• Well, well, well! Virgilio García has taken the reins of the European Committee for 3D Printing. Because nothing screams "we're serious about innovation" like appointing a guy to oversee the future of manufacturing who probably still uses a flip phone. As Europe scrambles to adopt additive manufacturing to boost competitiveness, it seems they've also decided to add a sprinkle of irony by making this appointment. Who knew the key to industrial autonomy was a 3D printer and a strong Wi-Fi connection? Let’s just hope Virgilio knows the difference between a filament and a fashion statement.

    #3DPrinting #VirgilioGarcía #Innovation #EuropeanIndustry #AdditiveManufacturing
    Well, well, well! Virgilio García has taken the reins of the European Committee for 3D Printing. Because nothing screams "we're serious about innovation" like appointing a guy to oversee the future of manufacturing who probably still uses a flip phone. As Europe scrambles to adopt additive manufacturing to boost competitiveness, it seems they've also decided to add a sprinkle of irony by making this appointment. Who knew the key to industrial autonomy was a 3D printer and a strong Wi-Fi connection? Let’s just hope Virgilio knows the difference between a filament and a fashion statement. #3DPrinting #VirgilioGarcía #Innovation #EuropeanIndustry #AdditiveManufacturing
    Virgilio García asume la presidencia del comité europeo de impresión 3D
    La fabricación aditiva está ganando protagonismo en Europa como una tecnología clave para fortalecer la competitividad industrial y la autonomía estratégica del continente. En este contexto, la coordinación a nivel europeo resulta fundamental para ac
    1 Comments 0 Shares
  • When you think about horror films, what comes to mind? Creepy monsters? Jump scares? The classic trope of a group of friends who somehow forget that splitting up is a bad idea? Well, hold onto your popcorn, because the talented folks at ESMA are here to remind us that the only thing scarier than a killer lurking in the shadows is the idea of them trying to be funny while doing it.

    Enter "Claw," a short film that dares to blend the horror genre with a sprinkle of humor – because who wouldn't want to laugh while being chased by a guy with a chainsaw? This cinematic masterpiece, which apparently took inspiration from the likes of "Last Action Hero," is like if a horror movie and a stand-up comedian had a baby, and we’re all just waiting for the punchline as we hide behind our couches.

    Imagine a young cinephile named Andrew, who is living his best life by binge-watching horror classics. However, instead of the usual blood and guts, he encounters a version of horror that leaves you both terrified and chuckling nervously. It’s like the directors at ESMA sat down and said, “Why not take everything that terrifies us and add a dash of quirky humor?” Honestly, it’s a wonder they didn’t throw in a musical number.

    Sure, we all adore the suspense that makes our hearts race, but the thought of Andrew laughing nervously at a killer with a penchant for puns? Now that’s a new level of fear. Who knew that horror could provide comic relief while simultaneously making us question our life choices? Forget battling your demons; let’s just joke about them instead! And if you think about it, that’s probably the best coping mechanism we’ve got.

    But beware! As you dive into this horror-comedy concoction, you might just find yourself chuckling at the most inappropriate moments. Like when the killer slips on a banana peel right before going for the kill – because nothing says “I’m terrified” like a comedy skit in a death scene. After all, isn’t that the essence of horror? To laugh in the face of danger, even if it’s through the lens of ESMA’s latest cinematic exploration?

    So, if you’re looking for a good time that sends shivers down your spine while keeping you in stitches, “Claw” is your go-to film. Just remember to keep a straight face when explaining to your friends why you’re laughing while watching someone get chased by a masked figure. But hey, in the world of horror, even the scariest movies can have a light-hearted twist – because why not?

    Embrace the terror, welcome the humor, and prepare yourself for a rollercoaster of emotions with "Claw." After all, if we can’t laugh at our fears, what’s the point?

    #ClawFilm #HorrorComedy #ESMA #CinematicHumor #HorrorMovies
    When you think about horror films, what comes to mind? Creepy monsters? Jump scares? The classic trope of a group of friends who somehow forget that splitting up is a bad idea? Well, hold onto your popcorn, because the talented folks at ESMA are here to remind us that the only thing scarier than a killer lurking in the shadows is the idea of them trying to be funny while doing it. Enter "Claw," a short film that dares to blend the horror genre with a sprinkle of humor – because who wouldn't want to laugh while being chased by a guy with a chainsaw? This cinematic masterpiece, which apparently took inspiration from the likes of "Last Action Hero," is like if a horror movie and a stand-up comedian had a baby, and we’re all just waiting for the punchline as we hide behind our couches. Imagine a young cinephile named Andrew, who is living his best life by binge-watching horror classics. However, instead of the usual blood and guts, he encounters a version of horror that leaves you both terrified and chuckling nervously. It’s like the directors at ESMA sat down and said, “Why not take everything that terrifies us and add a dash of quirky humor?” Honestly, it’s a wonder they didn’t throw in a musical number. Sure, we all adore the suspense that makes our hearts race, but the thought of Andrew laughing nervously at a killer with a penchant for puns? Now that’s a new level of fear. Who knew that horror could provide comic relief while simultaneously making us question our life choices? Forget battling your demons; let’s just joke about them instead! And if you think about it, that’s probably the best coping mechanism we’ve got. But beware! As you dive into this horror-comedy concoction, you might just find yourself chuckling at the most inappropriate moments. Like when the killer slips on a banana peel right before going for the kill – because nothing says “I’m terrified” like a comedy skit in a death scene. After all, isn’t that the essence of horror? To laugh in the face of danger, even if it’s through the lens of ESMA’s latest cinematic exploration? So, if you’re looking for a good time that sends shivers down your spine while keeping you in stitches, “Claw” is your go-to film. Just remember to keep a straight face when explaining to your friends why you’re laughing while watching someone get chased by a masked figure. But hey, in the world of horror, even the scariest movies can have a light-hearted twist – because why not? Embrace the terror, welcome the humor, and prepare yourself for a rollercoaster of emotions with "Claw." After all, if we can’t laugh at our fears, what’s the point? #ClawFilm #HorrorComedy #ESMA #CinematicHumor #HorrorMovies
    L’ESMA détourne les clichés des films d’horreurs : tremblez !
    Découvrez Claw, un court de fin d’études de l’ESMA qui s’inspire des codes des films d’horreur pour en proposer une version revisitée. A partir d’un concept qui rappelle Last Action Hero, l’équipe a concocté un fil
    Like
    Love
    Wow
    Sad
    Angry
    636
    1 Comments 0 Shares
  • Well, folks, it’s finally happened: Microsoft has teamed up with Asus to bless us with the “ROG Xbox Ally range” — yes, that’s right, the first Xbox handhelds have arrived! Because clearly, we were all just waiting for the day when we could play Halo on a device that fits in our pockets. Who needs a console at home when you can have a mini Xbox that can barely fit alongside your keys and loose change?

