawn to it on March 13 by tax professional Dan Neidle.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;The founder of Tax Policy Associates published &lt;a href=&quot;https://x.com/DanNeidle/status/2032506756786511908&quot;&gt;a video&lt;/a&gt; on social media depicting how the flaw could be abused to access other companies&amp;#39; data.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/15/telus_breach_starbucks_attack/&quot;&gt;Outsourcer Telus admits to attack – may have lost a petabyte of data to ShinyHunters&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/13/vpn_clients_spoofed/&quot;&gt;Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/13/interpol_operation_synergia/&quot;&gt;Interpol cybercrime crackdown leads to 94 arrests, 45,000 IP takedowns&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/13/google_zeroday_chrome_update/&quot;&gt;Google rushes Chrome update fixing two zero-days already under attack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Neidle said he was made aware of the flaw by John Hewitt, director of operations at Ghost Mail, and he then informed Companies House immediately.&lt;/p&gt;&lt;p&gt;Now fixed, a logged-in company director could exploit the flaw by starting from their own dashboard and then trying to log into another company&amp;#39;s account.&lt;/p&gt;&lt;p&gt;Once they reach the &lt;a href=&quot;https://www.theregister.com/2025/03/26/ncsc_influencers_2fa/&quot;&gt;2FA&lt;/a&gt; block, which they would not be able to pass, all that was required was to click the browser&amp;#39;s back button a few times. Typically, the user would be taken back to their own dashboard, but the bug instead returned them to the company they had tried to log into but couldn&amp;#39;t.&lt;/p&gt;&lt;p&gt;Companies House said it reported the incident to the &lt;a href=&quot;https://www.theregister.com/2026/02/24/ico_fines_reddit/&quot;&gt;Information Commissioner&amp;#39;s Office&lt;/a&gt; and &lt;a href=&quot;https://www.theregister.com/2026/01/19/dont_underestimate_prorussia_hacktivists_warns/&quot;&gt;National Cyber Security Centre&lt;/a&gt;, and continues to investigate whether the flaw was abused for real since October.&lt;/p&gt;&lt;p&gt;&amp;quot;If we find evidence that anyone has used this issue to access or change another company&amp;#39;s details without authorization, we will take firm action,&amp;quot; said King.&lt;/p&gt;&lt;p&gt;&amp;quot;I recognize that this incident will have caused concern and inconvenience to many of the companies and individuals who rely on our services. I am sorry for that.&lt;/p&gt;&lt;p&gt;&amp;quot;Companies House takes its responsibility to protect the data entrusted to us extremely seriously. We have taken swift action to secure and restore our service, and are committed to doing everything in our power to support those affected and to make sure that our services continue to merit the trust placed in them.&amp;quot; ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Claude Opus wrote a Chrome exploit for $2,283 • The Register</title>
<link>https://www.theregister.com/2026/04/17/claude_opus_wrote_chrome_exploit/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2015/04/07/awsnap.png"></enclosure>
<guid isPermaLink="false">VV7qtxMIHwPqyUSxL9oA5ba1Wp9-qX26Q9UhBQ==</guid>
<pubDate>Sat, 18 Apr 2026 11:45:45 +0000</pubDate>
<description>: Pause your Mythos panic because mainstream models anyone can use already pick holes in popular software</description>
<content:encoded>&lt;p&gt;Anthropic withheld its &lt;a href=&quot;https://www.theregister.com/2026/04/07/anthropic_all_your_zerodays_are_belong_to_us/&quot;&gt;Mythos&lt;/a&gt; bug-finding model from public release due to concerns that it would enable attackers to find and exploit vulnerabilities before anyone could react.&lt;/p&gt;&lt;p&gt;But the company&amp;#39;s Opus 4.6 model, already superseded by the &lt;a href=&quot;https://www.anthropic.com/news/claude-opus-4-7&quot;&gt;release of Opus 4.7&lt;/a&gt; on Thursday, is capable of developing functional exploit code.&lt;/p&gt;&lt;p&gt;In a &lt;a href=&quot;https://www.hacktron.ai/blog/i-let-claude-opus-to-write-me-a-chrome-exploit&quot;&gt;blog post&lt;/a&gt; on Wednesday, Mohan Pedhapati (s1r1us), CTO of Hacktron, described how he used Opus 4.6 to create a full exploit chain targeting the V8 JavaScript engine in Chrome 138, which is bundled into current versions of Discord.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;&amp;quot;The &lt;a href=&quot;https://access.redhat.com/security/cve/cve-2026-5873&quot;&gt;V8 [out of bounds error]&lt;/a&gt; we used was from Chrome 146, the same version Anthropic&amp;#39;s own Claude Desktop is running,&amp;quot; he said. &amp;quot;A week of back and forth, 2.3 billion tokens, $2,283 in API costs, and about ~20 hours of me unsticking it from dead ends. It popped calc.&amp;quot;&lt;/p&gt;&lt;blockquote&gt;

