Social Networks

Trump, Who Promised To Save TikTok, Threatens To Shut Down TikTok (arstechnica.com) 111

An anonymous reader quotes a report from Ars Technica: Donald Trump vowed to save TikTok before taking office, claiming only he could make a deal to keep the app operational in the US despite national security concerns. But then, he put Vice President JD Vance in charge of the deal, and after months of negotiations, the US still doesn't seem to have found terms for a sale that the Chinese government is willing to approve. Now, Trump Commerce Secretary Howard Lutnick has confirmed that if China won't approve the latest version of the deal -- which could result in a buggy version of TikTok made just for the US -- the administration is willing to shut down TikTok. And soon.

On Thursday, Lutnick told CNBC that TikTok would stop operating in the US if China and TikTok owner ByteDance won't sell the app to buyers that Trump lined up, along with control over TikTok's algorithm. Under the deal Trump is now pushing, "China can have a little piece or ByteDance, the current owner, can keep a little piece," Lutnick said. "But basically, Americans will have control. Americans will own the technology, and Americans will control the algorithm." However, ByteDance's board has long maintained that the US can alleviate its national security fears -- that China may be using the popular app to manipulate and spy on Americans -- without forcing a sale. In January, a ByteDance board member, Bill Ford, told World Economic Forum attendees that a non-sale option "could involve a change of control locally to ensure" TikTok "complies with US legislation" without selling off the app or its algorithm.

At this point, Lutnick suggested that the US is unwilling to bend on the requirement that the US control the recommendation algorithm, which is viewed as the secret sauce that makes the app so popular globally. ByteDance may be unwilling to sell the algorithm partly because then it would be sharing its core intellectual property with competitors in the US. Earlier this month, Trump had claimed that he wasn't "confident" that China would approve the deal, even though he thought it was "good for China." Analysts have suggested that China views TikTok as a bargaining chip in its tariff negotiations with Trump, which continue to not go smoothly, and it may be OK with the deal but unwilling to release the bargaining chip without receiving key concessions from the US. For now, the US and China are enjoying a 90-day truce that could end in August, about a month before the deadline Trump set to sell TikTok in mid-September.

United States

US Nuclear Weapons Agency 'Among 400 Organizations Breached By Chinese Hackers' (slashdot.org) 26

A cyber-espionage campaign exploiting unpatched Microsoft SharePoint vulnerabilities has breached approximately 400 organizations worldwide, including the US National Nuclear Security Administration, according to Netherlands-based cybersecurity firm Eye Security. The figure represents a four-fold increase from 100 organizations cataloged over the weekend, with researchers calling it likely an undercount since not all attack vectors leave detectable artifacts.

Microsoft identified three Chinese groups -- state-backed Linen Typhoon and Violet Typhoon, plus China-based Storm-2603 -- as exploiting the vulnerabilities in on-premises SharePoint servers to steal authentication credentials and execute malicious code remotely. The campaign began July 7 and was first detected July 18 when Eye Security found unusual activity on a customer's server. Victims include the US Energy Department, Education Department, Florida's Department of Revenue, Rhode Island General Assembly, and European and Middle Eastern governments.
United States

Funding For Program To Stop Next Stuxnet From Hitting US Expired Sunday (theregister.com) 45

Government funding for a program that hunts for threats on America's critical infrastructure networks expired on Sunday, preventing Lawrence Livermore National Laboratory from analyzing activity that could indicate a cyberattack, the program director told Congress on Tuesday. From a report: Nate Gleason leads a team at Lawrence Livermore National Laboratory (LLNL) focused on nation-state threats against critical infrastructure, and this includes the CyberSentry Program.

It's a public-private partnership, managed by CISA, that looks for malicious activity on IT and operational technology (OT) networks in America's energy, water, healthcare, and other critical facilities. This includes threats along the lines of China's Volt Typhoon and Salt Typhoon intrusions -- network activity that may look like, or even start as, espionage, but ultimately enables the digital invaders to backdoor critical orgs and deploy cyber weapons to aid in a kinetic war.