    Let’s take a moment to appreciate the sheer brilliance of this innovation. After years of gaming on a screen that’s bigger than your average coffee table, now you can squint at a miniature version of the Xbox screen while sitting on the bus. Who needs comfort and relaxation when you can sacrifice your eyesight for the sake of portability? Forget about the stress of lugging around your gaming setup; now you can just carry a glorified remote control!

    And how about that collaboration with Asus? Because when I think of epic gaming experiences, I definitely think of a partnership that sounds like it was cooked up in a boardroom over a cold cup of coffee. “What if we took the weight of a console and squeezed it into a device that feels like a brick?” Genius! The name “ROG Xbox Ally” even sounds like it was generated by an AI trying too hard to sound cool. “ROG” is obviously for “Really Over-the-Top Gaming,” and “Ally” is just the polite way of saying, “We’re in this mess together.”

    Let’s not overlook the fact that the last thing we needed in our lives was another device to charge. Who doesn’t love the thrill of realizing you forgot to plug in your handheld Xbox after a long day at work? Nothing screams “gaming freedom” quite like being tethered to a wall outlet while your friends are enjoying epic multiplayer sessions. Who wouldn’t want to take their gaming experience to the next level of inconvenience?

    Speaking of multiplayer, you can bet that those intense gaming sessions will be even more fun when you’re all huddled together, squinting at these tiny screens, trying to figure out how to communicate when half your friends can’t even see the action happening. It’s a whole new level of bonding, folks! “Did I just shoot you, or was that the guy on my left? Let’s argue about it while we all strain our necks to see the screen.”

    In conclusion, as we welcome the ROG Xbox Ally range into our lives, let’s take a moment to appreciate the madness of this handheld revolution. If you’ve ever dreamed of playing your favorite Xbox games on a device that feels like a high-tech paperweight, then congratulations! The future is here, and it’s as absurd as it sounds. Remember, gaming isn’t just about playing; it’s about how creatively we can inconvenience ourselves while doing so.

    #ROGXboxAlly #XboxHandheld #GamingInnovation #PortableGaming #TechHumor
    Well, folks, it’s finally happened: Microsoft has teamed up with Asus to bless us with the “ROG Xbox Ally range” — yes, that’s right, the first Xbox handhelds have arrived! Because clearly, we were all just waiting for the day when we could play Halo on a device that fits in our pockets. Who needs a console at home when you can have a mini Xbox that can barely fit alongside your keys and loose change? Let’s take a moment to appreciate the sheer brilliance of this innovation. After years of gaming on a screen that’s bigger than your average coffee table, now you can squint at a miniature version of the Xbox screen while sitting on the bus. Who needs comfort and relaxation when you can sacrifice your eyesight for the sake of portability? Forget about the stress of lugging around your gaming setup; now you can just carry a glorified remote control! And how about that collaboration with Asus? Because when I think of epic gaming experiences, I definitely think of a partnership that sounds like it was cooked up in a boardroom over a cold cup of coffee. “What if we took the weight of a console and squeezed it into a device that feels like a brick?” Genius! The name “ROG Xbox Ally” even sounds like it was generated by an AI trying too hard to sound cool. “ROG” is obviously for “Really Over-the-Top Gaming,” and “Ally” is just the polite way of saying, “We’re in this mess together.” Let’s not overlook the fact that the last thing we needed in our lives was another device to charge. Who doesn’t love the thrill of realizing you forgot to plug in your handheld Xbox after a long day at work? Nothing screams “gaming freedom” quite like being tethered to a wall outlet while your friends are enjoying epic multiplayer sessions. Who wouldn’t want to take their gaming experience to the next level of inconvenience? Speaking of multiplayer, you can bet that those intense gaming sessions will be even more fun when you’re all huddled together, squinting at these tiny screens, trying to figure out how to communicate when half your friends can’t even see the action happening. It’s a whole new level of bonding, folks! “Did I just shoot you, or was that the guy on my left? Let’s argue about it while we all strain our necks to see the screen.” In conclusion, as we welcome the ROG Xbox Ally range into our lives, let’s take a moment to appreciate the madness of this handheld revolution. If you’ve ever dreamed of playing your favorite Xbox games on a device that feels like a high-tech paperweight, then congratulations! The future is here, and it’s as absurd as it sounds. Remember, gaming isn’t just about playing; it’s about how creatively we can inconvenience ourselves while doing so. #ROGXboxAlly #XboxHandheld #GamingInnovation #PortableGaming #TechHumor
    The first Xbox handhelds have finally arrived
    The ROG Xbox Ally range has been developed by Microsoft in collaboration with Asus.
    Like
    Love
    Wow
    Sad
    Angry
    562
    1 Comments 0 Shares
  • So, it’s official: Andy Bogard is making his grand entrance into the gaming world again with Fatal Fury: City of the Wolves on June 24th. Because, let’s face it, we were all just waiting for another opportunity to see a man in a headband throw punches at pixelated opponents, right? I mean, who needs character development or innovative storytelling when you can have a guy with a sweet mullet and a never-ending supply of martial arts moves?

