Space & Science

News and insights from NASA, ESA, and the frontier of space exploration and scientific discovery.

trump 640x427 1

Disruption to science will last longer than the US government shutdown

President Donald Trump alongside Office of Management and Budget Director Russell Vought.

Credit:
Brendan Smialowski/AFP via Getty Images

President Donald Trump alongside Office of Management and Budget Director Russell Vought.

Credit:

Brendan Smialowski/AFP via Getty Images

However, the full impact of the shutdown and the Trump administration’s broader assaults on science to US international competitiveness, economic security, and electoral politics could take years to materialize.
In parallel, the dramatic drop in international student enrollment, the financial squeeze facing research institutions, and research security measures to curb foreign interference spell an uncertain future for American higher education.
With neither the White House nor Congress showing signs of reaching a budget deal, Trump continues to test the limits of executive authority, reinterpreting the law—or simply ignoring it.
Earlier in October, Trump redirected unspent research funding to pay furloughed service members before they missed their Oct. 15 paycheck. Changing appropriated funds directly challenges the power vested in Congress—not the president—to control federal spending.
The White House’s promise to fire an additional 10,000 civil servants during the shutdown, its threat to withhold back pay from furloughed workers, and its push to end any programs with lapsed funding “not consistent with the President’s priorities” similarly move to broaden presidential power.
Here, the damage to science could snowball. If Trump and Vought chip enough authority away from Congress by making funding decisions or shuttering statutory agencies, the next three years will see an untold amount of impounded, rescinded, or repurposed research funds.

The government shutdown has emptied many laboratories staffed by federal scientists. Combined with other actions by the Trump administration, more scientists could continue to lose funding.

Credit:
Monty Rakusen/DigitalVision via Getty Images

The government shutdown has emptied many laboratories staffed by federal scientists. Combined with other actions by the Trump administration, more scientists could continue to lose funding.

Credit:

Monty Rakusen/DigitalVision via Getty Images

Science, democracy, and global competition
While technology has long served as a core pillar of national and economic security, science has only recently reemerged as a key driver of greater geopolitical and cultural change.
China’s extraordinary rise in science over the past three decades and its arrival as the United States’ chief technological competitor has upended conventional wisdom that innovation can thrive only in liberal democracies.
The White House’s efforts to centralize federal grantmaking, restrict free speech, erase public data, and expand surveillance mirror China’s successful playbook for building scientific capacity while suppressing dissent.
As the shape of the Trump administration’s vision for American science has come into focus, what remains unclear is whether, after the shutdown, it can outcompete China by following its lead.
Kenneth M. Evans is a Fellow in Science, Technology, and Innovation Policy at the Baker Institute for Public Policy, Rice University.
This article is republished from The Conversation under a Creative Commons license. Read the original article.

Disruption to science will last longer than the US government shutdown Read More »

planet 120x120 1

Scientists Develop “Effort.jl” Emulator That Can Simulate the Entire Universe—on Just a Laptop