&lt;p&gt;Eventually, any script kiddie with enough patience and an API key will be able to pop shells&lt;/p&gt;
&lt;/blockquote&gt;&lt;p&gt;“Popped calc” is a reference to opening the calculator app – an event commonly used in proof-of-concept exploit code to indicate that an attack compromised the target system.&lt;/p&gt;&lt;p&gt;Pedhapati said that while $2,283 is a significant sum for an individual to pay, it&amp;#39;s very little if you consider the weeks it would take a person to develop a similar exploit without assistance. Even if you added several thousand dollars for Pedhapati&amp;#39;s time tending the model, that&amp;#39;s still significantly less the theoretical reward (~$15,000) one might get from Google&amp;#39;s and Discord&amp;#39;s vulnerability reward programs. And that&amp;#39;s just the legitimate market – who knows what criminals might pay for a hot 0-day?.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;According to the Opus 4.7 System Card, &amp;quot;Opus 4.7 is roughly similar to Opus 4.6 in cyber capabilities.&amp;quot; But it&amp;#39;s apparently less capable than Mythos Preview and comes with &amp;quot;safeguards that automatically detect and block requests that indicate prohibited or high-risk cybersecurity uses.&amp;quot;&lt;/p&gt;&lt;p&gt;But for Pedhapati, the specific model isn&amp;#39;t the issue. Rather, it&amp;#39;s ongoing improvements in code generation that demand a change of security posture and procedure.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/16/google_chrome_lacks_browser_fingerprinting/&quot;&gt;Google Chrome lacks protection against one of the most basic and common ways to track users online&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/16/visual_studio_185/&quot;&gt;Visual Studio 18.5 lands with AI debugging at a price, devs still feeling blue&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/16/anthropic_ejects_bundled_tokens_enterprise/&quot;&gt;Anthropic squeezes enterprises by ejecting bundled tokens from seat deal&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/16/north_korea_social_engineering_macos/&quot;&gt;North Korea targets macOS users in latest heist&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&amp;quot;Whether Mythos is overhyped or not doesn&amp;#39;t matter,&amp;quot; said Pedhapati. &amp;quot;The curve isn&amp;#39;t flattening. If not Mythos, then the next version, or the one after that. Eventually, any script kiddie with enough patience and an API key will be able to pop shells on unpatched software. It&amp;#39;s a question of when, not if.&amp;quot;&lt;/p&gt;&lt;p&gt;For &lt;a href=&quot;https://www.electronjs.org/apps&quot;&gt;apps&lt;/a&gt; based on the Chrome-based Electron framework (e.g. Slack, Discord, etc.) the question is when will they update their codebase to the latest version, which is still behind the latest Google Chrome release.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;Electron &lt;a href=&quot;https://releases.electronjs.org/release/v41.2.1&quot;&gt;41.2.1&lt;/a&gt;, released on April 15, bundles Chrome 146.0.7680.188, just one version behind the desktop Google Chrome version (&lt;a href=&quot;https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html&quot;&gt;147.0.7727.101/102&lt;/a&gt;) released that day. But developers of Electron apps don&amp;#39;t necessarily update their dependencies and issue new versions immediately. And users don&amp;#39;t necessarily get those updates immediately.&lt;/p&gt;&lt;p&gt;Pedhapati said he picked Discord as a target because &amp;quot;It&amp;#39;s sitting on Chrome 138, nine major versions behind current.&amp;quot;&lt;/p&gt;&lt;p&gt;Pedhapati argues that as AI models become more capable of exploit development, the patch window gets smaller.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;&amp;quot;Every patch is basically an exploit hint,&amp;quot; he argues, adding that this will be particularly difficult for open source projects, because fixes often become publicly visible in code before the revised version gets released.&lt;/p&gt;&lt;p&gt;His advice to developers is to focus more on security before code gets pushed and to pay closer attention to dependencies, so changes can be made quickly. He also argues that security patches should be done automatically, so people aren&amp;#39;t left vulnerable because they forgot to accept an update. And he says open source projects like V8 use more caution in terms of when the public vulnerability details.&lt;/p&gt;&lt;p&gt;&amp;quot;Every public commit is a starting gun for anyone with an API key and strong team members who can weaponize exploits,&amp;quot; he said. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Claude devs complain about surprise usage limits • The Register</title>
<link>https://www.theregister.com/2026/01/05/claude_devs_usage_limits/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2025/10/30/shutterstock_2568495377.jpg"></enclosure>
<guid isPermaLink="false">GaCRYxAiip6vinIJVSaGVnZyeuPmSUotXAUqSA==</guid>
<pubDate>Sat, 18 Apr 2026 10:14:59 +0000</pubDate>
<description>: Holiday hangover?</description>
<content:encoded>&lt;p&gt;Software developers who use Anthropic&amp;#39;s Claude Code have been sounding the alarm for the past few days about changes in the AI service&amp;#39;s usage limits.&lt;/p&gt;&lt;p&gt;Some customers have objected to the rapid consumption of their token allotment in the company&amp;#39;s Discord channel, and they claim that their criticism has been silenced by channel moderators.&lt;/p&gt;&lt;p&gt;Anthropic insists the issue follows from the expiration of a holiday usage bonus and that the company doesn&amp;#39;t try to limit discussion of usage limits – the implication being that any Discord bans follow from community policy violations.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;An Anthropic customer and forum user who asked not to be identified provided &lt;em&gt;The Register&lt;/em&gt; with screenshots of various Discord interactions and offered his assessment of the issue. He claims that there&amp;#39;s been a roughly 60 percent reduction in token usage limits, based on a token-level analysis of Claude Code logs. He speculates that the changes represent an attempt to reduce costs prior to Anthropic&amp;#39;s &lt;a href=&quot;https://www.economist.com/business/2025/12/16/spacex-openai-anthropic-and-their-giga-ipo-dreams&quot;&gt;expected public stock offering&lt;/a&gt;, a claim Anthropic flatly denies.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Evidence of concern among developers using Claude Code and other Claude services has surfaced on Reddit, where a recent &lt;a href=&quot;https://www.reddit.com/r/ClaudeCode/comments/1q2xt1y/claude_usage_consumption_has_suddenly_become/&quot;&gt;post&lt;/a&gt; claims &amp;quot;Claude usage consumption has suddenly become unreasonable.&amp;quot;&lt;/p&gt;&lt;p&gt;Numerous participants in that discussion argue that model interactions now consume more tokens than they did previously, which results in the account usage limits being reached sooner. &lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;Other &lt;a href=&quot;https://www.reddit.com/r/ClaudeCode/comments/1q4qjz0/anyone_else_getting_blocked_out_of_sonnet_usage/&quot;&gt;Reddit&lt;/a&gt; &lt;a href=&quot;https://www.reddit.com/r/ClaudeCode/comments/1q4s1wz/anyone_finding_claude_code_weekly_limit_shrinking/&quot;&gt;threads&lt;/a&gt; raise similar concerns. The Claude Developers Discord channel also includes &lt;a href=&quot;https://discord.com/channels/1072196207201501266/1354425630011166830/1457573378650276027&quot;&gt;a post&lt;/a&gt; from a developer claiming to have run out of token capacity on an enterprise account. &lt;/p&gt;&lt;p&gt;A current &lt;a href=&quot;https://discord.com/channels/1072196207201501266/1456791575257682033/1456791777829978301&quot;&gt;thread&lt;/a&gt; posted by &amp;quot;David,&amp;quot; an admin for Anthropic&amp;#39;s Claude Developers Discord channel, asks forum participants to post their rate limit concerns, promising an investigation into reports of inconsistent usage limits.&lt;/p&gt;&lt;p&gt;Forum participant &amp;quot;A A Ron&amp;quot; &lt;a href=&quot;https://discord.com/channels/1072196207201501266/1456791575257682033/1457056637964517387&quot;&gt;responded&lt;/a&gt;: &lt;/p&gt;&lt;blockquote&gt;I limited out very fast this morning w/out even writing code - just reviewing markdown specs. Felt very unusual - came here to see if others were reporting. I can&amp;#39;t submit my account info to the PM request you posted as I don&amp;#39;t have permission. Unfortunately my analytics in the console are all blank – which makes it really hard to validate whether this is on my end or not. Max plan user and historically I would only limit out occasionally – this am it was within an hour with very light (weekend slow review of a few docs) usage.&lt;/blockquote&gt;&lt;p&gt;Others echo those remarks. A separate &lt;a href=&quot;https://discord.com/channels/1072196207201501266/1354425630011166830/1457822546769608777&quot;&gt;post&lt;/a&gt; in the #claude-code-lounge channel this morning begins, &amp;quot;I am a Claude Pro/Max subscriber experiencing severely restrictive usage limits that make the service unusable for development work. Despite having an active Pro plan, I consistently hit usage limits within 10–15 minutes of using Sonnet, with the usage bar showing near 100 percent consumption. Opus is even more limited, often becoming unavailable shortly after starting.&amp;quot;&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/02/brow6el_browser_terminal/&quot;&gt;Finally - a terminal solution to the browser wars&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/05/starlink_free_service_venezuela/&quot;&gt;Venezuela loses president, but gains empty Starlink internet offer&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/03/claude_copilot_rue_steve_klabnik/&quot;&gt;Claude is his copilot: Rust veteran designs new Rue programming language with help from AI bot&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/02/microsoft_ceo_satya_nadella_calls/&quot;&gt;Microsoft CEO Satya Nadella becomes AI influencer, asks us all to move beyond slop&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;It&amp;#39;s worth noting that complaints about token usage limits have been around for many months. &lt;a href=&quot;https://discord.com/channels/1072196207201501266/1425926463269634209&quot;&gt;A mega-thread&lt;/a&gt; in the Discord channel dating back to October 9, 2025, offers a record of the discontent.&lt;/p&gt;&lt;p&gt;Anthropic offers three individual subscription plans: &lt;a href=&quot;https://support.claude.com/en/articles/8602283-about-free-claude-usage&quot;&gt;Free&lt;/a&gt;, &lt;a href=&quot;https://support.claude.com/en/articles/8324991-about-claude-s-pro-plan-usage&quot;&gt;Pro&lt;/a&gt; ($20/month), and &lt;a href=&quot;https://support.claude.com/en/articles/11014257-about-claude-s-max-plan-usage&quot;&gt;Max&lt;/a&gt; ($100 or $200 per month), each with its own usage limits. The Pro plan promises 5x the usage allowed for the Free plan; the Max plan promises either 5x or 20x the usage of the Pro plan.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;There are also two business subscription plans – Team ($25/$150 per seat/month) and Enterprise (not publicly disclosed but &lt;a href=&quot;https://www.reddit.com/r/ClaudeAI/comments/1fewpkh/claude_enterprise_plan_50k_annual_70_users/&quot;&gt;said&lt;/a&gt; to be $60 per seat with a minimum of 70 seats per month). &lt;a href=&quot;https://support.claude.com/en/articles/9266767-what-is-the-team-plan&quot;&gt;Team usage&lt;/a&gt; is &amp;quot;more&amp;quot; than the Pro plan. &lt;a href=&quot;https://support.claude.com/en/articles/9797531-what-is-the-enterprise-plan&quot;&gt;Enterprise limits&lt;/a&gt; aren&amp;#39;t specified.&lt;/p&gt;&lt;p&gt;&lt;em&gt;The Register&lt;/em&gt; spoke with an Anthropic representative who dismissed the claims about usage reductions as unfounded and suggested customers are simply reacting to the withdrawal of bonus usage awarded over the holidays.&lt;/p&gt;&lt;p&gt;During the period from December 25 through December 31, 2025, Anthropic &lt;a href=&quot;https://www.reddit.com/r/ClaudeAI/comments/1pupgpt/claude_is_giving_us_a_2x_usage_limit_until/&quot;&gt;doubled the customer usage limits&lt;/a&gt; of Claude models as a holiday gift. This was done, we&amp;#39;re told, to make use of idle compute capacity during that period, the result of vacationing enterprise customers.&lt;/p&gt;&lt;p&gt;Our source claims that removal of those higher limits has reduced usage allowances below their original baseline, but Anthropic says that&amp;#39;s incorrect. The concerns being raised, we&amp;#39;re told, appear to be largely a response to the resumption of normal limits.&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;https://www.reddit.com/r/ClaudeCode/comments/1q2xt1y/claude_usage_consumption_has_suddenly_become/&quot;&gt;One&lt;/a&gt; of the Reddit threads includes the suggestion that the heightened consumption of tokens follows from a Claude Code bug, detailed in &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/16157#issuecomment-3708187834&quot;&gt;a GitHub Issues post&lt;/a&gt;. Some users report that rolling Claude Code back to version 2.0.61 &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/16157#issuecomment-3707336961&quot;&gt;fixed the issue&lt;/a&gt;; others &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/16157#issuecomment-3707372478&quot;&gt;disagree&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;Anthropic&amp;#39;s representative said that its team takes all such reports seriously but hasn&amp;#39;t identified any flaw related to token usage. Last month, Anthropic looked into reports of problems with its Claude Opus 4.5 model and &lt;a href=&quot;https://x.com/trq212/status/2003558480897278363?s=20&quot;&gt;said&lt;/a&gt; it had ruled out bugs in its inference stack.&lt;/p&gt;&lt;p&gt;Nonetheless, &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/16270&quot;&gt;a bug report&lt;/a&gt; filed on Sunday, January 4, 2026, suggests there&amp;#39;s something amiss with the reversion of the pre-holiday usage limits. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>FBI confirms Zodiac Killer&#39;s 340 cipher solved by trio of amateur math and software codebreakers • The Register</title>
<link>https://www.theregister.com/2020/12/12/zodiac_killers_cipher_solved/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2015/10/23/enigma_teaser.jpg"></enclosure>
<guid isPermaLink="false">NwMAyeo1CU1DEVoF6Dcb5V0sk3MyrNizGQ-iTA==</guid>
<pubDate>Fri, 17 Apr 2026 20:06:05 +0000</pubDate>
<description>: Mysterious message, unread for 51 years, turns out to be a bit dull</description>
<content:encoded>&lt;p&gt;A team of code breakers has solved a cipher attributed to the Zodiac Killer, a serial murderer known for a Northern California killing spree in the late 1960s who has still not been identified or apprehended.&lt;/p&gt;&lt;p&gt;David Oranchak, a US-based software developer, Sam Blake, a mathematician based in Australia, and Jarl Van Eycke, a programmer based in Belgium, managed to crack Z340, a 340-character cipher that&amp;#39;s one of four such codes attributed to the Zodiac Killer.&lt;/p&gt;&lt;p&gt;Z340 was sent to The San Francisco Chronicle on November 8, 1969, and was provided to the FBI shortly thereafter. It remained unsolved for 51 years until Saturday, December 5th, 2020, when Oranchak, Blake, and Van Eycke submitted their solution to the US Federal Bureau of Investigation and had their solution validated.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;In a statement distributed via Twitter on Friday, the FBI &lt;a href=&quot;https://twitter.com/FBISanFrancisco/status/1337477701825925120?s=20&quot;&gt;confirmed&lt;/a&gt; the cipher had indeed been undone.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;&amp;quot;The FBI is aware that a cipher attributed to the Zodiac Killer was recently solved by private citizens,&amp;quot; the agency said, noting that the case remains an ongoing investigation for the FBI&amp;#39;s San Francisco division and that it would provide no further comment out of respect for the Zodiac&amp;#39;s victims.&lt;/p&gt;&lt;p&gt;In &lt;a href=&quot;https://www.youtube.com/watch?v=-1oQLPRE21o&quot;&gt;a video&lt;/a&gt; posted to YouTube, Oranchak explains how the trio worked together, using an app created by Van Eycke called &lt;a href=&quot;http://www.zodiackillersite.com/viewtopic.php?f=81&amp;amp;t=3198&quot;&gt;AZdecrypt&lt;/a&gt;, to break the code.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;&amp;quot;Sam [Blake] became interested in ways to do transpositions or manipulations of the 340,&amp;quot; Oranchak said. &amp;quot;It was assumed that Zodiac did something different to the message before assigning all the symbols and that could explain why the cipher was unsolved for so long. So we started doing a lot of experiments.&amp;quot;&lt;/p&gt;&lt;div&gt;&lt;img src=&quot;https://regmedia.co.uk/2020/04/04/handout_bletchley_park_pidgeon.jpg?x=174&amp;amp;y=115&amp;amp;crop=1&quot; alt=&quot;Horace ‘Pidge’ Pidgeon&quot; title=&quot;&quot;/&gt;
&lt;h2&gt;Watch: Rare Second World War footage of Bletchley Park-linked MI6 intelligence heroes emerges, shared online&lt;/h2&gt;
&lt;a href=&quot;https://www.theregister.com/2020/04/04/mi6_personnel_bletchley/&quot;&gt;&lt;span&gt;READ MORE&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;Blake, he said, created 650,000 variations of the ciphertext, arranged in different ways. The idea was that if Zodiac had rearranged the order of the symbols, these variations might prove helpful to figure out how the 63 unique symbols had been scrambled.&lt;/p&gt;&lt;p&gt;&amp;quot;I took all of Sam&amp;#39;s manipulations and ran them through Jarl [Van Eycke&amp;#39;s] AZdecrypt code breaking program,&amp;quot; Oranchak said. &amp;quot;The idea was to take Sam&amp;#39;s hundreds of thousands of variations of the 340 and try to get AZdecrypt to crack them. Maybe we&amp;#39;d stumble on something.&amp;quot;&lt;/p&gt;&lt;p&gt;On Thursday, December 3, 2020, the gibberish started making sense and the team finally managed to determine the order in which the symbols had to be read to retrieve a coherent message.&lt;/p&gt;&lt;div&gt;&lt;a href=&quot;https://regmedia.co.uk/2020/12/11/z340_image.jpg&quot;&gt;&lt;img src=&quot;https://regmedia.co.uk/2020/12/11/z340_image.jpg?x=648&amp;amp;y=362&amp;amp;infer_y=1&quot; alt=&quot;Zodiac Killer Z340 cipher image&quot; title=&quot;Zodiac Killer Z340 cipher image&quot;/&gt;&lt;/a&gt;
&lt;p&gt;Click to enlarge&lt;/p&gt;
&lt;/div&gt;&lt;div&gt;