    It’s almost poetic, really. Here we are, in the year 2023, still throwing ourselves into the nostalgia of 90s fighting games. It’s like we’re all stuck in a time loop, eagerly awaiting the return of characters who clearly haven’t aged a day. Andy Bogard, with his flashy moves and a wardrobe that screams "I’m too cool for school," is the epitome of that era. Who needs new heroes when you have the same old faces to beat the proverbial stuffing out of each other?

    Let’s not ignore the clever marketing behind this either. “Fatal Fury: City of the Wolves” – a title that suggests we might actually encounter something wild and untamed. Spoiler alert: it’s just going to be more of the same. But hey, if you love the taste of nostalgia with a sprinkle of familiarity, then you’re in for a treat! I can already hear the collective “YAAAS!” from the fanbase as they dust off their old consoles, ready to relive the glory days of button-mashing combat.

    And what about the rest of the roster? You know, the characters who might actually bring something new to the table? Oh, who are we kidding! As long as Andy is there, it’s like the rest are just wallpaper in this nostalgic room. “Oh look, another character that’s not Andy Bogard! Let’s just ignore them and wait for him to throw a fireball again!”

    So mark your calendars, folks! June 24th is the date when we’ll all be reunited with our childhood memories. Just remember to keep the first aid kit handy because I can already hear the groans of all the players who will be nursing their thumbs after a night of relentless button-mashing.

    In a world that constantly craves innovation, it’s refreshing to see that some things never change. Here’s to Andy Bogard – the man, the myth, the mullet. May your punches be swift and your headband ever stylish.

    #AndyBogard #FatalFury #NostalgiaGaming #RetroGames #CityOfTheWolves
    So, it’s official: Andy Bogard is making his grand entrance into the gaming world again with Fatal Fury: City of the Wolves on June 24th. Because, let’s face it, we were all just waiting for another opportunity to see a man in a headband throw punches at pixelated opponents, right? I mean, who needs character development or innovative storytelling when you can have a guy with a sweet mullet and a never-ending supply of martial arts moves? It’s almost poetic, really. Here we are, in the year 2023, still throwing ourselves into the nostalgia of 90s fighting games. It’s like we’re all stuck in a time loop, eagerly awaiting the return of characters who clearly haven’t aged a day. Andy Bogard, with his flashy moves and a wardrobe that screams "I’m too cool for school," is the epitome of that era. Who needs new heroes when you have the same old faces to beat the proverbial stuffing out of each other? Let’s not ignore the clever marketing behind this either. “Fatal Fury: City of the Wolves” – a title that suggests we might actually encounter something wild and untamed. Spoiler alert: it’s just going to be more of the same. But hey, if you love the taste of nostalgia with a sprinkle of familiarity, then you’re in for a treat! I can already hear the collective “YAAAS!” from the fanbase as they dust off their old consoles, ready to relive the glory days of button-mashing combat. And what about the rest of the roster? You know, the characters who might actually bring something new to the table? Oh, who are we kidding! As long as Andy is there, it’s like the rest are just wallpaper in this nostalgic room. “Oh look, another character that’s not Andy Bogard! Let’s just ignore them and wait for him to throw a fireball again!” So mark your calendars, folks! June 24th is the date when we’ll all be reunited with our childhood memories. Just remember to keep the first aid kit handy because I can already hear the groans of all the players who will be nursing their thumbs after a night of relentless button-mashing. In a world that constantly craves innovation, it’s refreshing to see that some things never change. Here’s to Andy Bogard – the man, the myth, the mullet. May your punches be swift and your headband ever stylish. #AndyBogard #FatalFury #NostalgiaGaming #RetroGames #CityOfTheWolves
    Andy Bogard fera son entrée dans Fatal Fury: City of the Wolves le 24 juin
    ActuGaming.net Andy Bogard fera son entrée dans Fatal Fury: City of the Wolves le 24 juin Dans le roster de base de Fatal Fury: City of the Wolves, il y avait […] L'article Andy Bogard fera son entrée dans Fatal Fury: City of the Wolves le 24
    Like
    Love
    Wow
    Sad
    Angry
    550
    1 Comments 0 Shares
  • Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour

    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour
    A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbox Ally X will cost €899.