For most of human history, mapping the universe meant staring up at the night sky. Today, it means crunching trillions of data points drawn from the faint light of billions of galaxies.
However, as cosmic surveys like the Dark Energy Spectroscopic Instrument (DESI) and Europe’s Euclid mission gather vast amounts of data, astronomers are hitting a computational wall.
Now, building on these challenges, an international team led by physicist Dr. Marco Bonici at the University of Waterloo has unveiled a breakthrough tool that could redefine how cosmologists turn that data into understanding.
Called “Effort.jl,” it is a high-speed, differentiable “emulator”—a kind of machine-learning model that mimics the behavior of extremely complex cosmological simulations. According to the developers, Effort.jl is capable of mapping the large-scale structure of the universe in a fraction of the time traditional methods require.
Their results, published in the Journal of Cosmology and Astroparticle Physics (JCAP) in September 2025, show that Effort.jl can perform calculations up to three orders of magnitude faster than conventional pipelines while maintaining near-perfect accuracy.
“Using Effort.jl, we can run through complex data sets on models like EFTofLSS, which have previously needed a lot of time and computer power,” Dr. Bonici said in a statement. “With projects like DESI and Euclid expanding our knowledge of the universe and creating even larger astronomical datasets to explore, Effort.jl allows researchers to analyze data faster, inexpensively, and multiple times while making small changes based on nuances in the data.”​
Modern cosmology is driven by vast datasets—from galaxy clustering surveys to measurements of cosmic microwave background ripples. To interpret this data, researchers rely on the Effective Field Theory of Large-Scale Structure (EFTofLSS), a mathematical framework that links the visible distribution of galaxies to the invisible scaffolding of dark matter.
One problem is that EFTofLSS computations are incredibly expensive. Traditional tools, such as CLASS, CAMB, and pyBird, can take seconds to minutes for each likelihood evaluation, and full Bayesian analyses require millions of such calculations. That means even with supercomputers, generating a high-resolution “map” of cosmic structure can take days or weeks.
Dr. Bonici’s team built Effort.jl to address this issue. Written in the Julia programming language, often prized in the scientific community for combining Python-like ease with C-level speed,  the new emulator replaces the slowest steps of these analyses with a neural network that predicts their outputs almost instantly.
At its core, Effort.jl acts as a surrogate model for the EFTofLSS, using a carefully trained neural network to reproduce the galaxy power spectrum. This is the statistical fingerprint of how galaxies cluster across cosmic scales. By combining physics-based preprocessing with machine learning, it achieves both speed and precision.
One of its key design features is that it remains fully differentiable, allowing scientists to utilize powerful gradient-based inference techniques, such as Hamiltonian Monte Carlo (HMC). These methods can navigate complex, high-dimensional parameter spaces far more efficiently than the random-walk algorithms most cosmologists still use.
In the team’s tests, Effort.jl could compute the galaxy power spectrum in about 15 microseconds on a single CPU core. When paired with modern probabilistic programming frameworks such as Turing.jl, it achieved Bayesian convergence in roughly ten minutes on a laptop. This is compared to many hours on computing clusters using older software.
To validate its accuracy, the researchers applied Effort.jl to the PT-challenge simulations, a massive suite of high-precision cosmological mock universes, as well as the real-world Baryon Oscillation Spectroscopic Survey (BOSS) data.
In both cases, Effort.jl’s results agreed “within Monte Carlo noise” with those produced by pybird, the current workhorse of EFTofLSS analysis. Yet it finished in a fraction of the time.
“The entire analysis with Effort.jl required approximately ten minutes on a laptop and converged to the same posterior distribution as pybird,” the researchers write. “We stress that, given the large volume of the PT-challenge, this is a very stringent test of the accuracy [of] our emulator.”
Put simply, Effort.jl allows scientists to perform simulations that once required a supercomputer on a personal laptop.
While Effort.jl relies on neural networks, it isn’t what scientists call a “black-box AI.” In typical black-box systems, an algorithm may learn to make accurate predictions, but it does so without offering any insight into how those answers arise. This is a significant drawback in a field like cosmology, where physical understanding is as important as precision.​
In contrast, Effort.jl employs what the authors describe as “physics-based preprocessing”—scaling and normalizing its inputs and outputs according to established physical laws, such as the evolution of the cosmic growth factor D(z) with redshift.​
This approach anchors the neural network in established theory, enabling it to focus solely on the complex, nonlinear features that are most challenging to model. The result is an emulator that combines the interpretability of physics with the efficiency of AI—delivering speed without sacrificing scientific transparency.
Researchers even experimented with symbolic regression, a method that searches for human-readable equations instead of opaque neural weights. By finding an analytical approximation for the cosmic growth factor, they cut one of the emulator’s remaining bottlenecks,  reducing a 150-microsecond calculation to just 200 nanoseconds.
“We were able to validate the predictions coming out of Effort.jl by aligning them with those coming out of EFTofLSS,” Dr. Bonici said. “The margin of error was small and showed us that the calculations coming out of Effort.jl are strong. Effort.jl can also handle observational quirks like distortions in data and can be customized very easily to the needs of the researcher.”
With instruments like DESI now cataloging tens of millions of galaxies and Euclid returning its first sky maps from orbit, cosmologists are entering what many call the “petabyte era” of data. The challenge isn’t collecting information anymore—it’s keeping up with it.
This is where Effort.jl could become indispensable. By making advanced modeling orders of magnitude faster, it enables researchers to run more exhaustive parameter scans, test exotic theories of dark energy, and integrate multiple datasets. This could include galaxy clustering or the cosmic microwave background. All in a single coherent analysis.
Because Effort.jl was built on top of AbstractCosmologicalEmulators.jl, its architecture is modular. This means the same framework can be retrained for other cosmological codes or even for entirely different physical domains, such as plasma physics and quantum materials. The team is already developing a Python-compatible JAX version to broaden adoption.
In practical terms, tools like Effort.jl could significantly reduce the time between data collection and discovery, enabling scientists to test new cosmological models nearly as quickly as telescopes can gather information.