AI

Nvidia's CUDA Platform Now Support RISC-V (tomshardware.com) 20

An anonymous reader quotes a report from Tom's Hardware: At the 2025 RISC-V Summit in China, Nvidia announced that its CUDA software platform will be made compatible with the RISC-V instruction set architecture (ISA) on the CPU side of things. The news was confirmed during a presentation during a RISC-V event. This is a major step in enabling the RISC-V ISA-based CPUs in performance demanding applications. The announcement makes it clear that RISC-V can now serve as the main processor for CUDA-based systems, a role traditionally filled by x86 or Arm cores. While nobody even barely expects RISC-V in hyperscale datacenters any time soon, RISC-V can be used on CUDA-enabled edge devices, such as Nvidia's Jetson modules. However, it looks like Nvidia does indeed expect RISC-V to be in the datacenter.

Nvidia's profile on RISC-V seems to be quite high as the keynote at the RISC-V Summit China was delivered by Frans Sijsterman, who appears to be Vice President of Hardware Engineering at Nvidia. The presentation outlined how CUDA components will now run on RISC-V. A diagram shown at the session illustrated a typical configuration: the GPU handles parallel workloads, while a RISC-V CPU executes CUDA system drivers, application logic, and the operating system. This setup enables the CPU to orchestrate GPU computations fully within the CUDA environment. Given Nvidia's current focus, the workloads must be AI-related, yet the company did not confirm this. However, there is more.

Also featured in the diagram was a DPU handling networking tasks, rounding out a system consisting of GPU compute, CPU orchestration, and data movement. This configuration clearly suggests Nvidia's vision to build heterogeneous compute platforms where RISC-V CPU can be central to managing workloads while Nvidia's GPUs, DPUs, and networking chips handle the rest. Yet again, there is more. Even with this low-profile announcement, Nvidia essentially bridges proprietary CUDA stack to an open architecture, one that seems to develop fast in China. Yet, being unable to ship flagship GB200 and GB300 offerings to China, the company has to find ways to keep its CUDA thriving.

Security

'Tens of Thousands' of SharePoint Servers at Risk. Microsoft Issues No Patch (msn.com) 90

"Anybody who's got a hosted SharePoint server has got a problem," the senior VP of cybersecurity firm CrowdStrike told the Washington Post. "It's a significant vulnerability."

And it's led to a new "global attack on government agencies and businesses" in the last few days, according to the article, "breaching U.S. federal and state agencies, universities, energy companies and an Asian telecommunications company, according to state officials and private researchers..."

"Tens of thousands of such servers are at risk, experts said, and Microsoft has issued no patch for the flaw, leaving victims around the world scrambling to respond." (Microsoft says they are "working on" security updates "for supported versions of SharePoint 2019 and SharePoint 2016," offering various mitigation suggestions, and CISA has released their own recommendations.)

From the Washington Post's article Sunday: Microsoft has suggested that users make modifications to SharePoint server programs or simply unplug them from the internet to stanch the breach. Microsoft issued an alert to customers but declined to comment further... "We are seeing attempts to exploit thousands of SharePoint servers globally before a patch is available," said Pete Renals, a senior manager with Palo Alto Networks' Unit 42. "We have identified dozens of compromised organizations spanning both commercial and government sectors.''

With access to these servers, which often connect to Outlook email, Teams and other core services, a breach can lead to theft of sensitive data as well as password harvesting, Netherlands-based research company Eye Security noted. What's also alarming, researchers said, is that the hackers have gained access to keys that may allow them to regain entry even after a system is patched. "So pushing out a patch on Monday or Tuesday doesn't help anybody who's been compromised in the past 72 hours," said one researcher, who spoke on the condition of anonymity because a federal investigation is ongoing.