&lt;p&gt;I HOPE YOU ARE HAVING LOTS OF FUN IN TRYING TO CATCH ME THAT WASNT ME ON THE TV SHOW WHICH BRINGS UP A POINT ABOUT ME I AM NOT AFRAID OF THE GAS CHAMBER BECAUSE IT WILL SEND ME TO PARADICE ALL THE SOONER BECAUSE I NOW HAVE ENOUGH SLAVES TO WORK FOR ME WHERE EVERYONE ELSE HAS NOTHING WHEN THEY REACH PARADICE SO THEY ARE AFRAID OF DEATH I AM NOT AFRAID BECAUSE I KNOW THAT MY NEW LIFE IS LIFE WILL BE AN EASY ONE IN PARADICE DEATH&lt;/p&gt;
&lt;/div&gt;&lt;p&gt;Oranchak said as the cipher&amp;#39;s secrets began to emerge, the references in the message to the TV show and the gas chamber convinced him that he was on the right track. As he notes in his video, the cipher was received about two weeks after someone claiming to be Zodiac had called into The Jim Dunbar Show, broadcast in the San Francisco Bay Area during that period.&lt;/p&gt;&lt;p&gt;The caller, Oranchak recalled, said he was sick and didn&amp;#39;t want to go to the gas chamber. Though the caller was ruled out as a suspect, the historical reference convinced Oranchak that the cipher&amp;#39;s message was consistent with the time it is believed to have been written.&lt;/p&gt;&lt;p&gt;&amp;quot;So it&amp;#39;s been a very exciting few days,&amp;quot; Oranchak concludes. &amp;quot;Fifty-one years after it was sent, Zodiac&amp;#39;s 340 character cipher has finally been solved. The message doesn&amp;#39;t really say a whole lot. It&amp;#39;s more of the same attention seeking junk from Zodiac.&amp;quot; ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>AI agents can&#39;t pull off fully autonomous cyberattacks – yet • The Register</title>
<link>https://www.theregister.com/2026/02/03/autonomous_cyberattacks_not_real_yet/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2015/06/24/dependency.jpg"></enclosure>
<guid isPermaLink="false">e0JaJcOsMzmKnIqUKAT_o2RXALeV4fBtbR73xA==</guid>
<pubDate>Thu, 16 Apr 2026 09:31:21 +0000</pubDate>
<description>: Don&#39;t relax: This is a &#39;when, not if&#39; scenario</description>
<content:encoded>&lt;p&gt;AI agents and other systems can&amp;#39;t yet conduct cyberattacks fully on their own – but they can help criminals in many stages of the attack chain, according to the International AI Safety report.&lt;/p&gt;&lt;p&gt;The second annual &lt;a href=&quot;https://internationalaisafetyreport.org/publication/international-ai-safety-report-2026#2.1.3.&quot;&gt;report&lt;/a&gt;, chaired by the Canadian computer scientist Yoshua Bengio and authored by more than 100 experts across 30 countries, found that over the past year, developers of AI systems have vastly improved their ability to help automate and perpetrate cyberattacks.&lt;/p&gt;&lt;p&gt;Perhaps the best, and scariest, evidence of that finding appeared in Anthropic&amp;#39;s November 2025 report about Chinese cyberspies &lt;a href=&quot;https://www.theregister.com/2025/11/13/chinese_spies_claude_attacks/&quot;&gt;abusing its Claude Code AI tool&lt;/a&gt; to automate most elements of attacks directed at around 30 high-profile companies and government organizations. Those attacks succeeded in &amp;quot;a small number of cases.&amp;quot;&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;&amp;quot;At least one real-world incident has involved the use of semi-autonomous cyber capabilities, with humans intervening only at critical decision points,&amp;quot; according to the AI safety report. &amp;quot;Fully autonomous end-to-end attacks, however, have not been reported.&amp;quot;&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Two areas where AI is especially useful to criminals are &lt;a href=&quot;https://www.theregister.com/2025/12/15/react2shell_flaw_china_iran/&quot;&gt;scanning for software vulnerabilities&lt;/a&gt; and &lt;a href=&quot;https://www.theregister.com/2026/01/08/criminals_vibe_coding_malware/&quot;&gt;writing malicious code&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;During &lt;a href=&quot;https://www.darpa.mil/research/programs/ai-cyber&quot;&gt;DARPA&amp;#39;s AI Cyber Challenge (AIxCC)&lt;/a&gt; – a two-year competition in which teams built AI models to find vulnerabilities in open source software that undergirds critical infrastructure – finalist systems autonomously identified &lt;a href=&quot;https://www.darpa.mil/news/2025/aixcc-results&quot;&gt;77 percent&lt;/a&gt; of the synthetic vulnerabilities used in the final scoring round, according to competition organizers.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;And while that is an example of defenders using AI to find and fix vulnerabilities, rather than attackers using AI to find and exploit them, criminals are using models in similar ways. Last northern summer, we saw attackers on underground forums &lt;a href=&quot;https://www.theregister.com/2025/09/03/hexstrike_ai_citrix_exploits/&quot;&gt;claiming to use HexStrike AI&lt;/a&gt;, an open-source red-teaming tool, to target critical vulnerabilities in Citrix NetScaler appliances within hours of the vendor disclosing the problems.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/08/criminals_vibe_coding_malware/&quot;&gt;Yes, criminals are using AI to vibe-code malware&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/23/ai_cyberattack_google_security/&quot;&gt;AI-powered cyberattack kits are &amp;#39;just a matter of time,&amp;#39; warns Google exec&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/29/ai_agent_identity_security/&quot;&gt;Agents gone wild! Companies give untrustworthy bots keys to the kingdom&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/03/openclaw_security_problems/&quot;&gt;DIY AI bot farm OpenClaw is a security &amp;#39;dumpster fire&amp;#39;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;Additionally, AI systems are getting much better at &lt;a href=&quot;https://www.theregister.com/2026/01/20/voidlink_ai_developed/&quot;&gt;malware writing&lt;/a&gt;, and criminals can trade weaponized models that write ransomware and data-stealing code for &lt;a href=&quot;https://www.theregister.com/2025/11/25/wormgpt_4_evil_ai_lifetime_cost_220_dollars/&quot;&gt;as little as $50 a month&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;The good news for now, according to the report’s authors, is that AI systems still aren&amp;#39;t great at carrying out multi-stage attacks without human help.&lt;/p&gt;&lt;p&gt;&amp;quot;Research suggests that autonomous attacks remain limited because AI systems cannot reliably execute long, multi-stage attack sequences,&amp;quot; according to the report. &amp;quot;For example, failures they exhibit include executing irrelevant commands, losing track of operational state, and failing to recover from simple errors without human intervention.&amp;quot;&lt;/p&gt;&lt;p&gt;Keep in mind, however, that this all was written before the &lt;a href=&quot;https://www.theregister.com/2026/02/03/openclaw_security_problems/&quot;&gt;security dumpster fire&lt;/a&gt; that is OpenClaw – the AI agent &lt;a href=&quot;https://www.theregister.com/2026/01/27/clawdbot_moltbot_security_concerns/&quot;&gt;previously known as Moltbot and Clawdbot&lt;/a&gt; – and Moltbook, the vibe-coded social media platform for AI agents.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;So it&amp;#39;s also entirely plausible that the world won&amp;#39;t end with a sophisticated, autonomous multi-stage cyberattack dreamed up by a nation-state crew or criminal mastermind, but rather a single agent that goes off the rails. ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>EFF: California 3D printer bill threatens digital freedoms • The Register</title>
<link>https://www.theregister.com/2026/04/14/eff_california_3dprinted_firearms/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2025/07/22/fgc9.jpg"></enclosure>
<guid isPermaLink="false">j1rSkCXtoy7g-Mm5Ra8ZEZavrhzJiKAuph5tLw==</guid>
<pubDate>Tue, 14 Apr 2026 23:21:41 +0000</pubDate>
<description>: Proposed law could lock down open source tools and give vendors fresh reasons to inspect print files</description>
<content:encoded>&lt;p&gt;California&amp;#39;s proposed legislation to put the burden of blocking 3D-printed firearms onto printer manufacturers could effectively sideline open source tools and create new surveillance concerns, digital rights activists argue.&lt;/p&gt;&lt;p&gt;Advocates at the Electronic Frontier Foundation (EFF) say that such legislation could empower manufacturers to introduce restrictive policies affecting consumer choice. It could lead to widespread surveillance of users&amp;#39; printing activity, which they fear could lead to copyright lawsuits, if that data were shared with other companies looking to protect against 3D-printed spare parts, for example.&lt;/p&gt;&lt;p&gt;The bill in question is &lt;a href=&quot;https://leginfo.legislature.ca.gov/faces/billTextClient.xhtml?bill_id=202520260AB2047&quot;&gt;AB 2047&lt;/a&gt;, the scope of which, on paper, appears strict. The primary goal is clear and simple: to require 3D printer manufacturers to use a state-certified algorithm that checks digital design files for firearm components and blocks print jobs that would produce prohibited parts.&lt;/p&gt;&lt;div&gt;
        
    &lt;/div&gt;&lt;p&gt;Federal law does not impose a blanket ban on making firearms for personal use, though ghost guns are subject to various federal and state restrictions, and the practice remains controversial nationwide.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;&lt;p&gt;Gun crime rates in the US far outweigh those in all other developed countries, so introducing legislation to curb the easy manufacture of untraceable firearms will be seen as a positive initiative to many, particularly in regions where guns are more strictly regulated.&lt;/p&gt;&lt;p&gt;However, Cliff Braun and Rory Mir, who respectively work in policy and tech community engagement at the EFF, claim that &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/dangers-californias-legislation-censor-3d-printing&quot;&gt;the proposals in California are technically infeasible&lt;/a&gt; and in practice will lead to consumer surveillance.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;In a series of blog posts published this month, the pair argued that print-blocking technology - proposals for which have also &lt;a href=&quot;https://www.theregister.com/2026/02/05/ghost_gun_legislation_3d_printing/&quot;&gt;surfaced&lt;/a&gt; in states including New York and Washington - cannot work for a range of technical reasons.&lt;/p&gt;&lt;p&gt;They argued that because 3D printers and other types of computer numerical control (CNC) machines are fairly simple, with much of their brains coming from the computer-aided manufacturing (CAM) software – or slicer software – to which they are linked, the bill would establish legal and illegal software. Proprietary software will likely become the de facto option, leaving open source alternatives to rot.&lt;/p&gt;&lt;p&gt;&amp;quot;Under these proposed laws, manufacturers of consumer 3D printers must ensure their printers only work with their software, and implement firearm detection algorithms on either the printer itself or in a slicer software,&amp;quot; &lt;a href=&quot;https://www.eff.org/deeplinks/2026/04/print-blocking-wont-work-permission-print-part-2&quot;&gt;wrote&lt;/a&gt; Braun earlier this month.&lt;/p&gt;&lt;div&gt;
            
