• 3DPRINTINGINDUSTRY.COM
    Drone War: Firestorm Labs Targets RapidFlight in New Lawsuit
    Military drone manufacturer Firestorm Labs has filed a lawsuit against competitor RapidFlight in an intellectual property (IP) dispute. The San Diego-based company claims that RapidFlight falsely accused its 3D printed Tempest drone of infringing on two patents.Filed in the United States District Court for the Southern District of California, the case sees Firestorm request a jury trial to confirm that it has not infringed on either of RapidFlights US patent numbers 11,597,490 or 11,840,323. These relate to drone airframe structures with multiple 3D printed sections.In the court filing, Firestorm argues that its drone-making adversary has failed to compete on technology capabilities, performance, and price. The company highlights one instance where, during a head-to-head demonstration, RapidFlight figuratively and literallycrashed and burned.The plaintiff asserts that these failings have led the defendant to use unsupported threats in an attempt to bully Firestorm out of the industry. This reportedly includes repeated patent infringement assertions made verbally and in writing for over a year. RapidFlight is also said to have made unsupported allegations to its competitors potential customers, giving them an unfair advantage in attaining government contracts.In addition to a declaration that Firestorm has not infringed the patents in question, the unmanned aerial system (UAS) manufacturer is seeking compensation for legal fees and additional relief deemed appropriate by the court. The anticipation that RapidFlight would file a patent infringement lawsuit prompted Firestorm to launch this pre-emptive declaratory judgment action.Firestorm Labs and RapidFlight have been contacted for comment.Firestorm Labs Tempest drone. Image via Firestorm Labs.Firestorm challenges RapidFlights 3D printing patent infringement claims The Complaint for Patent Infringement Lawsuit outlines a slew of allegations against RapidFlight, highlighting repeated legal threats and accusations.Firestorm stated that it responded to these in good faith, explaining why it believes them to be false. Despite this, RapidFlight is said to have persisted in unjustified accusations of infringement. The Virginia-based firm also reportedly refused to engage and reach an amicable resolution.In one letter from June 2023, RapidFlight is said to have demanded that the plaintiff stop selling its alleged infringing products, destroy all offending inventory, and pay royalties. The letter accuses Firestorm of infringing the 11,547,490 patent, demanding the firm acquiesce to these demands within two weeks.In response, multiple letters were sent to RapidFlight in July and August 2023 outlining why these allegations were false. In particular, Firestorm claims that a connector component was misidentified as a patented reinforcement element, voiding the infringement claim. 3D models of relevant drone sections were also sent to illustrate the companys innocence.Following this, RapidFlight reportedly requested access to its competitors confidential and sensitive technical manuals or other product design documents. Firestorm denied this request, categorizing it as a fishing expedition to find potential infringements.The defendant then allegedly communicated unsupported allegations to potential Firestorm clients, including government decision-makers. This reportedly included claims that a patent infringement lawsuit was imminent, in an attempt to gain an unfair advantage in securing competitive contracts. The San Diego-based drone maker hopes launching this suit will clear the cloud of litigation from its business and its customers.RapidFlight M2 drone. Image via RapidFlight.3D printing patent disputesFirestorm is one of the latest companies to face 3D printing patent infringement allegations. Last year, Stratasys sued Bambu Lab, accusing the leading Shenzhen-based market leader of infringing on ten patents. The plaintiff argued that Bambus X1C, X1E, P1S, P1P, A1, and A1 mini breached IP relating to processes and features like purge towers, heated build platforms, tool head force detection, and networking capabilities.Stratasys demanded a trial by jury to achieve a declaration that the patents had been infringed upon, in addition to damages and an injunction blocking the future sale of the offending machines.This case has drawn criticism from the open-source 3D printing community. RepRap founder Dr. Adrian Bowyer called the idea of patents nonsense upon stilts, arguing that they inhibit creativity and stifle innovation. He criticized Stratasys for engaging in patent parasite behavior.This sentiment was echoed by Dr. Joshua Pearce, who worries that the case could lead to the weaponization of IP. Andrew Spitzer, a patent litigator from Crowell & Moring, believes the case could cause a seismic shift in the 3D printing landscape, with Stratasys potentially becoming a gatekeeper to the 3D printing industry.Elsewhere, 2024 saw 3D printer manufacturer Markforged settle a patent infringement lawsuit filed by Continuous Composites, resolving a legal battle that began in 2021. The allegations related to Markforgeds infringement of several patents relating to continuous composite additive manufacturing.Earlier in the year, a jury ruled against Markforged on one patent claim, awarding $17.34 million in damages. In September, Markforged signed a Settlement and Patent License Agreement, in which it agreed to pay Continous Composites a further $18 million upfront, followed by $1 million in 2025, $2 million in 2026, and $4 million in 2027.Who won the 2024 3D Printing Industry Awards?All the news from Formnext 2024.Subscribe to the 3D Printing Industry newsletter to keep up with the latest 3D printing news.You can also follow us on X, like our Facebook page, and subscribe to the 3D Printing Industry Youtube channel to access more exclusive content.Featured image shows a RapidFlight M2 drone. Image via RapidFlight.