That means faster updates to our estimates of the universe’s expansion rate, more precise measurements of dark matter’s distribution, and tighter constraints on the elusive properties of dark energy—the mysterious force driving the cosmos apart.
By streamlining this process, Effort.jl doesn’t just help researchers crunch numbers; it helps refine the very story of how the universe evolved and where it might be headed.
Equally as important is that the same computational advances that make Effort.jl so powerful—fast, interpretable machine learning combined with physics-based modeling—are already finding uses beyond cosmology.
Similar techniques could enhance weather and climate models, refine medical imaging, or even expedite the development of next-generation materials and energy systems.
By teaching computers to understand the universe in a manner similar to scientists, Effort.jl could help humanity make sense of everything, from the largest cosmic structures to the smallest technologies that shape daily life.​
“The modular structure of Effort.jl is sufficiently general to support compatibility with other EFT-based codes,” the researchers conclude. “This flexibility opens the door for training Effort.jl to emulate these codes as well, broadening its application and usability.”
Ultimately, the breakthrough isn’t just about making cosmology faster—it’s about changing how scientists interact with data itself. By merging physics-informed machine learning with next-generation probabilistic programming, Effort.jl transforms the process of cosmic inference from a computationally intensive task into something nearly interactive.
For the first time, researchers could explore the universe’s deepest questions, from the nature of dark energy to the sum of neutrino masses, in real time.
The team has made Effort.jl freely available to the public, continuing a growing trend toward open, collaborative science in cosmology. The software is available on GitHub under an open-source MIT license, complete with documentation and example data for researchers to build upon.
By sharing the code behind their breakthrough, the authors aim to accelerate discovery not only within their own field, but across any discipline where understanding complex systems—from the cosmos to quantum materials—requires both speed and transparency.
“While previous codes have laid the groundwork,” researchers conclude, “Effort.jl offers a distinct advantage for analyses centered on gradient-based techniques, providing a robust and flexible toolkit tailored to the evolving needs of modern cosmological research.”
Tim McMillan is a retired law enforcement executive, investigative reporter and co-founder of The Debrief. His writing typically focuses on defense, national security, the Intelligence Community and topics related to psychology. You can follow Tim on Twitter: @LtTimMcMillan.  Tim can be reached by email: tim@thedebrief.org or through encrypted email: LtTimMcMillan@protonmail.com 

Scientists Develop “Effort.jl” Emulator That Can Simulate the Entire Universe—on Just a Laptop Read More »

ESA Student Internships 2026 pillars

Ready to launch your career? ESA Student Internships 2026 are now open!

Agency

03/11/2025
2896 views
6 likes

Space is within reach! The European Space Agency is inviting students to apply for its 2026 Student Internship Programme. Whether you’re into engineering, science, IT, business, economics or social sciences, there’s a place for you among the stars.Step into half a century of space innovation and join a global leader in the industry. Collaborate with seasoned professionals, contribute to groundbreaking projects and begin shaping your future in the space sector. 

Explore opportunities & apply by 30 NovemberHead over to our recruitment website to browse this year’s internships. Once you’ve found a good match:

Create your candidate profile.

Upload your CV.

Add a concise, compelling motivation letter.

Submit your application by 30 November 2025.

Don’t wait – your journey to space starts now.Who can apply?To be eligible, you must:

Be a university student, ideally in your final or penultimate year of a master’s programme.

Hold citizenship of one of ESA’s Member States or Cooperating States (the full list of eligible countries is published in the footer of each ESA vacancy).

Internship timeline

November 2025: Internship opportunities published.

December 2025 – January 2026: Candidate shortlisting and selection.

February 2026 onwards: Internships begin.

Start date: Between February and October 2025, agreed upon with your ESA tutor.

Duration: 3 to 6 months.

Requirement: You must be enrolled at university for the full duration of the internship.

ESA Student Internships

What’s it like interning at ESA?ESA Interns benefit from all the below – and much more:

Hands-on learning at world-class facilities.

Research opportunities that can enrich your thesis.

Networking and community: collaborate with fellow Interns, build lasting connections and enjoy a vibrant social environment.