        &lt;/div&gt;&lt;p&gt;&amp;quot;These algorithms must detect firearm files using a maintained database of existing models. Vendors of printers must then verify that printers are on the allow-list maintained by the state before they can offer them for sale.&lt;/p&gt;&lt;p&gt;&amp;quot;Owners of printers will be guilty of a crime if they circumvent these intrusive scanning procedures or load alternative software, which they might do because their printer manufacturer ends support.&amp;quot;&lt;/p&gt;&lt;p&gt;Braun also argued that it would be trivial for anyone who uses 3D printers to make small tweaks to either the visual models of firearms parts, or the machine instructions (G-code) generated from those models, to evade detection.&lt;/p&gt;&lt;p&gt;Mir further argued that the bill offers no guardrails to keep this &amp;quot;constantly expanding blacklist&amp;quot; limited to firearm-related designs.&lt;/p&gt;&lt;p&gt;In his view, there is a clear risk that this approach will creep into other forms of alleged unlawful activity, such as copyright infringement.&lt;/p&gt;&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/05/ghost_gun_legislation_3d_printing/&quot;&gt;Ghost gun legislation casts shadow over 3D printing&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/07/23/thingiverse_drops_3d_gun_designs/&quot;&gt;Leading 3D printing site bans firearm files, but home gun makers have better options&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/03/28/japan_3d_printing_railway/&quot;&gt;Meanwhile, in Japan, train stations are being 3D-printed in an afternoon&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2024/09/25/3d_printed_raspberry_pi_suicide_pod/&quot;&gt;A look under the hood of the 3D-printed, Raspberry Pi powered &amp;#39;suicide pod&amp;#39;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;p&gt;&amp;quot;This could look like Nintendo blocking a Pikachu toy, &lt;a href=&quot;https://www.theregister.com/2026/04/09/john_deere_repair_settlement/&quot;&gt;John Deere&lt;/a&gt; blocking a replacement part, or even patent trolls forcing the hand of hardware companies,&amp;quot; wrote Mir. &amp;quot;Repressive regimes, here or abroad, could likewise block the printing of &amp;#39;extreme&amp;#39; and &amp;#39;obscene&amp;#39; symbols, or tools of resistance like popular &lt;a href=&quot;https://www.theregister.com/2026/01/09/hackers_fight_back_against_ice/&quot;&gt;anti-ICE&lt;/a&gt; community whistles.&amp;quot;&lt;/p&gt;&lt;p&gt;Braun and Mir have a list of other arguments against the bill. They say the algorithms are more than likely to lead to false positives, which will prevent good-faith users from using their hardware.&lt;/p&gt;&lt;p&gt;Many 3D printer owners also have no interest in printing firearm components. Most simply want the freedom to print trinkets and spare parts while others use them to print various items and sell them as an income stream.&lt;/p&gt;&lt;p&gt;That said, Gun Owners of California also &lt;a href=&quot;https://gunownersca.com/take-action-ab-2047-bauer-kahan/&quot;&gt;opposes the bill&lt;/a&gt;, arguing that it does not target criminals, only innocent consumers and businesses.&lt;/p&gt;&lt;p&gt;&amp;quot;Californians deserve policies that focus on criminal misuse – not sweeping mandates that expand bureaucracy and restrict lawful activity,&amp;quot; it wrote in a response to the bill&amp;#39;s introduction in February.&lt;/p&gt;&lt;p&gt;Addressing the community behind &lt;a href=&quot;https://www.theregister.com/2025/07/23/thingiverse_drops_3d_gun_designs/&quot;&gt;3D printer&lt;/a&gt; manufacturer and slicer provider Prusa Research, community manager Tommy Muszynski said the company is keeping a close eye on developments.&lt;/p&gt;&lt;p&gt;&amp;quot;At Prusa, safety is obviously the highest priority,&amp;quot; he &lt;a href=&quot;https://www.reddit.com/r/prusa3d/comments/1r9jjza/comment/o6dvb1i/&quot;&gt;said&lt;/a&gt; in a comment on Reddit. &amp;quot;We want everyone to have a safe experience in this hobby, but at the same time, we have always been firm believers in the &amp;#39;right to repair&amp;#39; and the right for you to use the machine you bought however you see fit.&lt;/p&gt;&lt;p&gt;&amp;quot;We&amp;#39;ve built our community on open source principles and the idea that your printer is a tool for your own creativity, not a device that should be locked down or surveilled.&amp;quot; ®&lt;/p&gt;&lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Devs say Apple still flouting EU&#39;s DMA six months on • The Register</title>
<link>https://www.theregister.com/2025/12/16/apple_dma_complaint/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2024/04/17/shutterstock_logo.jpg"></enclosure>
<guid isPermaLink="false">TzBS2AWaQ1XNxD4P0d6UbGo6ze_WTrHJC99B7Q==</guid>
<pubDate>Tue, 14 Apr 2026 15:54:44 +0000</pubDate>
<description>: Coalition for App Fairness warns App Store fees remain unlawful despite non-compliance ruling</description>
<content:encoded>&lt;p&gt;Six months after EU regulators found Apple&amp;#39;s App Store rules &lt;a href=&quot;https://www.theregister.com/2025/03/19/google_apple_dma_eu/&quot;&gt;in breach of the Digital Markets Act&lt;/a&gt; (DMA), developers say Cupertino is still behaving as if compliance were optional.&lt;/p&gt;
&lt;p&gt;The Coalition for App Fairness, a nonprofit organization of app developers and consumer groups, has accused Apple of persistent non-compliance with the DMA, warning that the company&amp;#39;s revised App Store terms continue to impose fees which the legislation prohibits.&lt;/p&gt;
&lt;p&gt;In &lt;a href=&quot;https://appfairness.org/open-letter-stop-apples-illegal-app-store-fees-under-dma/&quot;&gt;an open letter&lt;/a&gt; addressed to European Commission President Ursula von der Leyen and senior commissioners, the coalition argues that Apple has failed to deliver &amp;quot;any meaningful changes or proposals&amp;quot; despite an April 2025 non-compliance decision that found its App Store policies illegal and harmful to both developers and consumers.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;At the heart of the complaint is money. The DMA requires so-called gatekeepers to allow developers to offer and conduct transactions outside their app stores without charge. Apple, the coalition claims, is seeking to charge commissions of up to 20 percent on those very transactions.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;&amp;quot;This is a blatant disregard for the law with the potential to vanquish years of meaningful work by the Commission,&amp;quot; the letter states, accusing Apple of preserving the economics of its App Store while nominally claiming compliance.&lt;/p&gt;
&lt;p&gt;Apple has said it will roll out new App Store terms in January 2026, but developers say the company has provided no clarity on what those changes will involve or whether they will actually comply with the DMA.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;&amp;quot;We have seen this playbook before in Europe and beyond,&amp;quot; the signatories warn, adding that they suspect any new terms will continue to impose fees that would violate the law.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/11/18/amazon_microsoft_cloud_dma/&quot;&gt;Brussels eyes AWS, Azure for gatekeeper tag in cloud clampdown&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/09/26/google_apple_dma_review_submissions/&quot;&gt;Apple, Google tell Europe its Digital Markets Act isn&amp;#39;t working for them – or consumers&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/08/20/google_play_eu_changes/&quot;&gt;Google tweaks Play Store fees to keep Euro watchdogs at bay&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/07/07/apple_appeals_500m_eu_antisteering/&quot;&gt;Apple tries to get €500M EU fine tossed&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The letter argues that this uncertainty is already doing damage. Six months after Apple&amp;#39;s last App Store terms update, developers still do not know which rules will govern their businesses or what their costs will look like in the near term.&lt;/p&gt;
&lt;p&gt;Apple&amp;#39;s &amp;quot;lack of transparency in tandem with its rushed timelines,&amp;quot; the coalition says, is freezing investment and innovation, effectively allowing the company to &amp;quot;exploit its gatekeeper position by holding the entire industry hostage.&amp;quot;&lt;/p&gt;
&lt;p&gt;The group also points to a growing transatlantic contrast that makes Europe look like the tougher regulator with the weaker results. While Apple continues to fight DMA enforcement in the EU, US courts have moved to curb its ability to extract fees from external transactions. Following litigation brought by Epic Games, developers in the US can now communicate freely with customers about pricing and offer payment options outside Apple&amp;#39;s ecosystem without paying commission.&lt;/p&gt;
&lt;p&gt;That raises what the coalition calls a &amp;quot;simple and urgent question.&amp;quot; Why should European developers and consumers get a worse deal than their US counterparts, especially when the EU was first to pass a landmark law aimed at fixing digital markets? The letter argues that meaningful enforcement of the DMA would strengthen Europe&amp;#39;s digital competitiveness and attract global investment, while weak enforcement risks turning the regulation into an expensive paper exercise.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;&amp;quot;We trust the Commission will uphold the DMA,&amp;quot; the signatories conclude, but they warn that if enforcement falls short, they will continue pressing policymakers to ensure Apple finally complies with the law as written – not as rewritten by Cupertino. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>AI-built app on Lovable exposed 18K users, researcher claims • The Register</title>
<link>https://www.theregister.com/2026/02/27/lovable_app_vulnerabilities/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2024/02/21/prompt_shutterstock.jpg"></enclosure>
<guid isPermaLink="false">9AuE6uyLop2J9akuuhVnaDhDOpHqa1IpsIguKg==</guid>
<pubDate>Tue, 14 Apr 2026 07:33:33 +0000</pubDate>
<description>: Who&#39;s to blame – the vibey platforms or the humans who ignore security warnings?</description>
<content:encoded>&lt;p&gt;Vibe-coding platform Lovable has been accused of hosting apps riddled with vulnerabilities after saying users are responsible for addressing security issues flagged before publishing.&lt;/p&gt;
&lt;p&gt;Taimur Khan, a tech entrepreneur with a background in software engineering, found 16 vulnerabilities – six of which he said were critical – in a single Lovable-hosted app that leaked more than 18,000 people&amp;#39;s data.&lt;/p&gt;
&lt;p&gt;He declined to name the app during the disclosure process, although it was hosted on Lovable&amp;#39;s platform and showcased on its Discover page. The app had more than 100,000 views and around 400 upvotes at the time Khan began his probe.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;The main issue, Khan said, was that all apps that are vibe-coded on Lovable&amp;#39;s platform are shipped with their backends powered by Supabase, which handles authentication, file storage, and real-time updates through a PostgreSQL database connection.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;However, when the developer – in this case AI – or the human project owner fails to explicitly implement crucial security features like Supabase&amp;#39;s row-level security and role-based access, code will be generated that looks functional but in reality is flawed.&lt;/p&gt;
&lt;p&gt;One example of this was a malformed authentication function. The AI that &lt;a href=&quot;https://www.theregister.com/2025/11/24/opinion_column_vibe_coding/&quot;&gt;vibe-coded&lt;/a&gt; the Supabase backend, which uses remote procedure calls, implemented it with flawed access control logic, essentially blocking authenticated users and allowing access to unauthenticated users.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Khan said the intent was to block non-admins from accessing parts of the app, but the faulty implementation blocked all logged-in users – an error he said was repeated across multiple critical functions.&lt;/p&gt;
&lt;p&gt;&amp;quot;This is backwards,&amp;quot; said Khan. &amp;quot;The guard blocks the people it should allow and allows the people it should block. A classic logic inversion that a human security reviewer would catch in seconds – but an AI code generator, optimizing for &amp;#39;code that works,&amp;#39; produced and deployed to production.&amp;quot;&lt;/p&gt;
&lt;p&gt;Because the app itself was a platform for creating exam questions and viewing grades, the userbase is naturally comprised of teachers and students. Some were from top US universities such as UC Berkeley and UC Davis, while there were &amp;quot;K-12 institutions with minors likely on the platform&amp;quot; as well, Khan &lt;a href=&quot;https://www.linkedin.com/pulse/lovable-more-like-hackable-taimur-khan-cewdf/?trackingId=%2BscO7NGeQ0%2BpVd7b1U0fYA%3D%3D&quot;&gt;said&lt;/a&gt;.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;With the security flaws in place, an unauthenticated attacker could trivially access every user record, send bulk emails through the platform, delete any user account, grade student test submissions, and access organizations&amp;#39; admin emails, for example.&lt;/p&gt;
&lt;p&gt;Of the 18,697 total user records exposed, 14,928 contained unique email addresses. The dataset included 4,538 student accounts – all with email addresses – 10,505 enterprise users, and 870 users whose full PII was exposed.&lt;/p&gt;
&lt;p&gt;The security flaws here are not exclusive to apps hosted by Lovable; the issue is broader and well-told by now.&lt;/p&gt;
&lt;p&gt;Vibe coding, Collins Dictionary&amp;#39;s Word of the Year for 2025, promised to break down software development&amp;#39;s steep learning curve and empower any prompt jockey to bring their app ideas to life.&lt;/p&gt;
&lt;p&gt;However, when AI isn&amp;#39;t &lt;a href=&quot;https://www.theregister.com/2026/01/21/curl_ends_bug_bounty/&quot;&gt;generating slop bug reports&lt;/a&gt; in pursuit of lucrative bug bounties or &lt;a href=&quot;https://www.theregister.com/2025/07/21/replit_saastr_vibe_coding_incident/&quot;&gt;catastrophically forgoing instructions&lt;/a&gt;, it can be found spewing glitzy-looking apps laden with vulnerabilities.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/25/bcachefs_creator_ai/&quot;&gt;Bcachefs creator insists his custom LLM is female and &amp;#39;fully conscious&amp;#39;&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/23/ibm_share_dive_anthropic_cobol/&quot;&gt;IBM stock dives after Anthropic points out AI can rewrite COBOL fast&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/20/amazon_denies_kiro_agentic_ai_behind_outage/&quot;&gt;Amazon&amp;#39;s vibe-coding tool Kiro reportedly vibed too hard and brought down AWS&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/19/jon_kern_vibe_coding/&quot;&gt;Agile Manifesto turns 25 – just in time for vibe coding to test it&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Veracode, for instance, &lt;a href=&quot;https://www.veracode.com/blog/ai-generated-code-security-risks/&quot;&gt;recently found&lt;/a&gt; that 45 percent of AI-generated code contained security flaws, not to mention the myriad &lt;a href=&quot;https://www.theregister.com/2025/08/05/mcpoison_bug_abuses_cursor_mcp/&quot;&gt;tales&lt;/a&gt; of &lt;a href=&quot;https://www.theregister.com/2026/02/20/openclaw_snuck_into_cline_package/&quot;&gt;woe&lt;/a&gt; reported by &lt;em&gt;The Register&lt;/em&gt; in recent months.&lt;/p&gt;
&lt;p&gt;Khan said he believes Lovable should take responsibility for the security of the apps it hosts, and was especially peeved when, after reporting his findings via company support, his ticket was reportedly closed without response.&lt;/p&gt;
&lt;p&gt;&amp;quot;If Lovable is going to market itself as a platform that generates production-ready apps with authentication &amp;#39;included,&amp;#39; it bears some responsibility for the security posture of the apps it generates and promotes,&amp;quot; Khan said.&lt;/p&gt;
&lt;p&gt;&amp;quot;You can&amp;#39;t showcase an app to 100,000 people, host it on your own infrastructure, and then close the ticket when someone tells you it&amp;#39;s leaking user data. At minimum, a basic security scan of showcased applications would have caught every critical finding in this report.&amp;quot;&lt;/p&gt;
&lt;p&gt;Lovable told &lt;em&gt;The Register&lt;/em&gt; that the company has contacted the owner of the app in question and takes &amp;quot;any findings of this kind extremely seriously.&amp;quot;&lt;/p&gt;
&lt;p&gt;Regarding the closed ticket, Lovable CISO Igor Andriushchenko said that the company only received &amp;quot;a proper disclosure report&amp;quot; on the evening of February 26 and acted on the findings &amp;quot;within minutes.&amp;quot;&lt;/p&gt;
&lt;p&gt;&amp;quot;Any project built with Lovable includes a free security scan before publishing,&amp;quot; Andriushchenko told &lt;em&gt;The Register&lt;/em&gt;. &amp;quot;This scan checks for vulnerabilities and, if found, provides recommendations on actions to take to resolve before publishing.&lt;/p&gt;
&lt;p&gt;&amp;quot;Ultimately, it is at the discretion of the user to implement these recommendations. In this case, that implementation did not happen.&lt;/p&gt;
&lt;p&gt;&amp;quot;This project also includes code not generated by Lovable and the vulnerable database is not hosted by Lovable. We have been in contact with the creator of the app, who is now addressing the issue.&amp;quot; ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Claude is getting worse, according to Claude • The Register</title>
<link>https://www.theregister.com/2026/04/13/claude_outage_quality_complaints/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2026/04/13/ugly_mirror_pig_face.jpg"></enclosure>
<guid isPermaLink="false">c2ZxrfMsJL3VM62Q5Tfc_VvCbje5oB0UpenAIg==</guid>
<pubDate>Mon, 13 Apr 2026 23:33:32 +0000</pubDate>
<description>: Brief outage follows growing number of quality complaints</description>
<content:encoded>&lt;p&gt;Once the AI darling of programmers everywhere, Anthropic&amp;#39;s Claude has been stumbling mightily, both in terms of cost and perceived quality. The service was down briefly on Monday with &amp;quot;a major outage,&amp;quot; service trouble that only amplifies growing discontent from customers that even a bot can see.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://status.claude.com/incidents/6jd2m42f8mld&quot;&gt;The outage&lt;/a&gt;, which involved elevated error rates, affected Claude.ai and Claude Code from 15:31 to 16:19 UTC.&lt;/p&gt;
&lt;div&gt;&lt;a href=&quot;https://regmedia.co.uk/2026/04/13/claude_outage.jpg&quot;&gt;&lt;img src=&quot;https://regmedia.co.uk/2026/04/13/claude_outage.jpg?x=648&amp;amp;y=536&amp;amp;infer_y=1&quot; alt=&quot;Screenshot of 4-13-26 outage&quot; title=&quot;Screenshot of 4-13-26 outage&quot;/&gt;&lt;/a&gt;
&lt;p&gt;Screenshot of 4-13-26 outage - Click to enlarge&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;That&amp;#39;s not all. In the past few months, Claude&amp;#39;s answers have been getting less satisfactory, according to social &lt;a href=&quot;https://alphaguruai.substack.com/p/whats-going-on-with-claude-code&quot;&gt;media&lt;/a&gt; &lt;a href=&quot;https://www.reddit.com/r/ClaudeCode/comments/1sfbh39/something_is_off_the_quality_of_claude_code/&quot;&gt;posts&lt;/a&gt; as well as issues filed on GitHub. This has occurred as Anthropic has had to take steps &lt;a href=&quot;https://www.theregister.com/2026/03/26/anthropic_tweaks_usage_limits/&quot;&gt;to reduce usage during peak hours&lt;/a&gt; to balance capacity and demand.&lt;/p&gt;