    Posted By Joelle Daniels | On 16th, Jun. 2025

    While Microsoft and Asus have unveiled the ROG Xbox Ally and ROG Xbox Ally X handheld gaming systems, the companies have yet to confirm the prices or release dates for the two systems. While the announcement  mentioned that they will be launched later this year, a new report, courtesy of leaker Extas1s, indicates that pre-orders for both devices will be kicked off in August, with the launch then happening in October. As noted by Extas1s, the lower-powered ROG Xbox Ally is expected to be priced around €599. The leaker claims to have corroborated the pricing details for the handheld with two different Europe-based retailers. The more powerful ROG Xbox Ally X, on the other hand, is expected to be priced at €899. This would put its pricing in line with Asus’s own ROG Ally X. Previously, Asus senior manager of marketing content for gaming, Whitson Gordon, had revealed that pricing and power use were the two biggest reasons why both the ROG Xbox Ally and the ROG Xbox Ally X didn’t feature OLED displays. Rather, both systems will come equipped with 7-inch 1080p 120 Hz LCD displays with variable refresh rate capabilities. “We did some R&D and prototyping with OLED, but it’s still not where we want it to be when you factor VRR into the mix and we aren’t willing to give up VRR,” said Gordon. “I’ll draw that line in the sand right now. I am of the opinion that if a display doesn’t have variable refresh rate, it’s not a gaming display in the year 2025 as far as I’m concerned, right? That’s a must-have feature, and OLED with VRR right now draws significantly more power than the LCD that we’re currently using on the Ally and it costs more.” Explaining further that the decision ultimately also came down to keeping the pricing for both systems at reasonable levels, since buyers often tend to get handheld gaming systems as their secondary machiens, Gordon noted that both handhelds would have much higher price tags if OLED displays were used. “That’s all I’ll say about price,” said Gordon. “You have to align your expectations with the market and what we’re doing here. Adding 32GB, OLED, Z2 Extreme, and all of those extra bells and whistles would cost a lot more than the price bracket you guys are used to on the Ally, and the vast majority of users are not willing to pay that kind of price.” Shortly after its announcement, Microsoft and Asus had released a video where the two companies spoke about the various features of the ROG Xbox Ally and ROG Xbox Ally X. In the video, we also get to see an early hardware prototype of the handheld gaming system built inside a cardboard box. The ROG Xbox Ally runs on an AMD Ryzen Z2A chip, and has 16 GB of LPDDR5X-6400 RAM and 512 GB of storage. The ROG Xbox Ally X, on the other hand, runs on an AMD Ryzen Z2 Extreme chip, and has 24 GB of LPDDR5X-8000 RAM and 1 TB of storage. Both systems run on Windows. Tagged With:

    Elden Ring: Nightreign
    Publisher:Bandai Namco Developer:FromSoftware Platforms:PS5, Xbox Series X, PS4, Xbox One, PCView More
    FBC: Firebreak
    Publisher:Remedy Entertainment Developer:Remedy Entertainment Platforms:PS5, Xbox Series X, PCView More
    Death Stranding 2: On the Beach
    Publisher:Sony Developer:Kojima Productions Platforms:PS5View More
    Amazing Articles You Might Want To Check Out!