“ESA internships are often a student’s first step into the space industry. They’re a chance to learn, grow and connect, with space and with each other.”- Andrew Kane, ESA Entry-Level Programmes Coordinator
“Working at ESA based in ESTEC has given me a deep insight into the wide range of activities carried out by ESA. Although I have always been passionate about space and followed the work of both ESA and NASA, I was still impressed by the variety of projects ESA undertakes that I wasn’t aware of. After completing five months as an Intern and nearly a year as a Graduate Trainee, I can confidently say that this has been an invaluable and unique opportunity to contribute directly to satellite missions and gain hands-on experience in the space sector. I also greatly value the international work environment and the opportunity to build a professional network.”- Alexander Roessel, 2024 Intern working in the Copernicus Hyperspectral Imaging Mission for the Environment (CHIME)
“My ESA internship in one word: amazing! Spending six months in a work environment filled with passion and excitement for spaceflight, independently working on fascinating projects was an amazing chance and experience. The things I have learned and people I met during this time shaped and boosted my further path.”- Katrin Schirm, 2023 Intern working in Product Assurance and Safety
Tips for a stellar application

Choose wisely: Select up to two internships that align with your studies and goals.

Be authentic: Share your passion and motivation clearly and concisely.

Answer thoughtfully: Your responses help us understand your academic background and interests.

Don’t wait until the last minute to apply! You can adjust your application right up until the vacancies close and are taken offline.

Learn moreVisit our Student Internships page for full details on the programme and selection process, or check out our Internships FAQ page.Good luck—and we hope to see you at ESA!

Like
Thank you for liking
You have already liked this page, you can only like it once!

Ready to launch your career? ESA Student Internships 2026 are now open! Read More »

1 MAN WITH PHONE AND CREDIT CARD

Hackers target online stores with new attack

NEWYou can now listen to Fox News articles!
A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Why is this attack so serious?The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases, and even full control of the store’s server.Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public. Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)Why are many stores still unprotected?Adobe released a security update on September 9 to fix the issue. Weeks later, about 62 percent of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.Every unpatched store remains an open door for attackers who want to steal information or install malicious code.MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACHHow can you stay safe when shopping online?While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.1) Look for warning signsAlways pay attention to how a website behaves. If a page looks odd, loads slowly, or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.2) Be careful with email links and use a data removal service Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number, and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)3) Use strong antivirus softwareStrong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites, and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 4) Use safe payment optionsWhenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay, or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.5) Shop with trusted retailersStick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design, and verified payment options. A few minutes of research can save you from weeks of frustration.TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED6) Keep your devices updatedUpdates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone, and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.7) Use unique, strong passwordsIf you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com8) Turn on two-factor authenticationIf a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification. Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)9) Avoid public Wi-Fi for purchasesFARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANSPublic Wi-Fi networks in places like cafés, airports, and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 10) Monitor your bank and credit statementsCheck your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.11) Report suspicious activityIf you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.Kurt’s key takeawaysThe SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWould you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Copyright 2025 CyberGuy.com.  All rights reserved.  

Hackers target online stores with new attack Read More »

2 best ways to give your old iphone a second life

5 phone safety tips every parent should know

NEWYou can now listen to Fox News articles!
Kids today are growing up in a world where screens, apps, and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.Whether you’re trying to set healthy limits, track screen time, or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident, and in control.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter  Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)1) Screen time limitsThe boundary that helps restore balanceScreen time limits let you manage how long your child spends on apps, games, or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.Why it matters: Too much screen time has been linked to reduced focus, sleep disruption, and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.How to set screen time limitsOn iPhone:Go to SettingsTap Screen TimeClick App LimitsSelect Add Limit, choose categories or specific apps, and set daily time limitOn Android:Settings may vary depending on your Android phone’s manufacturerGo to SettingsTap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search barOpen the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage listTap the hourglass icon next to the app you want to limitSet a daily time limit, then tap OK or DoneThe timer resets every night at midnightPro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS2) Parental controlsYour built-in safety netParental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app, and streaming service has its own version.Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases, and set up age-appropriate experiences. Built-in parental controls make it easier to guide what kids can see and do on their devices.  (Kurt “CyberGuy” Knutsson)How to turn parental controls onOn iPhone:Go to SettingsClick Screen Time Tap Content & Privacy RestrictionsTurn it on so the toggle turns green.Within Content & Privacy Restrictions you can go to sections like Allowed Apps, iTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.On Android:Settings may vary depending on your Android phone’s manufacturerGo to SettingsTap Digital Wellbeing & Parental ControlsSelect Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotelyPro tip: Most streaming apps, like YouTube, Netflix, and Disney+, also have parental settings, so make sure you adjust those separately.3) GeolocationThe invisible map in your child’s pocket5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINEGeolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.How to manage location accessOn iPhone:Go to SettingsClick Privacy & SecurityThen, click Location ServicesTap each app and change “Always” to “While Using the App” or “Never”On Android:Settings may vary depending on your Android phone’s manufacturerGo to SettingsTap Location (or “Location & security” or “Privacy → Location” depending on device)Tap App location permissions (or “Permission manager → Location”)Select an app from the listChange the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.4) Private browsingThe mode that hides – but doesn’t erasePrivate browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies, or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school, or router may still record activity. It’s a reminder that no browsing mode is completely private.TEENS FACE NEW PG-13 LIMITS ON INSTAGRAMHow to disable private browsingOn iPhone (Safari):Open SettingsTap Screen TimeTap Content & Privacy RestrictionsIf prompted, enter or set a Screen Time passcodeTurn on Content & Privacy Restrictions (toggle to green)Tap App Store, Media & Purchases (or similarly named) and optionally set limitsClick Web Content Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites On Android (Chrome):Settings may vary depending on your Android phone’s manufacturerOpen the Family Link app on your Android phone (or download it if it isn’t installed)Select your child’s profileTap ControlsClick Google Chrome & WebChoose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)This setting automatically disables Incognito Mode in Chrome for your child’s supervised account(Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOMEPro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.5) Digital footprintThe trail your child leaves behindEvery post, comment, or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives, or algorithms.Why it matters: Colleges, employers, and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.How to check what’s out thereSearch your child’s name on Google and image resultsReview old accounts or unused apps that may still contain personal infoHelp them make their social media profiles private and share selectivelyPro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages, and databases containing sensitive details like addresses, phone numbers, and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.comTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysParenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust, and keep your family safer online.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWant more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com.  All rights reserved.  