    0 Comentários 0 Compartilhamentos 22 Visualizações
  • REALTIMEVFX.COM
    UV Question for VFX texture
    Hello, Im looking to put some text around this disk within the separated sections so I was wondering how I can unwrap them into straight strips with minimal distortion to allow for this process to be easier in texturing? 1 post - 1 participant Read full topic
    0 Comentários 0 Compartilhamentos 22 Visualizações
  • WWW.ARCHPAPER.COM
    Pelli Clarke & Partners crafts tapered glass crown for Salesforce tower in Chicago
    Brought to you by:Architect: Pelli Clarke & PartnersLocation: ChicagoCompletion Date:2024Wolf Point, a four-acre site located at the intersection of the Chicago Rivers three forks masterplanned by Pelli Clarke & Partners, is finally complete after a 15-year development saga. The final component of the project wrapped up construction late last year; it is a 57-story office tower leased almost exclusively to Salesforce. Clad head-to-toe in glass curtain wall, the tower features an articulated crown at its peak, a decorative element that signals the new skyscrapers prominence in the Chicago skyline. The Salesforce tower joins two previously completed residential buildings on the site, Wolf Point East and West, designed by bKL Architecture and Pelli Clarke & Partners, respectively. Before this, the site was used for decades as a parking lot. In addition to the three towers, the masterplan adds 2.3 acres of public park space that is integrated with the citys riverwalk, fulfilling municipal waterfront zoning requirements.Pelli Clarke & Partners masterplan for Wolf Point includes two residential towers, an office tower, and a public park. (Courtesy Pelli Clarke & Partners)The development site has been owned by the Kennedy family since 1936and has sat vacant for over 80 years. Darin Cook, partner at Pelli Clarke, told AN,In the Daniel Burnham plan of Chicago from 1909, this is one of the most significant sites. Its this unusual peninsula that sticks out into the river, so you actually have 270 degree exposure around the site. Even in Burnhams plan, he had a major landmark at this point in the river. It only took around 114 years to realize that, he added.The Wolf Point site juts out into the Chicago River, creating wrap-around views of the Salesforce tower. (Jason ORear)When designing the new building, Pelli Clarke & Partners were constrained by an established view corridor from the river to a Holiday Inn located behind Wolf Point as well as setback zoning related to the Chicagos Riverwalk. For this reason, the tower is narrow and rectangular in plan. To create a more formally expressive massing, the architects articulated the top of the tower, implementing a series of tapered setbacks around the buildings uppermost floors. A setback was also incorporated at the towers podium, where the buildings glazed lobby and entrance step inward to maximize Wolf Points landscaped public space.A glass-encased lobby establishes views outward to the public park. (Jason ORear)Pelli Clarke & Partners specified low-e coated glazing for the project to improve energy efficiency. This product allows 53 percent visible light transmittance during the day, allowing office workers to cut down on the use of artificial lighting. In addition, the silvery blue color of the curtain walls vision glass was diligently matched to that of the opaque glazing that covers the buildings spandrel panels, creating a more monolithic exterior expression. The Salesforce tower is the first construction project in Chicago required to submit environmental product declarations (EPDs) to the city. Using this data, Pelli Clarke & Partners collaborated with the structural engineer to reduce the use of steel and concrete in the structure through efficient column placements.Because of its position at the confluence of the Chicago River, Pelli Clarkes tower is highly visible from multiple vantage points within Downtown Chicago. (Jason ORear)Construction logistics were complicated by the irregularities of the Wolf Point site. Because of a city mandate that construction materials could not be stored above ground, a temporary access road was constructed beneath the property, building upon Downtown Chicagos pre-existing network of below-ground streets. After the building was completed, this access road was filled in. The builders also had to contend with the towers proximity to the Chicago River, which is occasionally subject to flooding. Accordingly, a large cofferdam was constructed below grade. During excavation, an abandoned coal delivery tunnel was discovered beneath the site, a remnant from the early 20th century, when coal was delivered to the basements of downtown businesses. To ensure the foundations structural stability, this tunnel was also filled in with concrete.Chicagos Skyline continues to grow with the addition of Salesforce tower, and several recently-completed residential skyscrapers. (Jason ORear)Despite nationwide struggles to fill office space, Hines, the projects developer, has succeeded in leasing 97 percent of the tower, managing to attract one of the worlds largest technology firms. As skyscrapers transition from office use to primarily residential functions, Pelli Clarke & Partners Salesforce tower finds itself alone among recently-completed buildings of comparable size. For example, Jahns 1000M and Goettsch Partners One Chicagotwo of the largest towers completed in the past several yearsare both residential high rises. Additional condo towers are forthcoming as well, including SOMs 400 Lake Shore Drive, which broke ground this past summer.Regardless of this trend away from office towers, development is clearly still booming in Chicago, as new buildings are regularly added to the citys already architecturally distinguished skyline.Project SpecificationsDesign Architect: Pelli Clarke & PartnersArchitect of Record: HKSLandscape Architect: ConfluenceInterior Design: GenslerStructural Engineer: Magnusson Klemencic AssociatesElectrical Engineer: Alvine EngineeringCivil Engineer: EpsteinLighting Design: OneLux StudioAV/Acoustics: CeramiSecurity Consultant: Affiliated EngineersTelecommunications: EpsteinFacade Consultant: Curtain Wall Design & ConsultingGeneral Contractor: Walsh ConstructionOwner: Wolf Point SouthOwner Representative: RL Edwards PartnersDeveloper: HinesGlazing Contractor: HarmonFacade Installation: HarmonElevator/Vertical Transportation: Persohn/Hahn AssociatesFacade Access: OlympiqueBMCS: HMA ConsultingWind Engineer: RWDIGeotechnical Engineer: GEI ConsultantsTraffic Consultant: Kimley-HornParking Consultant: DesmanCurtain Wall: HarmonLobby Glazing: SentechStainless Steel Column Covers: Bell Pro ArchitecturalGlass: Viracon, Cricursa