    Summer Game Fest 2025 Saw 89 Percent Growth in Live Concurrent Viewership Since Last Year This year's Summer Game Fest has been the most successful one so far, with around 1.5 million live viewers on ...
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbo...
    Borderlands 4 Gets New Video Explaining the Process of Creating Vault Hunters According to the development team behind Borderlands 4, the creation of Vault Hunters is a studio-wide collabo...
    The Witcher 4 Team is Tapping Into the “Good Creative Chaos” From The Witcher 3’s Development Narrative director Philipp Weber says there are "new questions we want to answer because this is supposed to f...
    The Witcher 4 is Opting for “Console-First Development” to Ensure 60 FPS, Says VP of Tech However, CD Projekt RED's Charles Tremblay says 60 frames per second will be "extremely challenging" on the Xb...
    Red Dead Redemption Voice Actor Teases “Exciting News” for This Week Actor Rob Wiethoff teases an announcement, potentially the rumored release of Red Dead Redemption 2 on Xbox Se... View More
    #asus #rog #xbox #ally #start
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbox Ally X will cost €899. Posted By Joelle Daniels | On 16th, Jun. 2025 While Microsoft and Asus have unveiled the ROG Xbox Ally and ROG Xbox Ally X handheld gaming systems, the companies have yet to confirm the prices or release dates for the two systems. While the announcement  mentioned that they will be launched later this year, a new report, courtesy of leaker Extas1s, indicates that pre-orders for both devices will be kicked off in August, with the launch then happening in October. As noted by Extas1s, the lower-powered ROG Xbox Ally is expected to be priced around €599. The leaker claims to have corroborated the pricing details for the handheld with two different Europe-based retailers. The more powerful ROG Xbox Ally X, on the other hand, is expected to be priced at €899. This would put its pricing in line with Asus’s own ROG Ally X. Previously, Asus senior manager of marketing content for gaming, Whitson Gordon, had revealed that pricing and power use were the two biggest reasons why both the ROG Xbox Ally and the ROG Xbox Ally X didn’t feature OLED displays. Rather, both systems will come equipped with 7-inch 1080p 120 Hz LCD displays with variable refresh rate capabilities. “We did some R&D and prototyping with OLED, but it’s still not where we want it to be when you factor VRR into the mix and we aren’t willing to give up VRR,” said Gordon. “I’ll draw that line in the sand right now. I am of the opinion that if a display doesn’t have variable refresh rate, it’s not a gaming display in the year 2025 as far as I’m concerned, right? That’s a must-have feature, and OLED with VRR right now draws significantly more power than the LCD that we’re currently using on the Ally and it costs more.” Explaining further that the decision ultimately also came down to keeping the pricing for both systems at reasonable levels, since buyers often tend to get handheld gaming systems as their secondary machiens, Gordon noted that both handhelds would have much higher price tags if OLED displays were used. “That’s all I’ll say about price,” said Gordon. “You have to align your expectations with the market and what we’re doing here. Adding 32GB, OLED, Z2 Extreme, and all of those extra bells and whistles would cost a lot more than the price bracket you guys are used to on the Ally, and the vast majority of users are not willing to pay that kind of price.” Shortly after its announcement, Microsoft and Asus had released a video where the two companies spoke about the various features of the ROG Xbox Ally and ROG Xbox Ally X. In the video, we also get to see an early hardware prototype of the handheld gaming system built inside a cardboard box. The ROG Xbox Ally runs on an AMD Ryzen Z2A chip, and has 16 GB of LPDDR5X-6400 RAM and 512 GB of storage. The ROG Xbox Ally X, on the other hand, runs on an AMD Ryzen Z2 Extreme chip, and has 24 GB of LPDDR5X-8000 RAM and 1 TB of storage. Both systems run on Windows. Tagged With: Elden Ring: Nightreign Publisher:Bandai Namco Developer:FromSoftware Platforms:PS5, Xbox Series X, PS4, Xbox One, PCView More FBC: Firebreak Publisher:Remedy Entertainment Developer:Remedy Entertainment Platforms:PS5, Xbox Series X, PCView More Death Stranding 2: On the Beach Publisher:Sony Developer:Kojima Productions Platforms:PS5View More Amazing Articles You Might Want To Check Out! Summer Game Fest 2025 Saw 89 Percent Growth in Live Concurrent Viewership Since Last Year This year's Summer Game Fest has been the most successful one so far, with around 1.5 million live viewers on ... Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbo... Borderlands 4 Gets New Video Explaining the Process of Creating Vault Hunters According to the development team behind Borderlands 4, the creation of Vault Hunters is a studio-wide collabo... The Witcher 4 Team is Tapping Into the “Good Creative Chaos” From The Witcher 3’s Development Narrative director Philipp Weber says there are "new questions we want to answer because this is supposed to f... The Witcher 4 is Opting for “Console-First Development” to Ensure 60 FPS, Says VP of Tech However, CD Projekt RED's Charles Tremblay says 60 frames per second will be "extremely challenging" on the Xb... Red Dead Redemption Voice Actor Teases “Exciting News” for This Week Actor Rob Wiethoff teases an announcement, potentially the rumored release of Red Dead Redemption 2 on Xbox Se... View More #asus #rog #xbox #ally #start
    GAMINGBOLT.COM
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour
    Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbox Ally X will cost €899. Posted By Joelle Daniels | On 16th, Jun. 2025 While Microsoft and Asus have unveiled the ROG Xbox Ally and ROG Xbox Ally X handheld gaming systems, the companies have yet to confirm the prices or release dates for the two systems. While the announcement  mentioned that they will be launched later this year, a new report, courtesy of leaker Extas1s, indicates that pre-orders for both devices will be kicked off in August, with the launch then happening in October. As noted by Extas1s, the lower-powered ROG Xbox Ally is expected to be priced around €599. The leaker claims to have corroborated the pricing details for the handheld with two different Europe-based retailers. The more powerful ROG Xbox Ally X, on the other hand, is expected to be priced at €899. This would put its pricing in line with Asus’s own ROG Ally X. Previously, Asus senior manager of marketing content for gaming, Whitson Gordon, had revealed that pricing and power use were the two biggest reasons why both the ROG Xbox Ally and the ROG Xbox Ally X didn’t feature OLED displays. Rather, both systems will come equipped with 7-inch 1080p 120 Hz LCD displays with variable refresh rate capabilities. “We did some R&D and prototyping with OLED, but it’s still not where we want it to be when you factor VRR into the mix and we aren’t willing to give up VRR,” said Gordon. “I’ll draw that line in the sand right now. I am of the opinion that if a display doesn’t have variable refresh rate, it’s not a gaming display in the year 2025 as far as I’m concerned, right? That’s a must-have feature, and OLED with VRR right now draws significantly more power than the LCD that we’re currently using on the Ally and it costs more.” Explaining further that the decision ultimately also came down to keeping the pricing for both systems at reasonable levels, since buyers often tend to get handheld gaming systems as their secondary machiens, Gordon noted that both handhelds would have much higher price tags if OLED displays were used. “That’s all I’ll say about price,” said Gordon. “You have to align your expectations with the market and what we’re doing here. Adding 32GB, OLED, Z2 Extreme, and all of those extra bells and whistles would cost a lot more than the price bracket you guys are used to on the Ally, and the vast majority of users are not willing to pay that kind of price.” Shortly after its announcement, Microsoft and Asus had released a video where the two companies spoke about the various features of the ROG Xbox Ally and ROG Xbox Ally X. In the video, we also get to see an early hardware prototype of the handheld gaming system built inside a cardboard box. The ROG Xbox Ally runs on an AMD Ryzen Z2A chip, and has 16 GB of LPDDR5X-6400 RAM and 512 GB of storage. The ROG Xbox Ally X, on the other hand, runs on an AMD Ryzen Z2 Extreme chip, and has 24 GB of LPDDR5X-8000 RAM and 1 TB of storage. Both systems run on Windows. Tagged With: Elden Ring: Nightreign Publisher:Bandai Namco Developer:FromSoftware Platforms:PS5, Xbox Series X, PS4, Xbox One, PCView More FBC: Firebreak Publisher:Remedy Entertainment Developer:Remedy Entertainment Platforms:PS5, Xbox Series X, PCView More Death Stranding 2: On the Beach Publisher:Sony Developer:Kojima Productions Platforms:PS5View More Amazing Articles You Might Want To Check Out! Summer Game Fest 2025 Saw 89 Percent Growth in Live Concurrent Viewership Since Last Year This year's Summer Game Fest has been the most successful one so far, with around 1.5 million live viewers on ... Asus ROG Xbox Ally, ROG Xbox Ally X to Start Pre-Orders in August, Launch in October – Rumour A new report indicates that the ROG Xbox Ally will be priced at around €599, while the more powerful ROG Xbo... Borderlands 4 Gets New Video Explaining the Process of Creating Vault Hunters According to the development team behind Borderlands 4, the creation of Vault Hunters is a studio-wide collabo... The Witcher 4 Team is Tapping Into the “Good Creative Chaos” From The Witcher 3’s Development Narrative director Philipp Weber says there are "new questions we want to answer because this is supposed to f... The Witcher 4 is Opting for “Console-First Development” to Ensure 60 FPS, Says VP of Tech However, CD Projekt RED's Charles Tremblay says 60 frames per second will be "extremely challenging" on the Xb... Red Dead Redemption Voice Actor Teases “Exciting News” for This Week Actor Rob Wiethoff teases an announcement, potentially the rumored release of Red Dead Redemption 2 on Xbox Se... View More
    Like
    Love
    Wow
    Sad
    Angry
    600
    2 Comments 0 Shares
  • Games Inbox: Would Xbox ever shut down Game Pass?