5 phone safety tips every parent should know Read More »

trajectory

Did 3I/ATLAS Just Show Signs of Technology? Interstellar Object Reveals ‘Non-Gravitational Motion’ as it Swings Past the Sun  

A new report on the enigmatic interstellar visitor 3I/ATLAS has revealed deeper insights into the object’s behavior, which include signs of non-gravitational motion during its recent closest approach to the Sun.
Presently, most astronomers maintain that the space object, discovered in July 2025, is a natural comet, based on a growing body of data that confirms this interpretation. The object is the third known interstellar visitor that has entered our planetary neighborhood from another star system.
3I/ATLAS is also helping confirm data that suggests such objects probably make appearances far more frequently in our Solar System than previously known. With its glowing gassy envelope—what astronomers call a coma—and other key traits that have manifested as the object has moved closer to the Sun, little doubt has been left about the interstellar visitor’s identity as a natural object.
However, there are still some experts who interpret its recent activity as being noteworthy indicators—if additional related phenomena were to be confirmed in future observations—which some might expect to associate with objects of technological origin. So what does the latest data reveal, and why does it still have some astronomers divided over whether 3I/ATLAS might show signs associated with intelligent life?
What the New Report Reveals
A recent report by researcher Davide Farnoccia with NASA’s Jet Propulsion Laboratory offers some of the latest data on the gravitational characteristics displayed by 3I/ATLAS during its journey through our Solar System.
Farnoccia specializes in the study of small objects and their orbits, which includes “nongravitational perturbations” some space objects display, as well as whether some near-Earth objects (NEOs) may pose an impact hazard to Earth.
According to Farnoccia’s report, 3I/ATLAS follows a hyperbolic orbit, displaying an eccentricity of e = 6.1373. This figure is important, as it significantly exceeds the accepted value of 1 that astronomers recognize as being required to escape the Sun’s gravity. This means that the object’s trajectory confirms that 3I/ATLAS is not gravitationally bound to our Solar System, confirming astronomers’ suspicions that once it completes its recent planetary drive-by visit, the object will continue back into interstellar space.
NASA diagram showing the trajectory of the interstellar object 3I/ATLAS (Image Credit: NASA).
Perihelion Surprises
3I/ATLAS reached perihelion—its closest point to the Sun—on October 29, 2025, with the object reaching a point of 1.356 astronomical units (AU) from our nearest star. This placed the comet just beyond Earth’s orbit, displaying a steep retrograde inclination of around 175 degrees, which reveals an incoming path that is almost completely the opposite direction of planetary motion.
Farnoccia’s report confirms that the object also displayed something that many astronomers were eager to see if 3I/ATLAS would reveal as it approached perihelion: signs of measurable non-gravitational accelerations.
Unlike the odd, elongated shape of 1I/‘Oumuamua, the first confirmed interstellar object discovered in 2017, and its dusty successor 2I/Borisov, the confirmation that 3I/ATLAS displays measurable non-gravitational accelerations (technically speaking, Farnoccia’s report indicates these values to be A1 ~ 1.66×10⁻⁶ AU/day², A2 ~ 7.09×10⁻⁷ AU/day²) offers a good indication of cometary behavior driven by outgassing, making the interstellar visitor a valuable new sample of icy material from another star system.
However, not all scientists interpret the object’s non-gravitational accelerations as being further evidence of the object’s identity as an interstellar comet. Some have even suggested that such behavior around the time of perihelion could be a prime indicator of something more complex.
Watching for Signs of ET Signatures 
Just before 3I/ATLAS reached perihelion, theoretical physicist Michio Kaku, in an appearance on NewsMax, said that if the object seemed to display an increase in energy as it neared the Sun, this could be interpreted as evidence that the object is something more than just a comet.
“If it picks up extra energy on its flyby, that would clinch it,” Kaku said. “That means there’s extraterrestrial intelligence involved.”
Kaku then offered a general explanation for what is known as the Oberth effect, a powered maneuver in which a spacecraft falls under the influence of an object’s gravity and then uses its source of propulsion to achieve further acceleration during its fall. The result is that the spacecraft achieves additional speed by using its passage within the gravitational well to gain kinetic energy, which is far more efficient than relying solely on its engines to provide thrust.