    0 Comentários 0 Compartilhamentos 21 Visualizações
  • WWW.FOXNEWS.COM
    Chinese auto giant wants to make flying cars your next commute option
    Tech Chinese auto giant wants to make flying cars your next commute option Ambitious plans to transform urban travel with innovative eVTOL tech Published January 10, 2025 11:00am EST close Chinese auto giant wants to make flying cars your next commute option A company is setting the stage for a new era in how we think about commuting and connectivity in our cities. GAC Group, a prominent automotive manufacturer from China, is making waves in the transportation sector with the launch of its new eVTOL brand, Govy.This development reflects GAC's commitment to sustainable air travel, as the company taps into its extensive automotive expertise and innovative technology to create fresh solutions for urban mobility.With Govy, GAC is not just entering the flying car market; it's setting the stage for a new era in how we think about commuting and connectivity in our cities. Flagship aircraft of Govy named AirJet. (Govy)Introducing the AirJetThe flagship aircraft of Govy, named AirJet, is a revolutionary composite-wing flying car designed to operate as an air taxi for distances of up to 124 miles. This innovative vehicle combines the efficiency of fixed-wing aircraft with the flexibility of multi-rotor systems, allowing for vertical takeoff and landing capabilities.The AirJet is constructed with over 90% carbon fiber composite materials, making it remarkably lightweight just one-third the weight of a conventional car of similar size. This lightweight design not only enhances performance but also enables longer electric flights.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Flagship aircraft of Govy named AirJet. (Govy)Performance and features of the AirJetIn terms of performance, the AirJet is powered by GAC's proprietary electric drive system, which allows it to reach impressive speeds of up to 155 miles per hour. The current model boasts a range exceeding 124 miles, with ambitious plans to extend this range to 249 miles through the development of future solid-state battery technology. Additionally, the AirJet can be recharged in just 30 minutes, ensuring quick turnaround times for operations.GET FOX BUSINESS ON THE GO BY CLICKING HEREThe AirJet is designed with both luxury and safety in mind. It features a spacious cabin with a "1+1+X" seating arrangement that provides flexibility for passengers. The aircraft is equipped with autonomous flight capabilities, allowing for seamless operation without human intervention. Safety is paramount in the design of the AirJet. It includes advanced safety systems such as redundant power and control systems, real-time monitoring, and obstacle detection to ensure secure flights. Flagship aircraft of Govy named AirJet. (Govy)The robo-air taxi systemGAC's vision extends beyond individual aircraft to encompass a comprehensive Robo-AirTaxi system that integrates ground and aerial transport for end-to-end smart mobility solutions. This system will utilize the Govy AirCar for short urban trips under 12.4 miles and the AirJet for mid-range travel up to 124 miles. A key aspect of this vision is the creation of a "40-minute Greater Bay Area life circle" in China, which aims to facilitate efficient intercity travel and significantly reduce transit times and costs. Flagship aircraft of Govy named AirJet. (Govy)Future plans and commercializationLooking ahead, GAC has outlined an ambitious roadmap for Govy. By 2025, the company aims to achieve airworthiness certification for its flying cars, establish production lines, and begin taking pre-orders from customers. Furthermore, GAC plans to launch demonstration operations in two to three Greater Bay Area cities of China by 2027. Flagship aircraft of named AirJet. (Govy)Kurt's key takeawaysWith the introduction of Govy and its flagship AirJet, GAC Group is positioning itself at the forefront of urban aerial transportation. By combining innovative technology with a comprehensive ecosystem approach, GAC aims to transform urban mobility into something smarter, safer, and more sustainable. As we move toward a future where aerial vehicles become an integral part of our transportation networks, GAC's initiatives could play a pivotal role in shaping how we navigate our cities and connect with one another.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable using flying cars like the Govy AirJet for your daily commute, and why or why not? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comentários 0 Compartilhamentos 21 Visualizações
  • WWW.COMPUTERWEEKLY.COM
    Mandiant: Latest Ivanti vulns exploited by Chinese cyber spooks
    Security supplier Ivanti has once again found itself at the centre of an expanding series of breaches after it emerged that two freshly disclosed vulnerabilities in a number of its products are likely being exploited by China-backed threat actors.The vulnerabilities in question which are designated CVE-2025-0282 and CVE-2025-0283 affect Ivantis Connect Secure, Policy Secure and Neurons for ZTA gateway products.Exploitation of the first enables a threat actor to achieve unauthenticated remote code execution (RCE), and exploitation of the second enables a locally authenticated attacker to escalate their privileges.CVE-2025-0282 is officially a zero-day, and has already been added to the Cybersecurity and Infrastructure Security Agencys (CISAs) Known Exploited Vulnerabilities (KEV) catalogue. In the UK, a spokesperson for the National Cyber Security Centre (NCSC), said: The NCSC is working to fully understand the UK impact and investigating cases of active exploitation affecting UK networks.In the real world, Ivanti said, a limited number of users of its Connect Secure appliances have been affected by CVE-2025-0282 as of Thursday 9 January 2025. However, no users of Policy Secure or ZTA gateways have been impacted, and as of 9 January, there was no conclusive evidence that CVE-2025-0283 had been exploited at all.A patch is now available for both CVEs in Connect Secure, but for now, they both remain unpatched in Policy Secure and Neurons for ZTA, with a fix not expected until 21 January.An Ivanti spokesperson said: We continue to work closely with affected customers, external security partners, and law enforcement agencies as we respond to this threat. We strongly advise all customers to closely monitor their internal and external ICT as a part of a robust and layered approach to cyber security to ensure the integrity and security of the entire network infrastructure.We have made additional resources