The breaches occurred after Microsoft fixed a security flaw this month. The attackers realized they could use a similar vulnerability, according to the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency. CISA spokeswoman Marci McCarthy said the agency was alerted to the issue Friday by a cyber research firm and immediately contacted Microsoft... The nonprofit Center for Internet Security, which staffs an information-sharing group for state and local governments, notified about 100 organizations that they were vulnerable and potentially compromised, said Randy Rose, the organization's vice president. Those warned included public schools and universities. Others that were breached included a government agency in Spain, a local agency in Albuquerque and a university in Brazil, security researchers said.

But there's many more breaches, according to the article:
  • "Eye Security said it has tracked more than 50 breaches, including at an energy company in a large state and several European government agencies."
  • "At least two U.S. federal agencies have seen their servers breached, according to researchers."
  • "One state official in the eastern U.S. said the attackers had 'hijacked' a repository of documents provided to the public to help residents understand how their government works. The agency involved can no longer access the material..."

"It was not immediately clear who is behind the hacking of global reach or what its ultimate goal is. One private research company found the hackers targeting servers in China..."


China

Chinese Companies Now Authorized to Conduct Foreign Cyberattacks, Sell Access to Government (msn.com) 57

"The U.S. is absolutely facing the most serious Chinese hacking ever." That's what the Washington Post was told by a China-focused consultant at security company SentinelOne: Undeterred by recent indictments alleging widespread cyberespionage against American agencies, journalists and infrastructure targets, Chinese hackers are hitting a wider range of targets and battling harder to stay inside once detected, seven current and former U.S. officials said in interviews. Hacks from suspected Chinese government actors detected by the security firm CrowdStrike more than doubled from 2023 to more than 330 last year and continued to climb as the new administration took over, the company said... Although the various Chinese hacking campaigns seem to be led by different government agencies and have different goals, all benefit from new techniques and from Beijing's introduction of a less constrained system for cyber offense, the officials and outside researchers told The Washington Post... Chinese intelligence, military and security agencies previously selected targets and tasked their own employees with breaking in, they said. But the Chinese government decided to take a more aggressive approach by allowing private industry to conduct cyberattacks and hacking campaigns on their own, U.S. officials said.

The companies are recruiting top hackers who discover previously unknown, or "zero-day," flaws in software widely used in the United States. Then the companies search for where the vulnerable programs are installed, hack a great many of them at once, and then sell access to multiple Chinese government customers and other security companies. That hacking-for-hire approach creates hundreds of U.S. victims instead of a few, making it hard to block attacks and to decide which were China's key targets and which were unintentionally caught in the hacks, an FBI official said, speaking on the condition of anonymity to follow agency practices... "The result of that incentive structure is that there is significantly more hacking...."

China has mastered the ability to move undetected through networks of compromised U.S. devices, so that the final connection to a target appears to be an ordinary domestic connection. That makes it easy to get around technology that blocks overseas links and puts it outside the purview of the National Security Agency, which by law must avoid scrutinizing most domestic transmissions. Beijing is increasingly focused on hacking software and security vendors that provide access to many customers at once, the FBI official said. Once access is obtained, the hackers typically add new email and collaboration accounts that look legitimate... Beyond the increased government collaboration with China's private security sector is occasional collaborating with criminal groups, said Ken Dunham, an analyst at the security firm Qualys.

The article notes that China's penetration of U.S. telecom carriers "is still not fully contained, according to the current and former officials." But in addition, the group behind that attack "has more recently shown up inside core communications infrastructure in Europe, according to John Carlin, a former top national security official in the Justice Department who represents some U.S. victims of the group." And documents leaked last year from a security contractor that works with the Chinese military and other government groups "described contracts and targets in 20 countries, with booty including Indian immigration data, logs of calls in South Korea, and detailed information on roads in Taiwan.