    Game Pass – will it continue forever?The Monday letters page struggles to predict what’s going to happen with the PlayStation 6, as one reader sees their opinion of the Switch 2 change over time.
    To join in with the discussions yourself email gamecentral@metro.co.uk
    Final Pass
    I agree with a lot of what was said about the current state of Xbox in the Reader’s Feature this weekend and how the more Microsoft spends, and the more companies they own, the less the seem to be in control. Which is very strange really.The biggest recent failure has got to be Game Pass, which has not had the impact they expected and yet they don’t seem ready to acknowledge that. If they’re thinking of increasing the price again, like those rumours say, then I think that will be the point at which you can draw a line under the whole idea and admit it’s never going to catch on.
    But would Microsoft ever shut down Game Pass completely? I feel that would almost be more humiliating than stopping making consoles, so I can’t really imagine it. Instead, they’ll make it more and more expensive and put more and more restrictions on day one games until it’s no longer recognisable.Grackle
    Panic button
    Strange to see Sony talking relatively openly about Nintendo and Microsoft as competition. I can’t remember the last time they mentioned either of them, even if they obviously would prefer not to have, if they hadn’t been asked by investors.At no point did they acknowledge that the Switch has completely outsold both their last two consoles, so I’m not sure where their confidence comes from. I guess it’s from the fact that they know they’ve done nothing this gen and still come out on top, so from their perspective they’ve got plenty in reserve.

    Expert, exclusive gaming analysis

    Sign up to the GameCentral newsletter for a unique take on the week in gaming, alongside the latest reviews and more. Delivered to your inbox every Saturday morning.

    Having your panic button being ‘do anything at all’ must be pretty reassuring really. Nintendo has had to work to get where they are with the Switch but Sony is just coasting it.Lupus
    James’ LadderJacob’s Ladder is a film I’ve been meaning to watch for a while, and I guessed the ending quite early on, but it feels like a Silent Hill film. I don’t know if you guys have seen it but it’s an excellent film and the hospital scene near the end, and the cages blocking off the underground early on, just remind me of the game.
    A depressing film overall but worth a watch.Simon
    GC: Jacob’s Ladder was as a major influence on Silent Hill 2 in particular, even the jacket James is wearing is the same.
    Email your comments to: gamecentral@metro.co.uk
    Seeing the future
    I know everyone likes to think of themselves as Nostradamus, but I have to admit I have absolutely no clue what Sony is planning for the PlayStation 6. A new console that is just the usual update, that sits under your TV, is easy enough to imagine but surely they’re not going to do that again?But the idea of having new home and portable machines that come out at the same time seems so unlikely to me. Surely the portable wouldn’t be a separate format, but I can’t see it being any kind of portable that runs its own games because it’d never be as powerful as the home machine. So, it’s really just a PlayStation Portal 2?
    Like I said, I don’t know, but for some reason I have a bad feeling about that the next gen and whatever Sony does end up unveiling. I suspect that whatever they and Microsoft does it’s going to end up making the Switch 2seem even more appealing by comparison.Gonch
    Hidden insight
    I’m not going to say that Welcome Tour is a good game but what I will say is that I found it very interesting at times and I’m actually kind of surprised that Nintendo revealed some of the information that they did. Most of it could probably be found out by reverse engineering it and just taking it apart but I’m still surprised it went into as much detail as it did.You’re right that it’s all presented in a very dull way but personally I found the ‘Insights’ to be the best part of the game. The minigames really are not very good and I was always glad when they were over. So, while I would not necessarily recommend the gameI would say that it can be of interest to people who have an interest in how consoles work and how Nintendo think.Mogwai
    Purchase privilege
    I’ve recently had the privilege of buying Clair Obscur: Expedition 33 from the website CDKeys, using a 10% discount code. I was lucky enough to only spend a total of £25.99; much cheaper than purchasing the title for console. If only Ubisoft had the foresight to see what they allowed to slip through their fingers. I’d also like to mention that from what I’ve read quite recently ,and a couple of mixed views, I don’t see myself cancelling my Switch 2. On the contrary, it just is coming across as a disappointment.From the battery life to the lack of launch titles, an empty open world is never a smart choice to make not even Mario is safe from that. That leaves the upcoming ROG Xbox Ally that’s recently been showcased and is set for an October launch.
    I won’t lie it does look in the same vein as the Switch 2, far too similar to the ROG Ally X model. Just with grips and a dedicated Xbox button. The Z2 Extreme chip has me intrigued, however. How much of a transcendental shift it makes is another question however. I’ll have to wait to receive official confirmation for a price and release date. But there’s also a Lenovo Legion Go 2 waiting in the wings. I hope we hear more information soon. Preferably before my 28th in August.Shahzaib Sadiq
    Tip of the iceberg
    Interesting to hear about Cyberpunk 2077 running well on the Switch 2. I think if they’re getting that kind of performance at launch, from a third party not use to working with Nintendo hardware, that bodes very well for the future.I think we’re probably underestimating the Switch 2 a lot at the moment and stuff we’ll be seeing in two or three years is going to be amazing, I predict. What I can’t predict is when we’ll hear about any of this. I really hope there’s a Nintendo Direct this week.Dano
    Changing opinions
    So just a little over a week with the Switch 2 and after initially feeling incredibly meh about the new console and Mario Kart a little more playtime has been more optimistic about the console and much more positive about Mario Kart World.It did feel odd having a new console from Nintendo that didn’t inspire that childlike excitement. An iterative upgrade isn’t very exciting and as I own a Steam Deck the advancements in processing weren’t all that exciting either. I can imagine someone who only bough an OG Switch back in 2017 really noticing the improvements but if you bought an OLED it’s basically a Switch Pro.
    The criminally low level of software support doesn’t help. I double dipped Street Fighter 6 only to discover I can’t transfer progress or DLC across from my Xbox, which sort of means if I want both profiles to have parity I have to buy everything twice! I also treated myself to a new Pro Controller and find using it for Street Fighter almost unplayable as the L and ZL buttons are far too easy to accidently press when playing.
    Mario Kart initially felt like more of the same and it was only after I made an effort to explore the world map, unlock characters and karts, and try the new grinding/ollie mechanic that it clicked. I am now really enjoying it, especially the remixed soundtracks.
    I do however want more Switch 2 exclusive experiences – going back through my back catalogue for improved frame rates doesn’t cut it Nintendo! As someone with a large digital library the system transfer was very frustrating and the new virtual cartridges are just awful – does a Switch 2 need to be online all the time now? Not the best idea for a portable system.
    So, the start of a new console lifecycle and hopefully lots of new IP – I suspect Nintendo will try and get us to revisit our back catalogues first though.BristolPete
    Inbox also-rans
    Just thought I would mention that if anyone’s interested in purchasing the Mortal Kombat 1 Definitive Edition, which includes all DLC, that it’s currently an absolute steal on the Xbox store at £21.99.Nick The GreekI’ve just won my first Knockout Tour online race on Mario Kart World! I’ve got to say, the feeling is magnificent.Rable