and support teams available to assist customers in implementing the patch and addressing any concerns.Thank you to our customers and security partners for their engagement and support, which enabled our swift detection and response to this issue, they added. We remain committed to continuously improving our products and processes through collaboration and transparency.This incident serves as areminder of the importance of continuous monitoring and proactive and layered security measures, particularly for edge devices (such as VPNs) which provide an essential service as the initial access point to a corporate network but which are also highly appealing to attackers.According to Google Clouds Mandiant, which has been working alongside Ivanti on investigation and remediation, in at least one instance, a threat actor has managed to use the flaws to deploy elements of the SPAWN malware ecosystem, including SPAWNMOLE, a tunneller, and SPAWNSNAIL, an SSH backdoor.Mandiants researchers said use of these malwares following the targeting of Ivanti products has been attributed to the UNC5337 threat activity cluster, which is linked to UNC5221, a suspected China-nexus espionage group that is known to have exploited other Ivanti vulnerabilities in early 2024.Writing on LinkedIn, Mandiant chief technology officer Charles Carmakal described UNC5221s latest campaign as developing and still under analysis, and hinted that there may be other threat actors in the mix. Describing a potential mass exploitation scenario, he urged Ivanti users to prioritise applying the new patches immediately.However, he warned, this process may not be without risk. The threat actor implemented a novel technique to trick administrators into thinking theyve successfully upgraded a system, he wrote.The threat actor deployed malware which blocks legitimate system upgrades while simultaneously displaying a fake upgrade progress bar. This creates a convincing facade of a successful update, when in reality, the malware silently prevents the actual upgrade from taking place. Some organisations may assume theyve addressed the vulnerability when they actually havent.He added that the attackers may also have fiddled with Ivantis on-board Integrity Checker Tool designed to help users identify compromises to hide evidence of their malwares presence.Benjamin Harris, CEO of WatchTowr, an attack surface management specialist, urged Ivanti users to pay close attention to the latest developments.Our concern is significant as this has all the hallmarks of APT usage of a zero-day against a mission-critical appliance, he said. It also resembles the behaviour and drama circulating Ivanti products that we as an industry saw in January 2024, and we can only hope that Ivanti has learned from that experience with regard to actioning an effective response.Harris added that the lack of patches across the full affected product stack should be an additional concern.Ivanti Connect Secure users have a patch available, but once again patches for other affected appliances like Ivantis Policy Secure and Neurons for ZTA gateways are left waiting three weeks for a patch. Users of these products should not hesitate these appliances should be pulled offline until patches are available, he said.WatchTowr client or not we urge everyone to please take this seriously. Throw your vulnerability SLAs into the proverbial wind in situations like this, they are no longer relevant and the difference between a rapid response, and a response in hours, could be the difference between your organisation calling your cyber insurer or not.Read more about Chinese threat activityNine months after its malicious botnet comprising legacy routers was disrupted by the Americans, Chinese APT Volt Typhoon is rebuilding and presents as persistent a threat as ever.Following the Salt Typhoon attacks, CISA offers advice to 'highly targeted' individuals, such as using end-to-end encryption and moving away from purely SMS-based MFA.US government agencies confirmed Wall Street Journal reports that China-backed threat actors breached telecommunication providers and access data for law enforcement requests.
    0 Comentários 0 Compartilhamentos 21 Visualizações
  • WWW.ZDNET.COM
    Hisense's new laser projector is so sharp and vivid, it may just replace your 4K TV
    The latest of the company's L9 Series projectors offers better brightness, depth, and clarity - in a fetching design.
    0 Comentários 0 Compartilhamentos 21 Visualizações
  • WWW.ZDNET.COM
    Using a VPN is no longer enough. Protect your entire network with WireGuard - here's how
    Alexander Sikov/Getty ImagesVirtual private networks are no longer just for tech enthusiasts and privacy buffs -- they've become an essential tool for navigating a more restricted internet. VPNs offer a lifeline to digital freedom and security, from bypassing censorship to securing data from prying eyes. In the US, legislation in several states has blocked adult websites orplacedthem behind strict age gates. Regional policies limit access to various types of content, including streaming services and political materials. As more sites and services become geographically restricted, more individuals are using VPNs to bypass these blocks, protect their digital freedoms, and safeguard their data. Beyond unblocking adult websites or region-locked media, many users worry about government surveillance, data retention laws, and the sale of personal browsing data by ISPs. A VPN addresses these privacy risks by encrypting your traffic and masking your IP address. However, a VPN alone may not provide a comprehensive solution for network security or privacy concerns. To truly safeguard your data and enhance network privacy, combining a VPN with robust protocols like WireGuard and integrating them into advanced hardware setups (such as Firewalla and others mentioned below) can make a significant difference. Also: How AI will transform cybersecurity in 2025 - and supercharge cybercrimeThis guide outlines how to pair the open-source WireGuard protocol with Proton VPN, a Swiss-based provider celebrated for its strong privacy policies, and to integrate them into router-based setups for entire-network coverage. I'll also explore advanced techniques like policy-based routing, IP passthrough, zero-trust segmentation, and even building your firewall router on Linux or FreeBSD. Understanding VPN protocols and WireGuard Many commercial VPNs (ExpressVPN, NordVPN, etc.) rely on proprietary protocols that often lock users into specific apps. For example, NordVPN'sNordLynx protocol is based on WireGuard but deviates from the standard implementation. It does not use standard