&lt;p&gt;To get a more objective measurement, we pointed Claude itself at the Claude Code GitHub repo, &lt;a href=&quot;https://github.com/anthropics/claude-code/issues?q=is%3Aissue%20state%3Aopen%20quality&quot;&gt;filtered for open issues that mention quality&lt;/a&gt;, and gave it the following prompt: &amp;quot;Analyze and graph complaints about Claude Code quality in this repo since January 2026. Use open issues that mention quality concerns. Have these concerns increased lately?&amp;quot;&lt;/p&gt;
&lt;p&gt;Anthropic&amp;#39;s AI model concluded, &amp;quot;Yes, quality complaints have escalated sharply — and the data tells a pretty clear story.&amp;quot;&lt;/p&gt;
&lt;div&gt;&lt;a href=&quot;https://regmedia.co.uk/2026/04/13/claude_quality_graph.jpg&quot;&gt;&lt;img src=&quot;https://regmedia.co.uk/2026/04/13/claude_quality_graph.jpg?x=648&amp;amp;y=405&amp;amp;infer_y=1&quot; alt=&quot;Claude-generated assessment of Claude Code quality issues&quot; title=&quot;Claude-generated assessment of Claude Code quality issues&quot;/&gt;&lt;/a&gt;
&lt;p&gt;Claude-generated assessment of Claude Code quality issues - Click to enlarge&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;We asked Claude to rerun its self-analysis on Monday and the results were similar, with the model emitting &amp;quot;The velocity is notable: April is already at 20+ quality issues in 13 days, putting it on pace to exceed March&amp;#39;s 18 — which was itself a 3.5× jump over the January–February baseline.&amp;quot; &lt;/p&gt;
&lt;p&gt;Claude itself is not a reliable narrator, and just because someone (or some bot) has reported a concern to the Claude Code repo does not mean that the report is accurate or valid. It appears many issues are now AI-generated – a widely reported concern among open source developers – which may be contributing to report volume.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;Anthropic&amp;#39;s GitHub Actions script also appears to &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/16497&quot;&gt;automatically close issues&lt;/a&gt; after a period of inactivity, which may serve to mask unresolved problems.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;&lt;em&gt;The Register&lt;/em&gt; has covered some of the issues Claude flagged in its analysis, like the &lt;a href=&quot;https://www.theregister.com/2026/04/13/claude_code_cache_confusion/&quot;&gt;caching issue&lt;/a&gt; and &lt;a href=&quot;https://www.theregister.com/2026/04/06/anthropic_claude_code_dumber_lazier_amd_ai_director/&quot;&gt;claims&lt;/a&gt; by AMD&amp;#39;s AI director Stella Laurenzo that Claude&amp;#39;s responses have been getting worse. Others have yet to be substantiated, such as &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/35584&quot;&gt;one claim&lt;/a&gt; that &amp;quot;Claude autonomously deleted 35,254 production customer message records and 35,874 billing transactions belonging to a real paying customer (JIXEN).&amp;quot;&lt;/p&gt;
&lt;p&gt;The individual or bot account behind this post has made no other posts. &lt;em&gt;The Register&lt;/em&gt; has attempted to contact Jixen Enterprises Private Limited, which appears to be a private company registered in India, to check on that claim but we&amp;#39;ve not heard back. Developers have &lt;a href=&quot;https://x.com/Al_Grigor/status/2029889772181934425?lang=en&quot;&gt;reported&lt;/a&gt; data loss from using Claude Code and other models. But if this occurred, no one has ruled out user error.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;In any event, Claude is capable of citing actual GitHub issue posts to justify its &amp;quot;reasoning,&amp;quot; so the general trend – of a growing number of reports about quality – is evident.&lt;/p&gt;
&lt;p&gt;The model points to issues like &amp;quot;Claude Code&amp;#39;s prediction-first behavior is dangerous on capital-at-risk projects&amp;quot; &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/46212&quot;&gt;#46212&lt;/a&gt;, &amp;quot;Claude Code is unusable for complex engineering tasks with the Feb updates&amp;quot; &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/42796&quot;&gt;#42796&lt;/a&gt; (&lt;a href=&quot;https://github.com/anthropics/claude-code/issues/42796#issuecomment-4194007103&quot;&gt;addressed&lt;/a&gt; by Claude Code head Boris Cherny), &amp;quot;Artificial degradation, Acquisition Bias, and unacceptable compute throttling for paid users&amp;quot; &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/46949&quot;&gt;#46949&lt;/a&gt;, and &amp;quot;Opus 4.6: Severe quality degradation on iterative coding tasks&amp;quot; &lt;a href=&quot;https://github.com/anthropics/claude-code/issues/46099&quot;&gt;#46099&lt;/a&gt; to justify its conclusion.&lt;/p&gt;
&lt;p&gt;Data from Margin Lab, however, suggests that Claude Opus 4.6 has at least maintained its score on the SWE-Bench-Pro test. Assessments conducted since February show &lt;a href=&quot;https://marginlab.ai/trackers/claude-code-historical-performance/&quot;&gt;some variation but no substantive change&lt;/a&gt;.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Anthropic did not immediately respond to a request to comment on Claude quality concerns.®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Apple update turns Czech mate for locked-out iPhone user • The Register</title>
<link>https://www.theregister.com/2026/04/12/ios_passcode_bug/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2024/03/27/passcode_shutterstock.jpg"></enclosure>
<guid isPermaLink="false">u9FYPmu9Z8zsrKr9XU4aL6na0tCGsY3WUvKAbQ==</guid>
<pubDate>Sun, 12 Apr 2026 09:35:36 +0000</pubDate>
<description>: Lock-screen keyboard no longer accepts háček in student&#39;s alphanumeric passcode</description>
<content:encoded>&lt;p&gt;A university student in the US is in data limbo after Apple removed a character from its Czech keyboard, preventing him from entering his iPhone passcode.&lt;/p&gt;
&lt;p&gt;Connor Byrne, 21, adopts the uncommon but security-minded approach to iPhone passcodes, using an alphanumeric string instead of the standard four-number passcode.&lt;/p&gt;
&lt;p&gt;He updated his iPhone 13 from iOS 18 to iOS 26.4 on April 5, but in doing so lost the ability to enter his passcode. He has been locked out of the device ever since.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;This is because iOS 18 was the last operating system version that allowed iPhone users to enter the special character – in this case, the caron/háček (ˇ) – using the old keyboard on the lock screen.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;It has left Byrne without access to his device, which, given its age and chipped screen, does not hold much value, unlike the old photos stored on it, which carry sentimental importance.&lt;/p&gt;
&lt;p&gt;The student has not backed up the files to &lt;a href=&quot;https://www.theregister.com/2025/02/24/rather_than_add_a_backdoor/&quot;&gt;iCloud&lt;/a&gt; either, so they cannot be retrieved via a separate device. Apple support staff have suggested the only way to regain access to the iPhone 13 is by restoring it, which would erase the files of value.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Byrne was hoping that the next update, 26.4.1, would introduce a fix for this, but its release this week has not helped.&lt;/p&gt;
&lt;p&gt;&amp;quot;The phone&amp;#39;s very cracked, so, at this point, the photos contained in it are more valuable than the ability to use the phone itself,&amp;quot; he told &lt;em&gt;The Register&lt;/em&gt;. &amp;quot;They&amp;#39;re the main data that I care about and haven&amp;#39;t backed up.&amp;quot;&lt;/p&gt;
&lt;p&gt;&amp;quot;I don&amp;#39;t anticipate a bespoke solution being provided, but I&amp;#39;m hopeful that the issue will be resolved in the next iOS update.&amp;quot;&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;When the háček could still be used in the iPhone&amp;#39;s passcode, it sat on the bottom row of the keyboard, while just above it was an acute accent mark.&lt;/p&gt;
&lt;p&gt;Post-update, when entering the passcode, the keyboard now displays an identical accent mark in the háček&amp;#39;s place, a feature Byrne described as &amp;quot;pointless; they&amp;#39;re encoded the same.&amp;quot;&lt;/p&gt;
&lt;p&gt;&amp;quot;I&amp;#39;ve bought a cheap Android phone to use while I wait for a fix,&amp;quot; he added. &amp;quot;I&amp;#39;ll give it a month or two and will buy a nicer Android phone if the dust settles without a fix.&amp;quot;&lt;/p&gt;
&lt;p&gt;Given that iOS 18 was released in 2024, and Apple has not reintroduced the háček since, it seems unlikely Cupertino will make good on the student&amp;#39;s hopes, especially considering that he is &lt;a href=&quot;https://www.reddit.com/r/iphone/comments/1odyvs1/locked_iphone_because_special_character/&quot;&gt;not the only user to encounter the same issue&lt;/a&gt; in recent weeks.&lt;/p&gt;
&lt;p&gt;During in-house testing, which involved taking an iPhone 16 from iOS 18.5 to iOS 26.4.1, &lt;em&gt;The Register&lt;/em&gt; found that Apple has kept the háček in the Czech keyboard, but removed the ability to use it in a custom alphanumeric passcode. The OS will not allow users to input the háček as a character. The key&amp;#39;s animation triggers, as does the keyboard&amp;#39;s key-tap sound, but the character is not entered into the string.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/09/security_researchers_tricked_apple_intelligence/&quot;&gt;Security researchers tricked Apple Intelligence into cursing at users. It could have been a lot worse&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/09/security_researchers_tricked_apple_intelligence/&quot;&gt;Security researchers tricked Apple Intelligence into cursing at users. It could have been a lot worse&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/07/opinion_column_apple_vs_microsoft/&quot;&gt;Apple&amp;#39;s chips are the core of a new landscape, but its biggest win is Windows&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/30/apple_fine_russia_sanctions/&quot;&gt;UK fines Irish Apple outpost over sanctions-busting payments to Russian dev&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If the student were able to get into his iPhone 13, he would find the háček in his keyboard as it used to be before he updated it. It is only the lock-screen keyboard that replaces it with a second acute accent mark.&lt;/p&gt;
&lt;p&gt;Alas, Byrne has gone to great lengths to tinker and tease iOS into accepting or finding the háček, or to find tricky ways of bypassing it.&lt;/p&gt;
&lt;p&gt;He tried entering the same accent mark that replaced the háček, in the hope that it was simply displaying incorrectly. He also researched downgrading to iOS 26.3.1, with a view to changing the passcode to one that&amp;#39;s compatible with the new keyboard, to no avail.&lt;/p&gt;
&lt;p&gt;Long-pressing every key to reveal a hidden háček did not work, nor did writing the password on paper (and also with a computer word processor to account for handwriting errors), and using AutoFill to scan it in. In this case, he said that the háček was only read as a quotation mark or degree sign.&lt;/p&gt;
&lt;p&gt;Apple Support arranged for Byrne to attend a Genius Bar appointment, where the staffer behind the desk made no progress and even started restoring the phone without seeking the student&amp;#39;s consent.&lt;/p&gt;
&lt;p&gt;&amp;quot;He provided no recommendations before doing so,&amp;quot; he said.&lt;/p&gt;
&lt;p&gt;And if you&amp;#39;re wondering &amp;quot;why not enable &lt;a href=&quot;https://www.theregister.com/2017/11/14/is_facial_recognition_good_enough/&quot;&gt;Face ID&lt;/a&gt; in the first place? Biometrics are pretty secure.&amp;quot; Well, it&amp;#39;s not secure enough for this user, and it wouldn&amp;#39;t matter either, even if it did meet his standards.&lt;/p&gt;
&lt;p&gt;&amp;quot;I don&amp;#39;t consider Face ID secure enough because it provides no protection in cases where someone has control of both you and the phone – police or customs, for example.&amp;quot;&lt;/p&gt;
&lt;p&gt;&amp;quot;It wouldn&amp;#39;t have helped anyway, since you have to enter the passcode once after updating to enable Face ID.&amp;quot;&lt;/p&gt;
&lt;p&gt;For the same reason, plugging in an external keyboard is also a no-go since freshly updated iPhones are placed in what&amp;#39;s known as a Before First Unlock state, which prevents wired accessories from working until the passcode is entered.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The Register&lt;/em&gt; contacted Apple multiple times to get its side of things, but it did not respond. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>CPUID hijacked to serve malware as HWMonitor downloads • The Register</title>
<link>https://www.theregister.com/2026/04/10/cpuid_site_hijacked/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2021/04/13/malware.jpg"></enclosure>
<guid isPermaLink="false">2kBYJ7odGnKfcWPKWEkFh8jHJxs2y5JMjA73zQ==</guid>
<pubDate>Sat, 11 Apr 2026 21:08:27 +0000</pubDate>
<description>: Six-hour breach turned trusted links into a coin toss between legit tools and credential stealers</description>
<content:encoded>&lt;p&gt;Visitors to the CPUID website were briefly exposed to malware this week after attackers hijacked part of its backend, turning trusted download links into a delivery mechanism for something far less welcome.&lt;/p&gt;
&lt;p&gt;The issue hit tools like HWMonitor and CPU-Z, with users on Reddit and elsewhere starting to notice something wasn&amp;#39;t right when installers tripped antivirus alerts or showed up under odd names. One example that did the rounds had the HWMonitor 1.63 update pointing to a file called &amp;quot;HWiNFO_Monitor_Setup.exe,&amp;quot; which is not what anyone went there to download, and a pretty clear sign that something upstream had been tampered with.&lt;/p&gt;
&lt;p&gt;CPUID has since &lt;a href=&quot;https://x.com/d0cTB/status/2042520961824559150&quot;&gt;confirmed&lt;/a&gt; the breach, pinning it on a compromised backend component rather than tampering with its software builds.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;&amp;quot;Investigations are still ongoing, but it appears that a secondary feature (basically a side API) was compromised for approximately six hours between April 9 and April 10, causing the main website to randomly display malicious links (our signed original files were not compromised),&amp;quot; &lt;a href=&quot;https://x.com/d0cTB/status/2042520961824559150?s=20&quot;&gt;one of the site&amp;#39;s owners said in a post on X&lt;/a&gt;. &amp;quot;The breach was found and has since been fixed.&amp;quot;&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;The files themselves appear to have been left alone and remain properly signed, so it doesn&amp;#39;t seem like anyone got into the build process. Instead, the problem sat in front of that, in how downloads were being served. For anyone who hit the site during that stretch, though, that distinction offers little comfort. If the link you clicked had been swapped out, you were pulling whatever it pointed to, whether you realized it or not.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/04/05/trellix_john_fokker_roasting_crims/&quot;&gt;Researchers didn&amp;#39;t want to glamorize cybercrims. So they roasted them&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/18/darksword_exploit_kit_steals_iphone/&quot;&gt;State snoops and spyware vendors planting info-stealing malware on iPhones, Google warns&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/18/ai_for_software_developers_qcon/&quot;&gt;AI for software developers is in a &amp;#39;dangerous state&amp;#39;&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/13/vpn_clients_spoofed/&quot;&gt;Credential-stealing crew spoofs VPN clients from Cisco, Fortinet, and others&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Analysis shared by &lt;a href=&quot;https://x.com/vxunderground/status/2042499378233876715&quot;&gt;vx-underground&lt;/a&gt; says the malicious installer appears to have targeted 64-bit HWMonitor users and included a fake CRYPTBASE.dll designed to blend in with legitimate Windows components. That DLL then reached out to a command-and-control server to pull down additional payloads.&lt;/p&gt;
&lt;p&gt;From there, things escalate. Analysis suggests the malware tries to stay off disk as much as possible, leaning on PowerShell and running largely in memory. It also pulls down additional code and compiles a .NET payload on the victim machine before injecting it into other processes. There are also signs it&amp;#39;s going after browser data. In testing, it was seen interacting with Google Chrome&amp;#39;s IElevation COM interface, which can be used to access and decrypt stored credentials.&lt;/p&gt;
&lt;p&gt;The same analysis suggests links to infrastructure used in earlier campaigns, including one targeting FileZilla users, hinting that this wasn&amp;#39;t a one-off experiment but part of a broader playbook.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;CPUID says the issue is now fixed, but there&amp;#39;s still no detail on how that API was accessed or how many people actually pulled the bad downloads. Even so, it&amp;#39;s another reminder that attackers don&amp;#39;t need to touch the code itself to cause harm. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Apple opts everyone into having their Photos analyzed by AI • The Register</title>
<link>https://www.theregister.com/2025/01/03/apple_enhanced_visual_search/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2025/01/03/shutterstock_selfie.jpg"></enclosure>
<guid isPermaLink="false">FAd6TqKxb5DR_MZ0OvwUkzf1C6WRkYWoJ0L23Q==</guid>
<pubDate>Sat, 11 Apr 2026 01:56:33 +0000</pubDate>
<description>Homomorphic-based Enhanced Visual Search is so privacy-preserving, iPhone giant activated it without asking</description>
<content:encoded>&lt;p&gt;Apple last year deployed a mechanism for identifying landmarks and places of interest in images stored in the Photos application on its customers iOS and macOS devices and enabled it by default, seemingly without explicit consent.&lt;/p&gt;
&lt;p&gt;Apple customers have only just begun to notice.&lt;/p&gt;
&lt;p&gt;The feature, known as Enhanced Visual Search, was called out last week by software developer Jeff Johnson, who expressed concern in &lt;a href=&quot;https://lapcatsoftware.com/articles/2024/12/3.html&quot;&gt;two&lt;/a&gt; &lt;a href=&quot;https://lapcatsoftware.com/articles/2024/12/4.html&quot;&gt;write-ups&lt;/a&gt; about Apple&amp;#39;s failure to explain the technology, which is believed to have arrived with iOS 18.1 and macOS 15.1 on &lt;a href=&quot;https://support.apple.com/en-us/100100&quot;&gt;October 28, 2024&lt;/a&gt;.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;In a &lt;a href=&quot;https://www.apple.com/legal/privacy/data/en/photos/&quot;&gt;policy document&lt;/a&gt; dated November 18, 2024 (not indexed by the Internet Archive&amp;#39;s Wayback Machine until &lt;a href=&quot;https://web.archive.org/web/20241228200141/https://www.apple.com/legal/privacy/data/en/photos/&quot;&gt;December 28, 2024&lt;/a&gt;, the date of Johnson&amp;#39;s initial article), Apple describes the feature thus:&lt;/p&gt;
&lt;div&gt;