"It also detailed prices for some services, such as $25,000 for promised remote access to an iPhone, payment disputes with government customers and employee gripes about long hours..."
Microsoft

Microsoft To Stop Using Engineers In China For Tech Support of US Military (reuters.com) 51

Microsoft will stop using China-based engineers to support U.S. military cloud services after a ProPublica report revealed their involvement, prompting backlash from Senator Tom Cotton and a two-week Pentagon review ordered by Defense Secretary Pete Hegseth. In response, Hegseth announced an immediate ban on any Chinese involvement in Department of Defense cloud contracts. Reuters reports: The report detailed Microsoft's use of Chinese engineers to work on U.S. military cloud computing systems under the supervision of U.S. "digital escorts" hired through subcontractors who have security clearances but often lacked the technical skills to assess whether the work of the Chinese engineers posed a cybersecurity threat. [Microsoft] told ProPublica it disclosed its practices to the U.S. government during an authorization process.

On Friday, Microsoft spokesperson Frank Shaw said on social media website X the company changed how it supports U.S. government customers "in response to concerns raised earlier this week ... to assure that no China-based engineering teams are providing technical assistance" for services used by the Pentagon.

The Courts

Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (securityweek.com) 14

Google has filed a lawsuit to dismantle the sprawling Badbox 2.0 botnet, which infected over 10 million Android devices with pre-installed malware. Badbox 2.0 "is already the largest known botnet of internet-connected TV devices, and it grows each day. It has harmed millions of victims in the United States and around the world and threatens many more," Google said in its complaint. SecurityWeek reports: The internet giant cautions that, while it has been used mainly for fraud, the botnet could be used for more harmful types of cybercrime, such as ransomware or distributed denial-of-service (DDoS) attacks. In addition to pre-installing the malware on devices, Badbox 2.0's operators also tricked users into installing infected applications that provided them with further access to their personal devices, Google says. As part of their operation, the individuals behind Badbox 2.0 sold access to the infected devices to be used as residential proxies, and conducted ad fraud schemes by abusing these devices to create fake ad views or to exploit pay-per-click compensation models, the company continues. The internet giant also points out that this is the second global botnet the perpetrators have built, after the initial Badbox botnet was disrupted by German law enforcement in 2023.

According to Google, Badbox 2.0 is operated by multiple cybercrime groups from China, each having a different role in maintaining the botnet, such as establishing infrastructure, developing and pre-installing the malware on devices, and conducting fraud. "The BadBox 2.0 Enterprise includes several connected threat actor groups that design and implement complex criminal schemes targeting internet-connected devices both before and after the consumer receives the device," Google says. "While each member of the Enterprise plays a distinct role, they all collaborate to execute the BadBox 2.0 Scheme. All of the threat actor groups are connected to one another through the BadBox 2.0 shared C2 infrastructure and historical and current business ties," the company continues.

Communications

SES Completes $3 Billion Acquisition of Intelsat, Expanding Global Satellite Fleet (ses.com) 4

"The Luxembourg-based satellite company SES has now completed its acquisition of the European-based satellite company Intelsat, giving the combined company 120 active satellites in a variety of low and high Earth orbits," writes longtime Slashdot reader schwit1. "Both companies are long established, with Intelsat initially founded in the mid-1960s as a consortium of 23 nations aimed at launching the first geosynchronous communications satellites over the Atlantic and Pacific serving most of the Old World and linked to the New. The merger is an attempt by both companies to compete with the new low-orbit constellations of SpaceX, Amazon, and from China." From a press release: With a world-class network including approximately 90 geostationary (GEO), nearly 30 medium earth orbit (MEO) satellites, strategic access to low earth orbit (LEO) satellites, and an extensive ground network, SES can now deliver connectivity solutions utilizing complementary spectrum bands including C-, Ku-, Ka-, Military Ka-, X-band, and Ultra High Frequency. The expanded capabilities of the combined company will enable it to deliver premium-quality services and tailored solutions to its customers. The company's assets and networks, once fully integrated, will put SES in a strong competitive position to better serve the evolving needs of its customers including governments, aviation, maritime, and media across the globe. "Our focus is clear: to grow, to lead in high-potential markets, and to shape the future of our industry," said SES CEO Adel Al-Saleh in a statement. "This is a long-term play, and we are building with the future in mind -- growing year after year, expanding our capabilities, and creating lasting value for our customers and shareholders alike."