    More Trending

    Email your comments to: gamecentral@metro.co.uk
    The small printNew Inbox updates appear every weekday morning, with special Hot Topic Inboxes at the weekend. Readers’ letters are used on merit and may be edited for length and content.
    You can also submit your own 500 to 600-word Reader’s Feature at any time via email or our Submit Stuff page, which if used will be shown in the next available weekend slot.
    You can also leave your comments below and don’t forget to follow us on Twitter.
    Arrow
    MORE: Games Inbox: Is Mario Kart World too hard?

    GameCentral
    Sign up for exclusive analysis, latest releases, and bonus community content.
    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    #games #inbox #would #xbox #ever
    Games Inbox: Would Xbox ever shut down Game Pass?
    Game Pass – will it continue forever?The Monday letters page struggles to predict what’s going to happen with the PlayStation 6, as one reader sees their opinion of the Switch 2 change over time. To join in with the discussions yourself email gamecentral@metro.co.uk Final Pass I agree with a lot of what was said about the current state of Xbox in the Reader’s Feature this weekend and how the more Microsoft spends, and the more companies they own, the less the seem to be in control. Which is very strange really.The biggest recent failure has got to be Game Pass, which has not had the impact they expected and yet they don’t seem ready to acknowledge that. If they’re thinking of increasing the price again, like those rumours say, then I think that will be the point at which you can draw a line under the whole idea and admit it’s never going to catch on. But would Microsoft ever shut down Game Pass completely? I feel that would almost be more humiliating than stopping making consoles, so I can’t really imagine it. Instead, they’ll make it more and more expensive and put more and more restrictions on day one games until it’s no longer recognisable.Grackle Panic button Strange to see Sony talking relatively openly about Nintendo and Microsoft as competition. I can’t remember the last time they mentioned either of them, even if they obviously would prefer not to have, if they hadn’t been asked by investors.At no point did they acknowledge that the Switch has completely outsold both their last two consoles, so I’m not sure where their confidence comes from. I guess it’s from the fact that they know they’ve done nothing this gen and still come out on top, so from their perspective they’ve got plenty in reserve. Expert, exclusive gaming analysis Sign up to the GameCentral newsletter for a unique take on the week in gaming, alongside the latest reviews and more. Delivered to your inbox every Saturday morning. Having your panic button being ‘do anything at all’ must be pretty reassuring really. Nintendo has had to work to get where they are with the Switch but Sony is just coasting it.Lupus James’ LadderJacob’s Ladder is a film I’ve been meaning to watch for a while, and I guessed the ending quite early on, but it feels like a Silent Hill film. I don’t know if you guys have seen it but it’s an excellent film and the hospital scene near the end, and the cages blocking off the underground early on, just remind me of the game. A depressing film overall but worth a watch.Simon GC: Jacob’s Ladder was as a major influence on Silent Hill 2 in particular, even the jacket James is wearing is the same. Email your comments to: gamecentral@metro.co.uk Seeing the future I know everyone likes to think of themselves as Nostradamus, but I have to admit I have absolutely no clue what Sony is planning for the PlayStation 6. A new console that is just the usual update, that sits under your TV, is easy enough to imagine but surely they’re not going to do that again?But the idea of having new home and portable machines that come out at the same time seems so unlikely to me. Surely the portable wouldn’t be a separate format, but I can’t see it being any kind of portable that runs its own games because it’d never be as powerful as the home machine. So, it’s really just a PlayStation Portal 2? Like I said, I don’t know, but for some reason I have a bad feeling about that the next gen and whatever Sony does end up unveiling. I suspect that whatever they and Microsoft does it’s going to end up making the Switch 2seem even more appealing by comparison.Gonch Hidden insight I’m not going to say that Welcome Tour is a good game but what I will say is that I found it very interesting at times and I’m actually kind of surprised that Nintendo revealed some of the information that they did. Most of it could probably be found out by reverse engineering it and just taking it apart but I’m still surprised it went into as much detail as it did.You’re right that it’s all presented in a very dull way but personally I found the ‘Insights’ to be the best part of the game. The minigames really are not very good and I was always glad when they were over. So, while I would not necessarily recommend the gameI would say that it can be of interest to people who have an interest in how consoles work and how Nintendo think.Mogwai Purchase privilege I’ve recently had the privilege of buying Clair Obscur: Expedition 33 from the website CDKeys, using a 10% discount code. I was lucky enough to only spend a total of £25.99; much cheaper than purchasing the title for console. If only Ubisoft had the foresight to see what they allowed to slip through their fingers. I’d also like to mention that from what I’ve read quite recently ,and a couple of mixed views, I don’t see myself cancelling my Switch 2. On the contrary, it just is coming across as a disappointment.From the battery life to the lack of launch titles, an empty open world is never a smart choice to make not even Mario is safe from that. That leaves the upcoming ROG Xbox Ally that’s recently been showcased and is set for an October launch. I won’t lie it does look in the same vein as the Switch 2, far too similar to the ROG Ally X model. Just with grips and a dedicated Xbox button. The Z2 Extreme chip has me intrigued, however. How much of a transcendental shift it makes is another question however. I’ll