&lt;p&gt;Enhanced Visual Search in Photos allows you to search for photos using landmarks or points of interest. Your device privately matches places in your photos to a global index Apple maintains on our servers. We apply homomorphic encryption and differential privacy, and use an OHTTP relay that hides [your] IP address. This prevents Apple from learning about the information in your photos. You can turn off Enhanced Visual Search at any time on your iOS or iPadOS device by going to Settings &amp;gt; Apps &amp;gt; Photos. On Mac, open Photos and go to Settings &amp;gt; General.&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;Apple did explain the technology in &lt;a href=&quot;https://machinelearning.apple.com/research/homomorphic-encryption&quot;&gt;a technical paper&lt;/a&gt; published on October 24, 2024, around the time that Enhanced Visual Search is believed to have debuted. A local machine-learning model analyzes photos to look for a &amp;quot;region of interest&amp;quot; that may depict a landmark. If the AI model finds a likely match, it calculates a vector embedding – an array of numbers – representing that portion of the image.&lt;/p&gt;
&lt;p&gt;The device then uses &lt;a href=&quot;https://digitalprivacy.ieee.org/publications/topics/what-is-homomorphic-encryption&quot;&gt;homomorphic encryption&lt;/a&gt; to scramble the embedding in such a way that it can be run through carefully designed algorithms that produce an equally encrypted output. The goal here being that the encrypted data can be sent to a remote system to analyze without whoever is operating that system from knowing the contents of that data; they just have the ability to perform computations on it, the result of which remain encrypted. The input and output are end-to-end encrypted, and not decrypted during the mathematical operations, or so it&amp;#39;s claimed.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;The dimension and precision of the embedding is adjusted to reduce the high computational demands for this homomorphic encryption (presumably at the cost of labeling accuracy) &amp;quot;to meet the latency and cost requirements of large-scale production services.&amp;quot; That is to say Apple wants to minimize its cloud compute cost and mobile device resource usage for this free feature.&lt;/p&gt;
&lt;p&gt;With some server optimization metadata and the help of Apple&amp;#39;s private nearest neighbor search (PNNS), the relevant Apple server shard receives a homomorphically-encrypted embedding from the device, and performs the aforementioned encrypted computations on that data to find a landmark match from a database and return the result to the client device without providing identifying information to Apple nor its OHTTP partner &lt;a href=&quot;https://blog.cloudflare.com/stronger-than-a-promise-proving-oblivious-http-privacy-properties/&quot;&gt;Cloudflare&lt;/a&gt;.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Thus, Apple unilaterally began running people&amp;#39;s Photos through a locally running machine-learning algorithm that analyzes image details (on a purely visual basis, without using location data) and creates a value associated with what could be a landmark in each picture. That value is then used on a remote server to check an index of such values stored on Apple servers in order to label within each snap the landmarks and places found in Apple&amp;#39;s database.&lt;/p&gt;
&lt;p&gt;Put more simply: You take a photo; your Mac or iThing locally outlines what it thinks is a landmark or place of interest in the snap; it homomorphically encrypts a representation of that portion of the image in a way that can be analyzed without being decrypted; it sends the encrypted data to a remote server to do that analysis, so that the landmark can be identified from a big database of places; and it receives the suggested location again in encrypted form that it alone can decipher.&lt;/p&gt;
&lt;p&gt;If it all works as claimed, and there are no side-channels or other leaks, Apple can&amp;#39;t see what&amp;#39;s in your photos, neither the image data nor the looked-up label.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/01/02/apple_siri_lawsuit/&quot;&gt;Apple offers to settle &amp;#39;snooping Siri&amp;#39; lawsuit for an utterly incredible $95M&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2024/12/22/ai_poisoned_tree/&quot;&gt;Fining Big Tech isn&amp;#39;t working. Make them give away illegally trained LLMs as public domain&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2024/12/20/apple_ai_headline_summaries/&quot;&gt;Apple called on to ditch AI headline summaries after BBC debacle&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2024/12/19/apple_meta_interoperability/&quot;&gt;Apple and Meta trade barbs over interoperability requests&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Apple claims that its use of this &lt;a href=&quot;https://machinelearning.apple.com/research/homomorphic-encryption&quot;&gt;homomorphic encryption&lt;/a&gt; plus what&amp;#39;s called &lt;a href=&quot;https://machinelearning.apple.com/research/wally-search&quot;&gt;differential privacy&lt;/a&gt; – a way to protect the privacy of people whose data appears in a data set – precludes potential privacy problems.&lt;/p&gt;
&lt;p&gt;&amp;quot;Apple is being thoughtful about doing this in a (theoretically) privacy-preserving way, but I don’t think the company is living up to its ideals here,&amp;quot; observed software developer Michael Tsai in an &lt;a href=&quot;https://mjtsai.com/blog/2025/01/01/privacy-of-photos-apps-enhanced-visual-search/&quot;&gt;analysis shared&lt;/a&gt; Wednesday. &amp;quot;Not only is it not opt-in, but you can’t effectively opt out if it starts uploading metadata about your photos &lt;a href=&quot;https://mastodon.social/@lapcatsoftware/113745260274529296&quot;&gt;before&lt;/a&gt; you even use the search feature. It does this even if you’ve already opted out of uploading your photos to iCloud.&amp;quot;&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Tsai argues Apple&amp;#39;s approach is even less private than its &lt;a href=&quot;https://www.theregister.com/2021/12/16/apple_deletes_csam_scanning_plan/&quot;&gt;abandoned CSAM scanning plan&lt;/a&gt; &amp;quot;because it applies to non-iCloud photos and uploads information about all photos, not just ones with suspicious neural hashes.&amp;quot;&lt;/p&gt;
&lt;p&gt;Nonetheless, Tsai acknowledges Apple&amp;#39;s claim that data processed in this way is encrypted and disassociated with the user&amp;#39;s account and IP address.&lt;/p&gt;
&lt;p&gt;While there&amp;#39;s no evidence at this point that contradicts Apple&amp;#39;s privacy assertions, the community concern has more to do with the way in which Apple deployed this technology.&lt;/p&gt;
&lt;p&gt;&amp;quot;It’s very frustrating when you learn about a service two days before New Years and you find that it’s already been enabled on your phone,&amp;quot; &lt;a href=&quot;https://bsky.app/profile/matthewdgreen.bsky.social/post/3lefzhwitsk2y&quot;&gt;said&lt;/a&gt; Matthew Green, associate professor of computer science at the Johns Hopkins Information Security Institute in the US.&lt;/p&gt;
&lt;div&gt;
&lt;h2&gt;Apple gives fanbois The Sweetest Thing: A delete button for that U2 album&lt;/h2&gt;
&lt;a href=&quot;https://www.theregister.com/2014/09/15/apple_gives_fanbois_the_sweetest_thing_a_delete_button_for_that_u2_album/&quot;&gt;&lt;span&gt;FLASHBACK&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p&gt;&lt;em&gt;The Register&lt;/em&gt; asked Apple to comment, and as usual we&amp;#39;ve received no reply. We note that lack of communication is the essence of the community discontent.&lt;/p&gt;
&lt;p&gt;&amp;quot;My objection to Apple&amp;#39;s Enhanced Visual Search is not the technical details specifically, which are difficult for most users to evaluate, but rather the fact that Apple has taken the choice out of my hands and enabled the online service by default,&amp;quot; said Johnson in his second post.&lt;/p&gt;
&lt;p&gt;He told &lt;em&gt;The Register&lt;/em&gt; that it&amp;#39;s unclear whether the data/metadata from your Photos library is uploaded before you even have a chance to disable the opt-out setting.&lt;/p&gt;
&lt;p&gt;&amp;quot;I don&amp;#39;t think anybody knows, and Apple hasn&amp;#39;t said,&amp;quot; Johnson observed. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Smart TVs and voice assistants are the next gatekeepers • The Register</title>
<link>https://www.theregister.com/2026/03/24/smart_tvs_gatekeepers_eu/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2020/12/17/shutterstock_tv_advertising.jpg"></enclosure>
<guid isPermaLink="false">UlBP1nomSDkpFrBeW4oasOdhIkS3a5PqZYpqcw==</guid>
<pubDate>Fri, 10 Apr 2026 05:14:40 +0000</pubDate>
<description>: Open letter warns tech is shaping what audiences see while slipping past regulation</description>
<content:encoded>&lt;p&gt;Europe&amp;#39;s broadcasters say smart TVs and voice assistants are fast becoming the next Big Tech gatekeepers, with little sign of Brussels stepping in.&lt;/p&gt;
&lt;p&gt;The warning comes in &lt;a href=&quot;https://www.acte.be/publication/european-broadcasting-associations-statement-on-connected-tvs-virtual-assistants/&quot;&gt;an open letter&lt;/a&gt; addressed to European Commission executive vice-president Teresa Ribera, signed by industry groups including the Association of Commercial Television and Video on Demand Services in Europe (ACT) and the European Broadcasting Union (EBU).&lt;/p&gt;
&lt;p&gt;The letter urges the Commission to bring connected TV operating systems and virtual assistants within the scope of the Digital Markets Act (DMA), arguing that both now sit squarely between audiences and the content they&amp;#39;re trying to watch or hear, with growing influence over how that content is surfaced.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;The concern isn&amp;#39;t the screens themselves, but the software layer deciding what gets shown, whether that&amp;#39;s a recommendation row on a TV homepage or the answer served up when a user asks a voice assistant for something to watch. That layer, broadcasters argue, now controls search, recommendations, and app visibility in much the same way app stores and search engines do on phones and PCs – only without the same regulatory scrutiny.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;The DMA is supposed to rein in &amp;quot;gatekeepers&amp;quot; with rules against self-preferencing and unfair access, but so far, no connected TV platforms or virtual assistants have been put in that bucket, a gap the letter says is only getting wider.&lt;/p&gt;
&lt;p&gt;&amp;quot;With the future viability of many European TV broadcasters at stake, and with millions of EU businesses and consumers relying on CTVs to promote and access an expanding range of content via TV applications, it is crucial that the Commission designate major TV operating systems as gatekeepers and ensure adequate oversight to guarantee fairness and contestability,&amp;quot; the letter states. &lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;&amp;quot;While CTVs can offer significant opportunities for European businesses to develop and compete – not only in audiovisual content, but also in gaming, health and other applications – these opportunities risk being undermined by entrenched gatekeeping practices.&amp;quot;&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2025/12/16/apple_dma_complaint/&quot;&gt;Devs say Apple still flouting EU&amp;#39;s Digital Markets Act six months on&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/19/cispe_eu_complaint_vmware_vcsp_closure/&quot;&gt;&amp;#39;Death sentence&amp;#39;: EU cloud lobby takes Broadcom to Brussels over VMware partner purge&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/03/eu_battery_production_costs/&quot;&gt;Brussels urged to pay &amp;#39;sovereignty premium&amp;#39; to narrow China battery gap&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/05/smart_tv_surveillance_opinion/&quot;&gt;Your smart TV is watching you and nobody&amp;#39;s stopping it&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The fear is that if a platform controls both how content is delivered and how it&amp;#39;s found, it doesn&amp;#39;t take much imagination to see how it might nudge things its own way, whether that&amp;#39;s pushing its own services, striking cozy deals, or quietly steering recommendations out of public view.&lt;/p&gt;
&lt;p&gt;For broadcasters, particularly public service outfits already under pressure, there&amp;#39;s the risk of being quietly edged out of view on the very devices audiences now use to access TV and radio.&lt;/p&gt;
&lt;p&gt;Virtual assistants complicate things further. Unlike a single operating system, they operate across TVs, smartphones, cars, and smart speakers, acting as a universal interface for content discovery. That reach, the groups argue, effectively turns them into gatekeepers in all but name, even if they don&amp;#39;t yet meet the DMA&amp;#39;s formal thresholds.&lt;/p&gt;
&lt;p&gt;Brussels is essentially being told to act early for once, either by designating these platforms under the DMA or by at least opening the hood before user habits set and market power quietly locks in. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Godot maintainers struggle with &#39;demoralizing&#39; AI slop PRs • The Register</title>
<link>https://www.theregister.com/2026/02/18/godot_maintainers_struggle_with_draining/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2021/06/29/github_shutterstock.jpg"></enclosure>
<guid isPermaLink="false">2DZnrorv7vyEm8wY1Xx9Whzwt_xF6FfSG3MUbw==</guid>
<pubDate>Thu, 09 Apr 2026 21:35:04 +0000</pubDate>
<description>: GitHub itself to blame for AI slop pull requests, say devs</description>
<content:encoded>&lt;p&gt;Rémi Verschelde, a maintainer of the open source Godot game engine, is the latest to complain about the impact of &amp;quot;AI slop PRs [pull requests]&amp;quot;, which he &lt;a href=&quot;https://bsky.app/profile/akien.bsky.social/post/3meyerixvhs2p&quot;&gt;says&lt;/a&gt; &amp;quot;are becoming increasingly draining and demoralizing for Godot maintainers.&amp;quot;&lt;/p&gt;
&lt;p&gt;His post was prompted by a comment from Adriaan de Jongh, game designer and director of small gaming company Hidden Folks, who &lt;a href=&quot;https://bsky.app/profile/adriaan.games/post/3mexoxyaui22x&quot;&gt;said&lt;/a&gt; that LLM-generated PRs for Godot are a &amp;quot;massive time waster for reviewers ... changes often make no sense, descriptions are extremely verbose, users don&amp;#39;t understand their own changes ... it&amp;#39;s a total shitshow.&amp;quot;&lt;/p&gt;
&lt;p&gt;A comment noted that the Blender 3D design project is facing the same issue and has recently proposed an &lt;a href=&quot;https://devtalk.blender.org/t/ai-contributions-policy/44202&quot;&gt;AI contributions policy&lt;/a&gt;, following others including the Linux Foundation, Fedora, Firefox, Ghostty, Servo and LLVM.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;Verschelde appealed for &amp;quot;more funding so we can pay more maintainers to deal with the slop,&amp;quot; and also spoke of the conflict between being welcoming to new contributors to let &amp;quot;any engine user have the possibility to make an impact&amp;quot; while also dealing with the onslaught of useless PRs.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;&amp;quot;I don&amp;#39;t know how long we can keep it up,&amp;quot; he said.&lt;/p&gt;