Fierce Network notes that the FCC is preparing to auction upper C-band spectrum (3.98-4.2 GHz), previously cleared in part by SES and Intelsat and now eyed for 5G expansion by Verizon and AT&T. With new legislative backing and industry pressure, including from CTIA and FCC Chairman Brendan Carr, the agency is being urged to act quickly to auction and open this spectrum for full-power wireless use.
The Military

Ukrainian Hackers Claim To Have Destroyed Major Russian Drone Maker's Entire Network (theregister.com) 274

Ukrainian hacker group BO Team, with help from the Ukrainian Cyber Alliance and possibly Ukraine's military, claims to have wiped out one of Russia's largest military drone manufacturers, destroying 47TB of production data and even disabling the doors in the facility. "Or, as described by the hacking collective (per Google translate), they 'deeply penetrated' the drone manufacturer 'to the very tonsils of demilitarization and denazification,'" reports The Register. From the report: BO Team (also known as Black Owl) announced the breach on its Telegram channel, and claimed to have carried out the operation alongside fellow hackers the Ukrainian Cyber Alliance "and one very well-known organization, the mention of which makes Vanya's bottle receivers explode," according to a Google translation of the Russian text. While the "very well-known organization" isn't named, BO Team included a link to Ukraine's Ministry of Defence.

The military intelligence agency, working alongside the attackers, "carried out large-scale work to capture the entire network and server infrastructure of Gaskar Group, collect valuable information about the UAVs being produced and prospective, and then destroy the information and disable this infrastructure," the Telegram post continued. This reportedly included 47TB of technical information about the production of Russian drones, and BO Team claims to have destroyed all of the information on Gaskar's servers, including 10TB of backup files. "By the way, from the information we received, China is providing assistance in the production and training of specialists of Gaskar Group," the hackers added via Telegram. BO Team also posted what they claim to be confidential employee questionnaires [PDF].

On their own Telegram channel, the Ukrainian Cyber Alliance said they also stole "all the source code" before destroying everything. "The network went down so thoroughly that the doors in the building were blocked," the pro-Ukraine crew wrote, per Google translate. "To open them, the administration had to turn on the fire alarm. Most likely, the defense order is on the verge of failure, and thousands of drones will not get to the front in the near future."

Medicine

Cancer Death Rates Fall One-Third in US Since 1990s as Prevention Efforts Take Hold (economist.com) 105

Cancer death rates in the U.S. have fallen by approximately one-third since the 1990s when adjusted for age, according to data cited in a new analysis of global cancer trends. The decline represents a steady, year-over-year reduction that began in the early 1990s and continues across developed countries.

Prevention efforts have contributed substantially to the decline. Reduced smoking rates in wealthy nations prevented more than 3 million cancer deaths since 1975 in America alone. Britain's HPV vaccination program, launched in 2008 for teenage girls, produced a 90% reduction in cervical cancer rates among women in their 20s within 15 years. Treatment advances have transformed outcomes for specific cancers. Childhood leukemia, once virtually fatal, now has a five-year survival rate above 90%.

Researchers have identified inexpensive drugs with cancer-prevention properties, including aspirin, which cuts bowel cancer risk in half for patients with Lynch syndrome. Future progress faces obstacles, however, including high treatment costs and planned cuts to the National Cancer Institute under the Trump administration. China overtook America as the primary source of cancer research in 2025.
Privacy

Chinese Authorities Are Using a New Tool To Hack Seized Phones and Extract Data (techcrunch.com) 40

An anonymous reader quotes a report from TechCrunch: Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages -- including from chat apps such as Signal -- images, location histories, audio recordings, contacts, and more. In a report shared exclusively with TechCrunch, mobile cybersecurity company Lookout detailed the hacking tool called Massistant, which the company said was developed by Chinese tech giant Xiamen Meiya Pico.