WireGuard .conf files for direct use on routers. Instead, NordVPN (and ExpressVPN) employs the older OpenVPN protocol for router configurations, which is less performant and more complex to set up. In contrast, WireGuard provides a refreshing alternative with an open-source design, a tight codebase (4,000 lines total), and notably high performance. Its modern cryptographic methods and lean architecture result in lower latency and faster speeds than legacy protocols like OpenVPN or IPSec, making it an excellent fit for bypassing region locks, streaming content, or engaging in latency-sensitive tasks like gaming. Example of a simple WireGuard configuration (.conf) file created by Proton VPN's download portal. Screenshot by Jason Perlow/ZDNETWireGuard's key management is also straightforward and highly efficient. Each peer -- whether a router, laptop, or smartphone -- is assigned a public/private key pair, eliminating the need to manage complex certificates. This simplified design reduces the overall attack surface and eases auditing, as fewer lines of code typically mean fewer potential vulnerabilities. Notably, you can install WireGuard on a router (rather than on each device in your network), allowing all network traffic to pass through the secure tunnel without managing separate VPN clients or profiles on individual computers or mobile devices. This router-based approach is especially valuable for environments where multiple devices -- from personal laptops to IoT gadgets -- must be secured, as it centralizes the VPN configuration and simplifies network-wide encryption. Legal and ethical disclaimer Using VPNs to bypass regional blocks or consume restricted content may be unlawful in certain jurisdictions. VPNs bolster privacy but do not guarantee total anonymity. If you evade local laws concerning adult content, abortion information, or other regulated material, understand there may be legal consequences. Always research your VPN provider's logging policies -- some free solutions log user data or inject malware, compromising rather than enhancing user privacy. WireGuard VPN providers Although this article primarily showcases Proton VPN for its transparent WireGuard .conf files (no proprietary lock-in), strong no-log policy, and free vs. paid plan structure, many other reputable VPN providers offer WireGuard configuration files for router-based setups. These include: Mullvad An independent, Swedish-based VPN service run by Mullvad VPN AB. Mullvad is praised for its no-email registration, strict no-logs policy, and the option to pay anonymously in cash or cryptocurrency.CyberGhost Part of Kape Technologies, which owns ExpressVPN, Private Internet Access (PIA), and ZenMate. CyberGhost is known for specialized servers (streaming, torrenting) and user-friendly apps.Private Internet Access (PIA) Another Kape Technologies brand, recognized for its large server network, advanced configurations like split tunneling, and its built-in ad/malware blocker ("PIA MACE").Surfshark Now under the Nord Security umbrella (following a 2022 merger), Surfshark is popular for unlimited device connections, ad/malware blocking ("CleanWeb"), and relatively budget-friendly pricing.Many of these services let you select a server in their portal or app and generate a .conf file for WireGuard, which you can then import into your router. The basic steps -- choosing a region, downloading the configuration, and applying it -- are similar to those we'll follow with Proton VPN below. Why Proton VPN? Proton VPN was founded in 2017 by the team behind Proton Mail, the world's largest secure email service. Operated under the Swiss-based, non-profitProton Foundation, Proton VPN prioritizes user privacy over profit-driven motives, similar to theSignalmessaging service. Its structure ensures that no shareholders or external investors influence its mission, maintaining a focus on privacy and security.Proton generates revenue through paid subscription plans to sustain its services, but it remains a not-for-profit organization governed by the Proton Foundation. This unique approach allows Proton to regularly publish transparency reports, invest in independent security research, and avoid corporate ownership by large VPN conglomerates. Proton VPN is a compelling choice for users seeking privacy-first, router-friendly configurations. Even on the free tier, Proton VPN delivers reliable and fast connections. Its focus on privacy extends to its router-friendly WireGuard configurations, which are transparent and free of proprietary lock-in. Proton VPN's tiered Free and Paid plans cater to a broad range of needs.PlanFreePaidServer Locations 35 countries (limited) 110 countries (city-level selection) Speed Decent, not guaranteed Often near max ISP speeds, priority servers Advanced Features Basic NetShield (ad block) Full NetShield, multi-hop, Secure Core Devices 1 device 10+ devices (tier-dependent) Performance ~5070% of ISP bandwidth Potentially close to full ISP bandwidth Step-by-Step: Using WireGuard on Proton VPN Step 1: Create a Proton VPN account Visit ProtonVPN.com and click Get Proton VPN Free.Choose a Free or Paid plan, depending on your needs.Verify your account via email.Log in to your Proton VPN dashboard once your account is confirmed. Proton VPN's download portal. Jason Perlow/ZDNET Step 2: Generate your WireGuard configuration Go to Downloads (or the WireGuard Configuration section) in your Proton VPN dashboard.Enter a descriptive name for your configuration in the "Device/certificate name" field, such as "ZDNET Test Router."Choose Router (or whichever platform you're setting up).Configure NetShield (ad/malware blocker) by selecting the desired filter level, or leave it off if you prefer.(Optional) Enable NAT/PMP (for port forwarding) or Moderate NAT based on your networking needs.(Optional) Check "VPN Accelerator" to improve speeds, if supported.Pick a standard server or region. Proton VPN may also auto-select the best server based on load.Click Create (or "Download") to generate and save the .conf file. Many WireGuard-compatible routers, such as the Firewalla Purple and Gold series, allow direct import of WireGuard .conf files generated by services such as Proton VPN. Screenshot by Jason Perlow/ZDNET Step 3: Configure your router Log in to your router's admin interface (commonly accessed via 192.168.x.x).Navigate to the VPN / WireGuard settings section.Import or Paste the Proton VPN .conf file you downloaded. Some routers let you upload the file directly; others might require copying the keys, peer settings, and endpoint details manually.Save your changes and enable the WireGuard interface or tunnel. Step 4: Enable IP Passthrough or Bridge Mode (if needed) If your ISP modem also acts as a router (e.g., AT&T BGW-320, Arris, etc.), you risk double NAT (Network Address Translation) unless you enable "Bridge Mode" or "IP Passthrough." This configuration ensures your custom router (Firewalla, OpenWRT, or another) receives a public IP directly, managing NAT independently. Access the ISP gateway's admin interface (often 192.168.1.254 or 192.168.0.1).Locate Bridge Mode or IP Passthrough in the advanced settings.Assign the MAC address of your router as the passthrough device.Save and reboot both devices. Step 5: Verify your connection Check your public IP at ipinfo.io. It should show Proton VPN's server location. Speedtest.net will also display your IP configuration.