3I/ATLAS is a mystery interstellar object noted for its hyperbolic path toward the Sun and very high speed relative to the Solar System. In mere days, #3IATLAS promises to yield new information, and perhaps, new questions. I appeared on @NEWSMAX to discuss these developments. pic.twitter.com/LP7UQgTplA
— Dr. Michio Kaku (@michiokaku) October 26, 2025

“The Oberth effect says that if you were to whip around the Sun, you would pick up extra energy in the process,” Kaku explained. “So we’re gonna watch for it. The energy in must equal the energy out, according to the ordinary theory. But if that’s not true—if there’s more energy going out than in—it means that there’s an energy boost coming from whipping around the Sun, and that requires intelligence.”
So, do the non-gravitational accelerations 3I/ATLAS has now been confirmed to have displayed around the time of perihelion point to signs of technology, as Kaku and others had been waiting to see?
Evidence of Aliens, or Mass Loss Through Evaporation?
Since the object’s discovery this summer, Harvard theoretical physicist Avi Loeb has provided ongoing speculations, in nearly a dozen scientific papers and in updates on his Medium page, about the anomalies 3I/ATLAS displays. While Loeb and his colleagues have at times conceded that the object is indeed most likely an interstellar comet, his ongoing championing of other possibilities has also led to pushback from some of his colleagues in the astronomical community.

Regarding the recent activity 3I/ATLAS displayed as it approached perihelion, Loeb notes that if its current motion is driven by gas outflow, it should lose roughly half its mass in about six months, meaning around 10% of its mass would evaporate during its month-long swing near the Sun. Such rapid mass loss should produce a large, observable gas plume around the comet in late 2025.
Loeb also says that such massive evaporation, which should be evident in future observations of 3I/ATLAS once it emerges from behind the Sun, might also explain phenomena like its “rapid brightening,” as described in a recent paper by Qicheng Zhang of the Lowell Observatory and co-author Karl Battams of the US Naval Research Laboratory.
However, there is another interpretation of the non-gravitational movement that Loeb offers, which remains in keeping with his more exotic speculations from recent weeks.
“Alternatively, the non-gravitational acceleration might be the technological signature of an internal engine,” Loeb wrote in a recent post on his Medium page. Loeb also argues that 3I/ATLAS’s unexpectedly blue color, which it began to display at perihelion, is unusual for a natural comet, as most would expect them to appear redder due to dust scattering and its cold surface temperature.
Based on this, Loeb suggests the anomaly could potentially stem from the presence of a hot engine or some source of artificial illumination. However, the Harvard astrophysicist also concedes that this odd coloration may simply be due to ionized carbon monoxide, a natural cometary process. In short, while the latest data is intriguing and invites continued scrutiny, the evidence still favors a natural cometary origin.
[embedded content]
More Data on the Strangest Comet Ever Seen
New data continues to be collected about 3I/ATLAS, with the current number of observations detailed in Farnoccia’s report totaling 647 collected over a 167-day observation arc. This provides high confidence in the orbit determination of 3I/ATLAS, and ensures that the object poses no threat to Earth, with a minimum orbital intersection distance (MOID) of 0.363 AU.
With its confirmed interstellar origin and active cometary nature, it remains hard to argue against 3I/ATLAS’s identity as a natural space object, and one that offers a rare opportunity to study pristine foreign ices, dust, and organic compounds. Frustratingly, additional data that may have been obtained by NASA cameras like the HiRISE camera aboard the Mars Reconnaissance Orbiter remains inaccessible to the public as the recent U.S. government shutdown, already one of the longest in history, persists.
Fortunately, space agencies in several other nations, as well as the independent efforts of NASA researchers like Farnoccia, continue to collect new information on 3I/ATLAS that may potentially help to shed new light on the object and its unusual qualities, and more broadly, the chemical diversity of planetary systems beyond our own.
Micah Hanks is the Editor-in-Chief and Co-Founder of The Debrief. A longtime reporter on science, defense, and technology with a focus on space and astronomy, he can be reached at micah@thedebrief.org. Follow him on X @MicahHanks, and at micahhanks.com.