Massistant, according to Lookout, is Android software used for the forensic extraction of data from mobile phones, meaning the authorities using it need to have physical access to those devices. While Lookout doesn't know for sure which Chinese police agencies are using the tool, its use is assumed widespread, which means Chinese residents, as well as travelers to China, should be aware of the tool's existence and the risks it poses. [...]

The good news ... is that Massistant leaves evidence of its compromise on the seized device, meaning users can potentially identify and delete the malware, either because the hacking tool appears as an app, or can be found and deleted using more sophisticated tools such as the Android Debug Bridge, a command line tool that lets a user connect to a device through their computer. The bad news is that at the time of installing Massistant, the damage is done, and authorities already have the person's data.
"It's a big concern. I think anybody who's traveling in the region needs to be aware that the device that they bring into the country could very well be confiscated and anything that's on it could be collected," said Kristina Balaam, a researcher at Lookout who analyzed the malware. "I think it's something everybody should be aware of if they're traveling in the region."
China

Chinese Firms Rush For Nvidia Chips As US Prepares To Lift Ban (arstechnica.com) 51

An anonymous reader quotes a report from Ars Technica: Chinese firms have begun rushing to order Nvidia's H20 AI chips as the company plans to resume sales to mainland China, Reuters reports. The chip giant expects to receive US government licenses soon so that it can restart shipments of the restricted processors just days after CEO Jensen Huang met with President Donald Trump, potentially generating $15 billion to $20 billion in additional revenue this year. Nvidia said in a statement that it is filing applications with the US government to resume H20 sales and that "the US government has assured Nvidia that licenses will be granted, and Nvidia hopes to start deliveries soon." [...]

The H20 chips represent Nvidia's most capable AI processors legally available in China, though they contain less computing power than versions sold elsewhere due to export restrictions imposed in 2022. Nvidia is currently banned from selling its most powerful GPUs in China. Despite these limitations, Chinese tech giants, including ByteDance and Tencent, are reportedly scrambling to place orders for the lesser chip through what sources describe as an approved list managed by Nvidia. "The Chinese market is massive, dynamic, and highly innovative, and it's also home to many AI researchers," Reuters reports Huang telling Chinese state broadcaster CCTV during his visit to Beijing, where he is scheduled to speak at a supply chain expo on Wednesday. "Therefore, it is indeed crucial for American companies to establish roots in the Chinese market."

The resumption of H20 sales marks a shift in US-China technology relations after the chips were effectively banned in April with an onerous export license requirement, forcing Nvidia to take a $4.5 billion write-off for excess inventory and purchase obligations. According to Reuters, Chinese sales generated $17 billion in revenue for Nvidia in the fiscal year ending January 26, representing 13 percent of total sales. Nvidia also announced it will introduce a new "RTX Pro" chip model specifically tailored to meet regulatory rules in the Chinese market, though the company provided no details about its specifications or capabilities.

Microsoft

Microsoft Uses Chinese Engineers To Maintain Defense Department Systems Under Minimal US Oversight 63

Microsoft employs engineers in China to help maintain Defense Department computer systems, with U.S. citizens serving as "digital escorts" to oversee the foreign workers, according to a ProPublica investigation. The escorts often lack advanced technical expertise to police engineers with far more sophisticated skills, and some are former military personnel paid barely above minimum wage.

"We're trusting that what they're doing isn't malicious, but we really can't tell," one current escort told the publication. The arrangement, critical to Microsoft winning federal cloud computing contracts a decade ago, handles sensitive but unclassified government data including materials that directly support military operations. Former CIA and NSA executive Harry Coker called the system a natural opportunity for spies, saying "If I were an operative, I would look at that as an avenue for extremely valuable access."
AI

China's Moonshot Launches Free AI Model Kimi K2 That Outperforms GPT-4 In Key Benchmarks 41

Chinese AI startup Moonshot AI has released Kimi K2, a trillion-parameter open-source language model that outperforms GPT-4 in key benchmarks with particularly strong performance on coding and autonomous agent tasks. VentureBeat reports: The new model, called Kimi K2, features 1 trillion total parameters with 32 billion activated parameters in a mixture-of-experts architecture. The company is releasing two versions: a foundation model for researchers and developers, and an instruction-tuned variant optimized for chat and autonomous agent applications. "Kimi K2 does not just answer; it acts," the company stated in its announcement blog. "With Kimi K2, advanced agentic intelligence is more open and accessible than ever. We can't wait to see what you build."