(Optional) Run a ping or traceroute to confirm stable routing.All traffic on your network should now traverse the WireGuard tunnel. Which routers support WireGuard? Many router manufacturers are adding native WireGuard support to their devices. Asus, Netgear, and Linksys regularly include WireGuard in their firmware updates, especially for mid-to-high-end models. Open-source firmware platforms like OpenWRT also offer extensive support, making them an excellent choice for advanced users. Other router options GL.iNet OpenWRT-based routers come pre-loaded with WireGuard, making them ideal travel VPN routers. OpenWRT One, developed by the Software Freedom Conservancy and Banana Pi, is a $89 dual-band Wi-Fi 6 router (available from Amazon fully assembled for US and EU power supplies) with full OpenWRT firmware. It features a 2.5GbE PoE WAN port, an M.2 slot for hardware add-ons, and a hardware switch to prevent bricking by toggling between NOR and NAND memory. Because it's standard OpenWRT, you can access thousands of packages (including WireGuard) and frequent security updates. Firewalla Purple and Gold series devices are widely praised for their simple configuration, high performance, and mobile app. Its newAP7 Wi-Fi 7 access pointallows zero-trust segmentation, meaning you can isolate IoT gadgets on separate networks to minimize the impact if one device is compromised. Firewalla routers also offer multiple VPN profiles, letting you fine-tune which devices or users tunnel through WireGuard. If you have enterprise-level or advanced requirements, consider a Firewalla Gold Pro, Ubiquiti Dream Machine, Mikrotik, OPNSense, or Netgate device for robust VLAN configurations, advanced QoS, and large-scale LAN deployments. Troubleshooting and FAQ Even with WireGuard's simplicity, a few issues may arise: Handshake failure: Check that your public/private keys match Proton VPN's settings. Ensure the router's clock is accurate, as major time differences break WireGuard's cryptographic handshake.DNS leaks: Your real location is exposed if DNS requests still go to your ISP. Update your router's DNS to Proton VPN's resolvers and validate at dnsleaktest.com.Policy-based routing: If you want to use the VPN only for specific devices or domains (e.g. streaming boxes that need local region access), explore split tunneling or "policy-based routing" in your router firmware (Firewalla, OpenWRT, OPNsense, etc.).Wi-Fi performance: Upgrading to Wi-Fi 7 or adding multiple access points can alleviate coverage gaps. However, your overall VPN speed also depends on your router's CPU speed for WireGuard encryption.General security tips: Stick to reputable VPNs like Proton VPN, avoid free apps, and keep firmware updated. Router-based VPN setups typically offer better consistency than phone-based VPN apps. Show more Advanced tips and security best practices Key rotation: Change your WireGuard keys periodically to reduce the chance of compromised credentials over time. Proton issues profiles that are valid for one year until a new profile import is required.Hardware constraints: Lower-power routers (~700 MHz single-core) might cap out at ~100 Mbps for WireGuard, while dual-core ARM or x86 at 1.4+ GHz CPUs on these devices can handle hundreds of Mbps or more. (Firewalla Gold Pro can handle 2Gbps WireGuard connections.)Kill switch/fail-closed: In advanced firewall OSes (pfSense, OPNsense), you can configure firewall rules that drop all traffic if the VPN goes down, preventing accidental leaks.Zero-trust segmentation: Isolate IoT or guest devices on separate SSIDs/VLANs. If a device is breached, attackers can't easily pivot across the rest of your network. Building your WireGuard-compatible firewall router on Linux or FreeBSD For advanced users, building a WireGuard-compatible firewall router using open-source platforms like Linux or FreeBSD offers near-limitless customization. Solutions such as OPNsense and pfSense (FreeBSD-based) or OpenWRT and IPFire (Linux-based) provide robust options for integrating WireGuard at the OS level. These platforms allow for refined firewall rules, VLAN management, bandwidth shaping, and multi-WAN failover. While setup requires more technical expertise and hardware compatibility considerations, the payoff is unmatched control over advanced routing and security features. Next steps After you've set up WireGuard on a router via Proton VPN: Explore multi-hop/secure core: Proton VPN's paid plans offer layered routing for heightened privacy.Check WAN failover: If your router supports dual WAN or cellular backup, set up automatic failover so your VPN reconnects if one link drops.Refine policy-based routing: Split tunneling allows selective encryption, perfect for devices that need local content or minimal latency (e.g. gaming consoles).Self-host WireGuard: Platforms like AWS Lightsail, Linode, or DigitalOcean let you build your own VPN server, cutting out third-party operators entirely.Intrusion detection: Tools like Suricata or Snort on OPNsense or pfSense can monitor and block suspicious traffic in real time. The increasing need for router-based VPNs Growing geoblocks, censorship laws, and privacy concerns have made VPNs indispensable for many users. WireGuard stands out with its speed, simplicity, and open-source ethos. Proton VPN offers a robust, privacy-centric VPN that's straightforward to deploy on a wide range of routers, including Firewalla's Gold Series/AP7 for zero-trust segmentation or OpenWRT One for budget-friendly Wi-Fi 6 performance. Also:How we test VPNs in 2025With proper planning, you can maintain the freedom to access geo-blocked content and the security to navigate the modern web safely. Security
    0 Comentários 0 Compartilhamentos 20 Visualizações
  • WWW.ZDNET.COM
    CES 2025: This smart ring let me control appliances by pointing at them
    The Lotus system works like magic. And just like magic, the trick is much simpler than it looks.