&lt;p&gt;GitHub itself is to blame, according to some comments, since the company is a big AI advocate. &amp;quot;This platform incentivizes this kind of behavior,&amp;quot; &lt;a href=&quot;https://bsky.app/profile/yurisizov.bsky.social/post/3mexrz5b5i22x&quot;&gt;said&lt;/a&gt; one; and another &lt;a href=&quot;https://bsky.app/profile/chetsucks.com/post/3mextjgn2g22i&quot;&gt;that&lt;/a&gt; it &amp;quot;is just exhausting to watch all this play out and GitHub promoting this, not fighting it.&amp;quot;&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Linux distro Gentoo is &lt;a href=&quot;https://www.theregister.com/2026/02/17/gentoo_dumps_github_for_codeberg_over_copilot_nagware/&quot;&gt;in the process&lt;/a&gt; of migrating from GitHub to Codeberg thanks to &amp;quot;continuous efforts to force Copilot usage for our repositories.&amp;quot;&lt;/p&gt;
&lt;p&gt;One project, the self-hosting toolkit Coolify, has created an &lt;a href=&quot;https://github.com/peakoss/anti-slop&quot;&gt;Anti Slop GitHub Action&lt;/a&gt;, which its developer claims &amp;quot;could have closed 98 percent of slop PRs.&amp;quot; The developer is not opposed to AI itself, and stated that &amp;quot;AI is one of the best things to ever be released and when used with experience and properly according to project guidelines it will pass all checks.&amp;quot;&lt;/p&gt;
&lt;p&gt;GitHub director of open source programs Ashley Wolf &lt;a href=&quot;https://github.blog/open-source/maintainers/welcome-to-the-eternal-september-of-open-source-heres-what-we-plan-to-do-for-maintainers/&quot;&gt;acknowledged&lt;/a&gt; the problem of &amp;quot;what happens when low-quality contributions arrive at scale&amp;quot; last week, though choosing her words carefully so as not to blame AI itself. According to Wolf, &amp;quot;maintainers have always dealt with noisy inbound.&amp;quot; Nevertheless, GitHub is introducing features to make AI slop easier to deal with, including PR deletion from the GitHub UI (user interface) which she said is coming soon.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/17/gentoo_dumps_github_for_codeberg_over_copilot_nagware/&quot;&gt;Gentoo dumps GitHub over Copilot nagware&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/12/ai_bot_developer_rejected_pull_request/&quot;&gt;AI agent seemingly tries to shame open source developer for rejected pull request&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/04/ai_replace_saas/&quot;&gt;Rise of AI means companies could pass on SaaS&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/03/github_kill_switch_pull_requests_ai/&quot;&gt;GitHub ponders kill switch for pull requests to stop AI slop&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Wolf also mentioned relevant features that have already shipped, including the ability to limit PRs to collaborators or disable them entirely. And maintainers can enforce temporary interaction limits for specific users.&lt;/p&gt;
&lt;p&gt;Further refinements are under consideration. Wolf mentioned criteria-based gating, such as requiring that a PR be linked to an existing issue, or defining other rules that contributions must meet. There is also the inevitable suggestion that AI can be used to fix the problem it created, via automated triage.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Wolf&amp;#39;s post follows the creation of an official GitHub discussion on the subject earlier this month, as we &lt;a href=&quot;https://www.theregister.com/2026/02/03/github_kill_switch_pull_requests_ai/&quot;&gt;reported&lt;/a&gt;. A GitHub product manager contacted us to state that &amp;quot;we don&amp;#39;t think counting AI-generated PRs is the right metric,&amp;quot; showing again the tension between the company&amp;#39;s strong promotion of AI and the evidence of the damage it is doing to open source. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Copilot swallows your browser. You&#39;re welcome • The Register</title>
<link>https://www.theregister.com/2026/03/05/microsoft_adds_a_sidepane_for/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2024/03/21/copilot_shutterstock.jpg"></enclosure>
<guid isPermaLink="false">0lb0yXffOUxjIjlr5-2_cXI3G1r3KTHhXQA5WQ==</guid>
<pubDate>Thu, 09 Apr 2026 05:13:31 +0000</pubDate>
<description>: Embeds Edge into AI assistant, ignores questions about opt-in</description>
<content:encoded>&lt;p&gt;Microsoft is rolling out a Copilot update to Windows Insiders that embeds web browsing directly into the assistant, opening links in a side panel rather than launching your default browser.&lt;/p&gt;
&lt;p&gt;The &lt;a href=&quot;https://blogs.windows.com/windows-insider/2026/03/04/copilot-app-on-windows-opening-web-links-alongside-your-conversations-begins-rolling-out-to-windows-insiders/&quot;&gt;plan&lt;/a&gt; is that users of the Copilot app in Windows will show content in the assistant&amp;#39;s window &amp;quot;so you don&amp;#39;t lose context.&amp;quot;&lt;/p&gt;
&lt;div&gt;&lt;img src=&quot;https://regmedia.co.uk/2019/10/23/whackamole.jpg?x=174&amp;amp;amp;y=115&amp;amp;amp;crop=1&quot; alt=&quot;Whac-A-Mole game at amusement park&quot; title=&quot;&quot;/&gt;
&lt;h2&gt;Microsoft to auto-launch Copilot in Edge whenever you click a link from Outlook&lt;/h2&gt;
&lt;a href=&quot;https://www.theregister.com/2026/02/26/copilot_pane_edge_outlook/&quot;&gt;&lt;span&gt;READ MORE&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;p&gt;Copilot will also (with permission) have access to the context of tabs opened in that conversation, so the assistant can look across them when responding to user prompts. Opened tabs will be saved with the conversation so that they can be returned to, and, if a user chooses to enable it, passwords and form data can be synchronized.&lt;/p&gt;
&lt;p&gt;Enabling password and form data synchronization might give some users pause for thought, particularly after the &lt;a href=&quot;https://www.theregister.com/2025/04/11/microsoft_windows_recall/&quot;&gt;Windows Recall fiasco&lt;/a&gt;, but users worried about Redmond slurping data should probably consider an alternative to Windows anyway.&lt;/p&gt;
&lt;p&gt;At first glance, it looks like embedding Edge into Copilot via the WebView2 control is an attempt to steer the user away from their default browser. Convenient, yes. Good for competition, possibly not. We asked Microsoft whether this would be an opt-in experience and which browser was being used, but, other than acknowledging receipt of our questions, the company did not respond.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;The update has raised a few eyebrows among browser vendors. Bruce Lawson, Vivaldi&amp;#39;s Technical Communications Officer, told us: &amp;quot;If it&amp;#39;s not opt-in, then it&amp;#39;s bad behavior. Over the last 25 years, people have become accustomed to clicking links, and that opens their default browser with their preferred settings, stored passwords, preferred font size, and preferred security settings.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;&amp;quot;Pulling that rug from under users&amp;#39; feet is impertinent and discourteous. Whether it circumvents DMA or other competition regulations is for lawyers and regulators to decide, but the eternal arrogance of gatekeepers is self-evident.&amp;quot;&lt;/p&gt;
&lt;p&gt;The update is currently a preview and therefore subject to change. The rollout to all Insider Channels will be gradual (Vivaldi told us it had yet to see the build).&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/03/firefox_ai_kill_switch/&quot;&gt;Firefox makes AI optional, like it probably should have been all along&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/03/microsoft_365_e7_rumors/&quot;&gt;Microsoft reportedly eyes E7 tier to make AI agents pay their way – like the humans they&amp;#39;ll replace&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/02/24/west_midlands_police_copilot/&quot;&gt;West Midlands Police earn red card over Copilot&amp;#39;s imaginary football match&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/01/29/vivaldi_release_ai/&quot;&gt;Latest Vivaldi release surfs a wave of anti-AI sentiment&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Copilot app is also being tweaked elsewhere. Microsoft stated: &amp;quot;As part of this update, some features like Podcasts and Study and Learn mode from Copilot.com are getting added, while others may be pulled back while we iterate on the experience; we will add priority features back in before the updated app is generally available.&amp;quot;&lt;/p&gt;
&lt;p&gt;For Copilot app users, opening web links alongside conversations is perhaps a useful feature. However, for browser vendors already dealing with Microsoft&amp;#39;s preferred way of doing things, the update could be seen as another attempt to keep a user safely within Redmond&amp;#39;s purview.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;&lt;em&gt;The Reg&lt;/em&gt; doubts some of our readers will approve either. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>Users fume at Outlook.com email &#39;carnage&#39; • The Register</title>
<link>https://www.theregister.com/2026/03/04/users_fume_at_outlookcom_email/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2023/10/24/stop_shutterstock.jpg"></enclosure>
<guid isPermaLink="false">-NxM3tKDeoEnEy3L6X83zBvJ5lIw4glKXbCtLQ==</guid>
<pubDate>Thu, 09 Apr 2026 05:13:31 +0000</pubDate>
<description>Updated: Email flow slowed or stopped by mysterious forces at Microsoft</description>
<content:encoded>&lt;p&gt;&lt;span&gt;Updated&lt;/span&gt; Microsoft spent last week rejecting emails to Outlook recipients after what appears to be either a fault or overzealous blocking rules.&lt;/p&gt;
&lt;p&gt;The problem affects certain IP addresses, whose emails are rejected due to falling foul of reputation rules or appearing on a block list.&lt;/p&gt;
&lt;p&gt;A &lt;i&gt;Register&lt;/i&gt; reader told us, &amp;quot;At the back end of January we noticed a sudden spike in customers static IP&amp;#39;s being rejected by only Microsoft Outlook free / personal accounts.&amp;quot;&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;The message returned was a 550, telling customers to contact their Internet Service Provider (ISP) &amp;quot;since part of their network is on our block list.&amp;quot;&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;A block list is a good thing. It helps stem the flow of spam from networks or addresses associated with junk email. However, the confusing thing for our reader is that his company was not on Microsoft&amp;#39;s naughty step for email. A glance at Microsoft&amp;#39;s &lt;a href=&quot;https://sendersupport.olc.protection.outlook.com/snds/Index&quot;&gt;Smart Network Data Service (SNDS)&lt;/a&gt; showed no issues with the IP.&lt;/p&gt;
&lt;p&gt;&amp;quot;We&amp;#39;re also a member of their JMRP (Junk Mail Reporting Program),&amp;quot; our reader went on, &amp;quot;which is intended to inform us when people are reporting spam sent from our IP&amp;#39;s - except, we never get any reports.&amp;quot;&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;The problem worsened in February. On Microsoft&amp;#39;s support forums, users began to complain about similar issues as the IP net presumably widened. One &lt;a href=&quot;https://learn.microsoft.com/en-us/answers/questions/5786144/all-sending-ips-temporarily-rate-limited-(451-4-7&quot;&gt;wrote&lt;/a&gt; &amp;quot;We are currently experiencing a critical and recurring email delivery issue affecting recipients at outlook.com, live.com, hotmail.com, and msn.com,&amp;quot; and provided a copy of an error that suggested that the mail server has been &amp;quot;temporarily rate limited due to IP reputation.&amp;quot;&lt;/p&gt;
&lt;p&gt;The user drily noted, &amp;quot;Although the error indicates rate limiting, in practice no emails are being delivered.&amp;quot;&lt;/p&gt;
&lt;p&gt;A large number of users, ranging from the administrator of a server sending automated notifications on behalf of Estonian Public Libraries to an email provider for healthcare professionals, chimed in to confirm that they, too, were having delivery problems and that Microsoft support was not helpful.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;Our reader told us, &amp;quot;We&amp;#39;ve seen customers struggling to send invoices, order delivery notifications, authentication codes - all sorts, which have been perfectly acceptable to Microsoft / Outlook for many years - now rejected, or blocked.&lt;/p&gt;
&lt;p&gt;&amp;quot;Customers rarely read, or understand DSN&amp;#39;s - they jump to blaming the ISP or sender, and then head off to find someone else.&amp;quot;&lt;/p&gt;
&lt;p&gt;Unsurprisingly, our reader spoke on condition of anonymity. After all, nobody wants to be the ISP that has to say, &amp;quot;Yeah, we can deliver your email anywhere but Outlook.com&amp;quot; to customers.&lt;/p&gt;
&lt;p&gt;We asked Microsoft if it had any comment to make, but other than acknowledging our questions, the company did not respond.&lt;/p&gt;
&lt;p&gt;Blocking email from spammers is a good thing, and anything that reduces the amount of junk that clutters up inboxes is to be applauded. However, when there is an error, customers need a rapid and transparent process for resolution. Every failed delivery of an invoice or receipt due to overzealous or misapplied rules can chip away at a business&amp;#39;s reputation, through no fault of the owner. ®&lt;/p&gt;
&lt;p&gt;
  &lt;strong&gt;Updated at 13.33 UTC on March 6, 2025, to add:&lt;/strong&gt;
&lt;/p&gt;
&lt;p&gt;Microsoft has finally responded, days after this article was published. A spokesperson told &lt;em&gt;The Register&lt;/em&gt;:&lt;/p&gt;
&lt;p&gt;&amp;quot;We are working to address a temporary rate‑limit issue that may be causing some messages to be incorrectly throttled when sent from a specific IP address. Customers who continue to experience issues sending emails should contact our Support team or raise a ticket in their Admin portal to apply the appropriate mitigation.&amp;quot;&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
<item>
<title>HR may have to cajolle employees to use AI: Gartner • The Register</title>
<link>https://www.theregister.com/2026/03/04/gartner_ai_hr_help/</link>
<enclosure type="image/jpeg" length="0" url="https://regmedia.co.uk/2018/05/31/shuttertsock_hand_outstreched_drown.jpg"></enclosure>
<guid isPermaLink="false">rthxJe4n-d8k_9lCMwlVH7fK9ovGtZx4_9rT1A==</guid>
<pubDate>Thu, 09 Apr 2026 05:13:31 +0000</pubDate>
<description>: Employees need guidance and support if companies really want to commit to AI adoption</description>
<content:encoded>&lt;p&gt;If you buy AI, employees will come and take a look, but they won&amp;#39;t necessarily change the way they work. For that, you may have to get human resources involved.&lt;/p&gt;
&lt;p&gt;IT consultancy Gartner says as much in its &lt;a href=&quot;https://www.gartner.com/en/newsroom/press-releases/2026-3-4-gartner-hr-survey-reveals-45-percent-of-managers-report-ai-has-lived-up-to-their-expectations&quot;&gt;recent report&lt;/a&gt; &amp;quot;Guide Managers to Effectively Integrate AI Into Employees&amp;#39; Work.&amp;quot;&lt;/p&gt;
&lt;p&gt;The enterprise whisperer says that its July 2025 survey of nearly 3,000 employees showed that 46 percent of managers are experimenting with AI to improve their work, compared to just 26 percent of employees.&lt;/p&gt;