Did 3I/ATLAS Just Show Signs of Technology? Interstellar Object Reveals ‘Non-Gravitational Motion’ as it Swings Past the Sun   Read More »

boggle1 640x638 1

Research roundup: 6 cool science stories we almost missed

It’s a regrettable reality that there is never enough time to cover all the interesting scientific stories we come across each month. In the past, we’ve featured year-end roundups of cool science stories we (almost) missed. This year, we’re experimenting with a monthly collection. October’s list includes the microstructural differences between regular and gluten-free spaghetti, capturing striking snakes in action, the mystery behind the formation of Martian gullies, and—for all you word game enthusiasts—an intriguing computational proof of the highest possible scoring Boggle board.
Highest-scoring Boggle board

Credit:

Dan Vanderkam

Sometimes we get handy story tips from readers about quirkily interesting research projects. Sometimes those projects involve classic games like Boggle, in which players find as many words as they can from a 4×4 grid of 16 lettered cubic dice, within a given time limit. Software engineer Dan Vanderkam alerted us to a a preprint he posted to the physics arXiv, detailing his quest to find the Boggle board configuration that yields the highest possible score. It’s pictured above, with a total score of 3,625 points, according to Vanderkam’s first-ever computational proof. There are more than 1000 possible words, with “replastering” being the longest.
Vanderkam has documented his quest and its resolution (including the code he used) extensively on his blog, admitting to the Financial Times that, “As far as I can tell, I’m the only person who is actually interested in this problem.” That’s not entirely true: there was an attempt in 1982 that found an optimal board yielding 2,195 points. Vanderkam’s board was known as possibly being the highest scoring, it was just very difficult to prove using standard heuristic search methods. Vanderkam’s solution involved grouping board configurations with similar patterns into classes, and then finding upper bounds to discard clear losers, rather than trying to tally scores for each board individually—i.e., an old school “branch and bound” technique.

Research roundup: 6 cool science stories we almost missed Read More »

dark web photo 1

What really happens on the dark web, and how to stay safe

NEWYou can now listen to Fox News articles!
The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access. Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems, to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Photo by Phil Barker/Future Publishing via Getty Images)Inside the hidden layers of the internetThe Internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.The criminal economy and how scams are bornEvery major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than twenty dollars.Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.What you can do to stay ahead of dark web-driven threatsFor ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)1) Invest in personal data removal servicesA growing number of companies specialize in removing your personal data from online databases and people-search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use unique passwords and a password managerOne of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.3) Install strong antivirus protectionAntivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.4) Keep your software updatedOutdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.5) Enable two-factor authenticationEven if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.6) Consider identity theft protection servicesIdentity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as social security numbers, bank details, or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)Kurt’s key takeawayThe dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand about how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

What really happens on the dark web, and how to stay safe Read More »