The model's standout feature is its optimization for "agentic" capabilities -- the ability to autonomously use tools, write and execute code, and complete complex multi-step tasks without human intervention. In benchmark tests, Kimi K2 achieved 65.8% accuracy on SWE-bench Verified, a challenging software engineering benchmark, outperforming most open-source alternatives and matching some proprietary models. [...] On LiveCodeBench, arguably the most realistic coding benchmark available, Kimi K2 achieved 53.7% accuracy, decisively beating DeepSeek-V3's 46.9% and GPT-4.1's 44.7%. More striking still: it scored 97.4% on MATH-500 compared to GPT-4.1's 92.4%, suggesting Moonshot has cracked something fundamental about mathematical reasoning that has eluded larger, better-funded competitors.

But here's what the benchmarks don't capture: Moonshot is achieving these results with a model that costs a fraction of what incumbents spend on training and inference. While OpenAI burns through hundreds of millions on compute for incremental improvements, Moonshot appears to have found a more efficient path to the same destination. It's a classic innovator's dilemma playing out in real time -- the scrappy outsider isn't just matching the incumbent's performance, they're doing it better, faster, and cheaper.
Japan

Japanese AI Adoption Remains Drastically Below Global Leaders (nhk.or.jp) 28

A Japanese government survey found 26.7% of people in Japan used generative AI during fiscal 2024, which ended in March. The figure tripled from the previous year but remained far behind China's 81.2% and the United States' 68.8%.

People in their 20s led Japanese adoption at 44.7%, followed by those in their 40s and 30s. Among companies, 49.7% of Japanese firms planned to use generative AI, compared to more than 80% of companies in China and the US.
Transportation

China's Omoway Announces a New Self-Driving Electric Scooter Named 'Omo X' (electrek.co) 10

Electrek reports on the new Omo X, a scooter planned for release in 2026 that's "full of premium tech features that blur the lines between e-scooter and self-driving EV." At its recent launch in Jakarta, the Omo X didn't just sit pretty center stage, it actually drove itself onto the stage using its "Halo Pilot" system, which apparently comes complete with adaptive cruise control, remote summon, self-parking, and even automatic reversing and self-balancing at low speeds. This is legit autonomous behavior previously reserved for cars, now shrunk down and smoothed out for a two-wheeler. Under the hood — or rather, behind the sleek bodywork — Omoway's Halo architecture delivers collision warning, emergency-brake assist, blind spot monitoring, and V2V [vehicle-to-vehicle] communication.

The frame is modular, too. It can be reconfigured in step-through, straddle, or touring posture to suit casual riders, commuters, and motorcycle wannabes alike. That kind of flexibility isn't just a marketing gimmick, but rather it looks purpose-built to capture diverse motorcycle-heavy markets like Indonesia, which counts over 120 million two-wheelers and is quickly transitioning to electric models... It's tech-rich, head-turning, and seems built to evolve with software updates. The remote summon and AI-assisted features could genuinely simplify urban mobility, and tricks like automatically driving itself to a charging station sound legitimately useful...

[But] Omoway's vision here will have to carry extra sensors, actuators, and redundant systems to support those smart functions. With added costs and complexity, will riders in developing markets pay a premium, carry extra maintenance risk, or worry about obsolescence? Much hinges on Omoway's software support and local service networks.