    0 Comentários 0 Compartilhamentos 20 Visualizações
  • WWW.FORBES.COM
    CES 2025 Wrap-Up: The Future Of Tech Is Brighter, Smarter, And Picks Up After Itself
    The Roborock Saros Z70 robot vacuum cleaner drew crowds with its built-in arm that can pick up and ... [+] move objectsRoborockAs CES 2025 in Las Vegas closes its doors, its cavernous halls will soon be emptied of the stands and demo booths that drew in more than 150,000 visitors and members of the press from around the globe. Showcasing tech advances that could reshape consumer electronics throughout the year, this year's show highlighted particularly significant developments in display technology, AI-powered computing and home automation. Heres a round-up of some of the most influential products and key trends from this years show.Next-Generation DisplaysThe LG G5 introduces the company's four stack OLED panel to produce an even brighter image.LIM TAE JOON The display segment saw significant advances in panel technology and processing capabilities. One of the most prominent announcements this week was LG's G5 OLED TV, which abandons the previously favored Micro Lens Array (MLA) technology in favor of an innovative four-stack OLED panel design. This architectural change delivers a 40% brightness increase over the previous G4, with the crucial distinction that this improvement applies to full-screen content rather than just HDR highlights.By stacking four OLED panels together, the G5 is able to provide a noticeably brighter viewing experience for consumers an area in which OLED has traditionally struggled with compared to alternative Mini LED panel TVs. AI, too, has been a prominent part of the TV announcements at CES 2025, with the G5's new Alpha 11 Gen 2 processor providing AI-enhanced upscaling and 11.1.2 surround sound processing, while gaming capabilities have been enhanced with a 165Hz refresh rate, up from the previous 144Hz.Competing for attention in the premium display space, Hisense also unveiled the 116UX TriChroma Mini LED TV, with its innovative RGB Local Dimming Technology. This system employs specialized lenses that individually respond to red, green and blue-colored LEDs, enabling much more precise color control. Elsewhere, TCL's QM6K range brings Mini LED technology to more accessible price points, starting at $999 for the 65-inch model, with the two largest sizes featuring a specialized matte finish for glare reduction.Computing And AI IntegrationNvidia's RTX 5090 GPU offers unprecedented rendering power for consumers.Anadolu via Getty ImagesThe computing segment demonstrated how AI is continuing its integration across different device categories. Nvidia's Project Digits, starting at $3,000, represents a significant milestone in democratizing AI development. Built on the companys Grace Blackwell architecture, this compact system incorporates 92 billion transistors and delivers 3,352 trillion AI operations per second (TOPS). This performance level enables AI researchers and developers to work with large language models directly on their desktops rather than relying solely on cloud infrastructure.Read More: Nvidias Packed CES 2025 Keynote: Gaming, Robots, Self-Driving Cars And Personal AI SupercomputersThis AI acceleration extends to gaming hardware too, with Nvidia's powerful RTX 50-series GPUs taking center stage during the companys CES 2025 keynote. The flagship RTX 5090 introduces neural shaders and advanced ray tracing capabilities, promising up to double the performance of its predecessor through a combination of hardware improvements and DLSS 4 frame generation technology. The GPU's 3,352 TOPS of AI computing power also enables new features like autonomous game character personalities through next-gen Nvidia ACE technology.Form Factor InnovationThe Asus Zenbook A14 weighs under 1kg, thanks to an ultralight "Ceraluminum" chassis.AsusThis year, several manufacturers pushed the boundaries of traditional device design. Lenovo's ThinkBook Plus Gen 6, for example, introduces a rollable screen that expands vertically from 14 inches to 16.7 inches. The display responds to both physical button controls and gesture inputs, enabling users to adjust screen size by raising or lowering their palms. This innovation in display technology allows for enhanced multitasking capabilities while maintaining portability, though it will come at a cost $3,499, to be precise.In the ultraportable category, Asus's Zenbook A14 achieves an impressive blend of form and function, thanks to its innovative materials and design. Weighing under a kilogram thanks to its "Ceraluminum" chassis, the laptop combines Qualcomm's Snapdragon X silicon with a 14-inch OLED panel to deliver an impressive claimed battery life of up to 32 hours. It also provides a respectable number of connectivity options given its svelte form factor, including dual USB4 ports and HDMI 2.1.Smart Home And Health InnovationThis years show demonstrated significant advances in both home automation and health monitoring technology, with devices becoming more capable of complex physical interactions and health analysis.In the robotics space, the Roborock Saros Z70 robot vacuum cleaner represents a leap forward in automated home assistance. Its OmniGrip Mechanical Arm a sophisticated five-axis system thats built into the body of the robot vacuum itself can identify and lift objects up to 300g. Demos included the Z70 lifting socks out of the way so that cleaning routes could be kept clear. Beyond simple vacuum capabilities, the system also employs AI-driven object recognition to handle household items appropriately and includes pet detection features that modify its behavior around animals.On the health front, Withings introduced Omnia, a smart mirror concept that integrates health monitoring into daily routines. The system combines visual analysis with environmental sensors to track various health metrics, from posture to skin health offering a glimpse of how everyday objects might evolve to support wellness monitoring while blending in with their surroundings.The health monitoring landscape also saw particularly interesting developments with new over-the-counter glucose monitors. Dexcom's device targets Type 2 diabetes patients with a 30-day continuous monitoring system through an arm-mounted sensor connected to a smartphone app. Abbott's Lingo device takes a different approach, focusing on general wellness by tracking glucose responses to provide insights into eating habits, stress levels and exercise effects.In the mobile power space, Swippitt's Instant Power System introduces an innovative approach to device charging. The system combines a toaster-like hub that contains five pre-charged batteries with a specialized phone case, enabling near-instant power restoration through battery swapping rather than traditional charging. This two-second swap system could fundamentally change how users manage device power throughout their day.Lastly, Circular's second-generation smart ring advances wearable health monitoring with integrated ECG capability and AFib detection. Notably, the company has eliminated the need for physical sizing kits through new digital sizing technology that uses smartphone cameras to determine proper fit a first in the smart ring category.CES 2025 Wrap-UpOverall, CES 2025's innovations indicate an industry increasingly focused on practical AI implementation, novel form factors and enhanced automation capabilities. The convergence of AI processing power with traditional consumer electronics also points to potentially significant changes in how consumers interact with their devices throughout 2025 though only time will tell how widespread such adoption will be.