data center photo 2

A supercomputer chip going to space could change life on Earth

NEWYou can now listen to Fox News articles!
A computer chip so powerful that it fuels today’s artificial intelligence is about to leave Earth. NVIDIA’s H100 GPU, used to train advanced AI models, will soon travel aboard a Starcloud satellite.Starcloud, a startup based in Redmond, Washington, wants to see if the world can move data centers into orbit. These centers power nearly everything online, from streaming to AI tools. Shifting them into space could help reduce pollution, save resources and speed up computing for everyone.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.LIVING IN GIANT MOON GLASS SPHERES COULD BE OUR FUTURE Starcloud aims to build the first orbital data centers, cutting emissions and speeding up global computing. (Dean Mouhtaropoulos/Getty Images)Why space data centers matter for the futureEvery time you send a message, store a file in the cloud or use AI, large computers on Earth handle the work. These data centers use massive amounts of electricity and water to stay cool. They also release heat, noise and greenhouse gases that affect local communities.Space offers a different environment. Solar energy is abundant, and cooling happens naturally in the cold vacuum. “The only environmental cost is the launch,” said Starcloud CEO Philip Johnston. “After that, we could save ten times the carbon emissions compared with running data centers on Earth.”For a world searching for greener technology, that goal matters.How the NVIDIA GPU will work in orbitThe Starcloud-1 satellite, about the size of a small refrigerator, will carry NVIDIA’s H100 GPU. It is nearly one hundred times more powerful than any chip ever sent into orbit.Once in space, the GPU will process huge amounts of satellite data. It will study images of Earth to identify wildfires, track crops and monitor weather. Normally, satellites send this data back to Earth for processing, which can cause long delays. Doing the analysis in orbit allows faster results and better decisions on the ground.The mission will also test Google’s Gemma language model in orbit. It will be the first time a large AI model operates in space.THE NEW ARMS RACE IS FOR COMPUTE — AND AMERICA CAN’T AFFORD TO FALL BEHIND By processing satellite data in orbit, Starcloud hopes to make Earth monitoring faster and more efficient. (Dean Mouhtaropoulos/Getty Images)Starcloud plans to build space data centersStarcloud hopes this is only the beginning. The company plans to build larger data centers in space powered by sunlight and cooled by the natural chill of orbit. Future systems will include the next generation of NVIDIA GPUs called Blackwell, which promise even higher performance.Starcloud’s long-term goal is to create a five-gigawatt orbital data center about 2.5 miles wide (around 13,000 feet across). It could handle massive AI workloads while cutting costs and carbon emissions. As launch prices continue to fall, building data centers beyond Earth could soon become practical.Johnston believes that by the 2030s, many new data centers will operate in orbit instead of on land.What this space mission means for youIf this works, the technology that powers your apps, games and AI tools might soon be running in space. This change could make cloud services faster, more efficient and less harmful to the planet.Space-based data centers could also speed up disaster response, improve weather forecasts and save millions of gallons of water every year. The idea shows that innovation and sustainability can grow together.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.RAPID RISE OF AI PUTS NEW URGENCY ON CONGRESS TO UNLEASH AMERICAN ENERGY NVIDIA’s powerful H100 GPU is heading to space aboard Starcloud-1 to test AI data processing in orbit. (Kent Nishimura/Bloomberg via Getty Images)Kurt’s key takeawaysSending an NVIDIA GPU into orbit shows how quickly technology is changing. The mission combines curiosity, innovation and a genuine push to make computing cleaner and faster. As space becomes more reachable, the idea of data centers floating above Earth feels less like fiction and more like something that could actually happen. Each of these missions could teach us a little more about how to build a sustainable digital future.How do you feel about the idea of data centers operating in space? Is it exciting, risky or both?  Let us know by writing to us at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Copyright 2025 CyberGuy.com.  All rights reserved.

A supercomputer chip going to space could change life on Earth Read More »

cropped ars logo 512 480 60x60 1

Neural network finds an enzyme that can break down polyurethane

You’ll often hear plastic pollution referred to as a problem. But the reality is that it’s multiple problems. Depending on the properties we need, we form plastics out of different polymers, each of which is held together by a distinct type of chemical bond. So the method we use to break down one type of polymer may be incompatible with the chemistry of another.
That problem is why, even though we’ve had success finding enzymes that break down common plastics like polyesters and PET, they’re only partial solutions to plastic waste. However, researchers aren’t sitting back and basking in the triumph of partial solutions, and they’ve now got very sophisticated protein design tools to help them out.
That’s the story behind a completely new enzyme that researchers developed to break down polyurethane, the polymer commonly used to make foam cushioning, among other things. The new enzyme is compatible with an industrial-style recycling process that breaks the polymer down into its basic building blocks, which can be used to form fresh polyurethane.
Breaking down polyurethane

The basics of the chemical bonds that link polyurethanes. The rest of the polymer is represented by X’s here.

The new paper that describes the development of this enzyme lays out the scale of the problem: In 2024, we made 22 million metric tons of polyurethane. The urethane bond that defines these involves a nitrogen bonded to a carbon that in turn is bonded to two oxygens, one of which links into the rest of the polymer. The rest of the polymer, linked by these bonds, can be fairly complex and often contains ringed structures related to benzene.
Digesting polyurethanes is challenging. Individual polymer chains are often extensively cross-linked, and the bulky structures can make it difficult for enzymes to get at the bonds they can digest. A chemical called diethylene glycol can partially break these molecules down, but only at elevated temperatures. And it leaves behind a complicated mess of chemicals that can’t be fed back into any useful reactions. Instead, it’s typically incinerated as hazardous waste.

Neural network finds an enzyme that can break down polyurethane Read More »