The article reports a projected price around €3,500 (roughly $3,800). "And while Indonesia may have been the launchpad, global markets aren't off the table..."
China

Much of the World's Solar Gear is Made Using Fossil Power in China (asiatimes.com) 275

China "accounts for more than half of global coal use," reports Asia Times, "even as it builds the world's largest solar-panel and EV industries." Much of the world's solar gear is made on fossil power. The International Energy Agency finds that "coal generates over 60% of the electricity used for global solar PV manufacturing," far above coal's ~36% share of typical grids. That is because over 80% of PV factories sit in Chinese provinces like Xinjiang and Jiangsu, where coal dominates the grid.

China has poured over $50 billion into solar factories since 2011, roughly ten times Europe's investment, cutting panel costs by about 80% and fueling a worldwide solar boom. But those panels were produced on coal. In one analysis, they repay their manufacturing CO2 in only months, meaning the emissions were dumped up-front in China's coal plants. Any major disruption to China's coal power or factories (from grid shocks to trade barriers) could thus send ripples through the global PV market.

China's coal and heavy industries also feed its clean-tech supply chain. Coal-fired steel mills supply the aluminum and metal parts for EVs and panels, and coal chemicals provide battery precursors and silicon for solar... At the same time, Chinese oil and gas giants (CNPC, Sinopec) have set up solar, wind and battery divisions, redirecting fossil profits into green ventures.

Another interesting statistic from the article: "In Thailand, Asia's long-time auto hub, Chinese EV brands now command more than 70% of EV sales."
Transportation

BYD Pledges to Cover Damages from Self-Parking Car Crashes (fastcompany.com) 52

BYD has unveiled fully autonomous Level 4 self-parking across its vehicle lineup, powered by its advanced multi-sensor "God's Eye" system that's used by more than 1 million cars across China. "The company is so confident in the technology that it announced that it will cover any damages to your car or any other vehicle if things go wrong," adds Fast Company. "This means if anything happens, the owner won't have to file a claim and have their premiums go up." From the report: BYD's confidence stems from a sophisticated sensor architecture. The God's Eye system deploys multiple sensing technologies working in concert, unlike Tesla's problematic camera-only approach. Even the entry-level God's Eye C variant -- one of three autonomous driving levels included in most affordable models -- includes 12 cameras, 5 millimeter-wave radars, and 12 ultrasonic sensors with 1-centimeter accuracy. The mid-tier God's Eye B adds a lidar sensor, while the premium God's Eye A variant features three lidar sensors for maximum precision.

The system's parking accuracy allows the car to get within 0.8 inches of other objects, enabled by multiple redundant sensors that create a three-dimensional map. This allows the vehicle a deep understanding of its environment. This multi-sensor approach allows the system to detect obstacles. It can even recognize hanging objects over the roof line of the car.

The company reports that more than 1 million vehicles now carry the God's Eye system, an impressive deployment scale that starts with the most inexpensive models, like the $9,550 BYD Seagull, and go all the way to the $236,000 BYD Yangwang U9, a hypercar that can detect potholes on the road and jump over them. Yes. If the God's Eye detects an obstacle on the road, it will literally jump over it.

News

Why Is Fertility So Low in High Income Countries? 317

Fertility rates have fallen to historically low levels [PDF] in virtually all high-income countries due to a fundamental reordering of adult priorities rather than economic factors, according to a new National Bureau of Economic Research study. Economists Melissa Schettini Kearney and Phillip B. Levine analyzed cohort data and found rising childlessness at all observed ages alongside falling completed fertility rates.

Total fertility rates have dropped below replacement level in nearly all OECD countries, with many sustaining rates below 1.5. Some East Asian countries including South Korea, Singapore, and China now have fertility rates at or below one child per woman. The researchers concluded that period-based explanations focused on short-term income or price changes cannot explain the widespread decline. Instead, evidence points to "shifting priorities" involving changing norms, evolving economic opportunities, and broader social and cultural forces that have diminished parenthood's role in adult lives.

Slashdot Top Deals