    0 Comentários 0 Compartilhamentos 22 Visualizações
  • WWW.FORBES.COM
    Can Trump Stop TikTok Ban? Heres What He CanAnd CantDo As Supreme Court Signals It Could Support Law
    ToplineThe Supreme Court signaled in oral arguments Friday that it may uphold the federal ban on TikTok, potentially leaving it up to President-elect Donald Trump to try and keep the app legal once he takes office but the president-elect has limited options if the law is upheld, and any attempts to stop it could be challenged in court.President-elect Donald Trump speaks at a news conference at his Mar-a-Lago resort on December 16 in ... [+] Palm Beach, Florida.Getty ImagesKey FactsTrump opposes the TikTok ban taking effect, his lawyers said in a recent court filing, and the president-elect asked, Why would I want to get rid of TikTok? on Truth Social last week, posting a graphic that boasted his popularity on the platform and the billions of views his official accounts and hashtags associated with him have garnered.The lawwhich prohibits U.S. app stores from hosting TikTok unless Chinese parent company ByteDance divests from itis scheduled to take effect one day before Trumps Jan. 20 inauguration, so Trump has also asked the Supreme Court to stop the law from taking effect until after he takes office, arguing he wants time to resolve the ban before it can take effect.Its unclear if the Supreme Court will comply with that request, and if the court upholds the law and it takes effect by the time Trump is inaugurated, hell have limited options on blocking it.The law empowers the president to pause the ban for 90 days if TikTok shows its in the process of separating from ByteDance, so Trump could pause it once he takes officethough without actual evidence showing ByteDance is divesting, Trumps pause may not be legally sound, meaning it could be challenged in court and the ban could take effect anyway.Trump could also similarly just declare TikTok in compliance with the lawregardless of whether or not its actually separated from ByteDanceUniversity of Minnesota law professor Alan Rozenshtein noted, which would keep TikTok legal but similarly leave room for the move to be challenged in court if ByteDance hasnt actually divested.Beyond that, Trump cant do much: He could try to negotiate a deal for TikTok to be sold to a U.S. company so it would properly comply with the law, but if ByteDance isnt willing to sellwhich so far it isntthe ban will stay in effect unless Congress decides to repeal the law.Crucial QuotePresident Trump opposes banning TikTok in the United States at this juncture, and seeks the ability to resolve the issues at hand through political means once he takes office, his lawyer Dean John Sauer wrote in a brief to the Supreme Court.What To Watch ForThe Supreme Court expressed skepticism of TikToks arguments against the ban during oral arguments on Jan. 10, signaling justices could uphold the ban. Its expected the court will quickly rule before the law is due to take effect Jan. 19. Though Trump has asked the Supreme Court to pause the ban until after his inauguration, he isnt a party in the litigation, and Rozenshtein told CBS News there are no legal grounds for Trump to unilaterally pause the law since hes still a private citizen and isnt actually the president yet. That means theres no guarantee the justices will listen to his request, and its still possible the law could take effect Jan. 19 before Trump takes office.Can Trump Just Not Enforce The Tiktok Ban?Another move Trump could technically make if the TikTok ban takes effect is to say his Justice Department just wont enforce the ban, inviting companies like Apple and Google to leave the app up on its app stores without facing the harsh financial penalties that the law imposes. But thats unlikely to work, as legal experts have noted companies would likely comply with the ban anyway, rather than risk facing penalties if Trump ever changed his mind.Will Bytedance Divest From Tiktok?TikTok and ByteDance so far havent shown any interest in separating, with TikTok arguing in a court filing that doing so is not possible technologically, commercially, or legally. It remains to be seen if the company will change its mind should the Supreme Court uphold the law and it actually take effect, however. Trump could also potentially have an impact on forcing ByteDances hand, as James Lewis, director of the Strategic Technologies Program at the Center for Strategic and International Studies, told NPR that China could be persuaded to approve of ByteDance selling TikTok in exchange for Trump backing off his threat of high tariffs on Chinese imports.What Happens If The Tiktok Ban Takes Effect?The full impact of the TikTok ban taking effect is still unclear. The law does not ban Americans from using TikTok and wouldnt wipe it from users phones, but rather bans U.S. app stores and internet service providers from hosting it. That means TikTok may not immediately stop working for its more than 170 million U.S. users. But it would mean that users could not download or update TikTok from Apple or Googles app stores, it would grow obsolete and eventually no longer work. Oracle also wouldnt be allowed to host TikToks U.S. user data, as it does now. It remains to be seen what the effects of that will be in practice: While TikTok said in a court filing that banning internet service providers from hosting the app means the company could no longer provid[e] the services that enable the TikTok platform to function, effectively shutting down TikTok in the United States, Rozenshtein noted to CBS News that TikTok could move its U.S. data servers out of the country, which would keep the app running. Its also still unknown how the ban will affect other parts of TikToks U.S. operations, like the TikTok Shop or paying creators who make money on the platform. Will The Ban Impact Possible Tiktok Alternative Lemon8?Yes, the ban is expected to similarly impact ByteDance-owned apps CapCut and Lemon8.Surprising FactIf the ban does take effect and block TikToks U.S. user data from being hosted by a U.S. company, its possible the data that TikTok already has on its American users could be moved to China, which a Forbes investigation found is what happened when India similarly banned the app. That would actually make it more likely the data could be accessed by the Chinese government, contrary to the federal laws national security goals.Key BackgroundPresident Joe Biden signed the bill requiring TikTok to leave ByteDance or else be banned into law in April, reflecting a bipartisan concern from lawmakers that the app poses a threat to national security. TikTok has long denied any wrongdoing or links to the Chinese government, but Forbes has reported numerous concerns involving the app, including TikTok spying on journalists, promoting Chinese propaganda that criticized U.S. politicians, mishandling user data and tracking sensitive words. The specific evidence the government has for justifying TikToks ban has not been made public, however, and was entirely redacted in court filings. TikTok and creators on the app sued to block the law days after it was enacted, arguing the ban unlawfully infringed on their First Amendment rights. A panel of federal judges sided with the governments argument that the ban was justified due to the national security threat and did not violate TikToks First Amendment rights, given that users can still post on the app if it just separates itself from ByteDance. The court ruled the law as it was enacted is actually a less restrictive way of handling the governments concerns about TikTok, given the fact it still allows the company to operate in the U.S. if ByteDance divests from it. TikTok appealed the case to the Supreme Court after the lower court declined to pause the law from taking effect, and the Supreme Court quickly took it up, scheduling arguments for Jan. 10 but declining to pause the law in the meantime.Further Reading
    0 Comentários 0 Compartilhamentos 20 Visualizações