    &lt;div&gt;
        
    &lt;/div&gt;

&lt;p&gt;A separate survey conducted at the same time found that just 14 percent of managers said that they didn&amp;#39;t face any challenges encouraging their teams to use AI. AI tools, in other words, don&amp;#39;t sell themselves (except perhaps in software development).&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;


        &lt;div&gt;
            &lt;div&gt;
                
            &lt;/div&gt;
        &lt;/div&gt;

&lt;p&gt;From this, Carmen von Rohr, senior principal in Gartner&amp;#39;s HR practice, concludes that chief human resource officers have relied too much on employees to integrate AI tools into their jobs. To improve AI adoption, CHROs are advised to focus on supporting managers to undertake the organizational change necessary to meet the expectations of senior leadership.&lt;/p&gt;
&lt;p&gt;More than any prior technology, Gartner argues, AI implementation requires change management.&lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;In other words, HR leaders need to focus on communication and sensitivity to employee needs. If managers rush to implement business transformation plans, they risk creating &amp;quot;operational and emotional resistance&amp;quot; among employees. Just as asking IT professionals to train their overseas replacements risks rebellion, urging employees to embrace AI coworking can create pushback, especially if accompanied by layoffs. &lt;/p&gt;
&lt;p&gt;Given that 46 percent of US voters believe AI will hurt the economy, according to a recent &lt;a href=&quot;https://www.dataforprogress.org/blog/2026/3/4/voters-increasingly-think-artificial-intelligence-will-hurt-the-economy&quot;&gt;Data for Progress poll&lt;/a&gt;, some forethought seems advisable.&lt;/p&gt;
&lt;ul&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/04/ai_doctor_easily_swayed/&quot;&gt;AI doctor&amp;#39;s assistant is easily swayed to change prescriptions, give bad medical advice&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/04/aws_saas_middle_east_customer_warnings/&quot;&gt;AWS-hosted tech providers urge Middle East customers to fail over now&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/04/openai_dow_reset_gpt53_instant/&quot;&gt;OpenAI says its latest model is less likely to beat around the bush&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href=&quot;https://www.theregister.com/2026/03/04/google_speeds_chrome_release_cadence/&quot;&gt;Google feels the need for security speed, so will ship Chrome updates every two weeks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Gartner would have CHROs help managers with their AI integration efforts by looking at the needs and expectations of different teams in terms of AI training and support. HR leaders should also prepare managers for potential emotional resistance from employees and for communicating effectively with senior leaders who may not have realistic expectations.&lt;/p&gt;
&lt;p&gt;In addition, the consultancy sees a role for HR leaders in clarifying how potential AI-related productivity gains should be allocated – a return on investment that &lt;a href=&quot;https://www.theregister.com/2026/01/20/pwc_ai_ceo_survey/&quot;&gt;the majority of CEOs still haven&amp;#39;t seen&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;That recommendation follows from a July 2025 Gartner survey of 114 HR leaders that found a mere 7 percent of organizations offer guidance about how one should use time savings derived from AI tools. &lt;/p&gt;

        &lt;div&gt;
            
        &lt;/div&gt;

&lt;p&gt;And before that question can even be answered, companies need to settle internal disagreements about how projected time saved should be allocated. Based on the survey, 55 percent of HR leaders preferred to see saved time applied to projects outside of core job roles, compared to just 28 percent of managers.&lt;/p&gt;
&lt;p&gt;Debating how AI&amp;#39;s supposed productivity bounty will be spent seems premature, however, when organizations are still struggling to sell their workers on AI. ®&lt;/p&gt;                                &lt;div&gt;
                                    
                                &lt;/div&gt;</content:encoded>
</item>
</channel>
</rss>