have to wait to receive official confirmation for a price and release date. But there’s also a Lenovo Legion Go 2 waiting in the wings. I hope we hear more information soon. Preferably before my 28th in August.Shahzaib Sadiq Tip of the iceberg Interesting to hear about Cyberpunk 2077 running well on the Switch 2. I think if they’re getting that kind of performance at launch, from a third party not use to working with Nintendo hardware, that bodes very well for the future.I think we’re probably underestimating the Switch 2 a lot at the moment and stuff we’ll be seeing in two or three years is going to be amazing, I predict. What I can’t predict is when we’ll hear about any of this. I really hope there’s a Nintendo Direct this week.Dano Changing opinions So just a little over a week with the Switch 2 and after initially feeling incredibly meh about the new console and Mario Kart a little more playtime has been more optimistic about the console and much more positive about Mario Kart World.It did feel odd having a new console from Nintendo that didn’t inspire that childlike excitement. An iterative upgrade isn’t very exciting and as I own a Steam Deck the advancements in processing weren’t all that exciting either. I can imagine someone who only bough an OG Switch back in 2017 really noticing the improvements but if you bought an OLED it’s basically a Switch Pro. The criminally low level of software support doesn’t help. I double dipped Street Fighter 6 only to discover I can’t transfer progress or DLC across from my Xbox, which sort of means if I want both profiles to have parity I have to buy everything twice! I also treated myself to a new Pro Controller and find using it for Street Fighter almost unplayable as the L and ZL buttons are far too easy to accidently press when playing. Mario Kart initially felt like more of the same and it was only after I made an effort to explore the world map, unlock characters and karts, and try the new grinding/ollie mechanic that it clicked. I am now really enjoying it, especially the remixed soundtracks. I do however want more Switch 2 exclusive experiences – going back through my back catalogue for improved frame rates doesn’t cut it Nintendo! As someone with a large digital library the system transfer was very frustrating and the new virtual cartridges are just awful – does a Switch 2 need to be online all the time now? Not the best idea for a portable system. So, the start of a new console lifecycle and hopefully lots of new IP – I suspect Nintendo will try and get us to revisit our back catalogues first though.BristolPete Inbox also-rans Just thought I would mention that if anyone’s interested in purchasing the Mortal Kombat 1 Definitive Edition, which includes all DLC, that it’s currently an absolute steal on the Xbox store at £21.99.Nick The GreekI’ve just won my first Knockout Tour online race on Mario Kart World! I’ve got to say, the feeling is magnificent.Rable More Trending Email your comments to: gamecentral@metro.co.uk The small printNew Inbox updates appear every weekday morning, with special Hot Topic Inboxes at the weekend. Readers’ letters are used on merit and may be edited for length and content. You can also submit your own 500 to 600-word Reader’s Feature at any time via email or our Submit Stuff page, which if used will be shown in the next available weekend slot. You can also leave your comments below and don’t forget to follow us on Twitter. Arrow MORE: Games Inbox: Is Mario Kart World too hard? GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy #games #inbox #would #xbox #ever
    METRO.CO.UK
    Games Inbox: Would Xbox ever shut down Game Pass?
    Game Pass – will it continue forever? (Microsoft) The Monday letters page struggles to predict what’s going to happen with the PlayStation 6, as one reader sees their opinion of the Switch 2 change over time. To join in with the discussions yourself email gamecentral@metro.co.uk Final Pass I agree with a lot of what was said about the current state of Xbox in the Reader’s Feature this weekend and how the more Microsoft spends, and the more companies they own, the less the seem to be in control. Which is very strange really.The biggest recent failure has got to be Game Pass, which has not had the impact they expected and yet they don’t seem ready to acknowledge that. If they’re thinking of increasing the price again, like those rumours say, then I think that will be the point at which you can draw a line under the whole idea and admit it’s never going to catch on. But would Microsoft ever shut down Game Pass completely? I feel that would almost be more humiliating than stopping making consoles, so I can’t really imagine it. Instead, they’ll make it more and more expensive and put more and more restrictions on day one games until it’s no longer recognisable.Grackle Panic button Strange to see Sony talking relatively openly about Nintendo and Microsoft as competition. I can’t remember the last time they mentioned either of them, even if they obviously would prefer not to have, if they hadn’t been asked by investors.At no point did they acknowledge that the Switch has completely outsold both their last two consoles, so I’m not sure where their confidence comes from. I guess it’s from the fact that they know they’ve done nothing this gen and still come out on top, so from their perspective they’ve got plenty in reserve. Expert, exclusive gaming analysis Sign up to the GameCentral newsletter for a unique take on the week in gaming, alongside the latest reviews and more. Delivered to your inbox every Saturday morning. Having your panic button being ‘do anything at all’ must be pretty reassuring really. Nintendo has had to work to get where they are with the Switch but Sony is just coasting it.Lupus James’ LadderJacob’s Ladder is a film I’ve been meaning to watch for a while, and I guessed the ending quite early on, but it feels like a Silent Hill film. I don’t know if you guys have seen it but it’s an excellent film and the hospital scene near the end, and the cages blocking off the underground early on, just remind me of the game. A depressing film overall but worth a watch.Simon GC: Jacob’s Ladder was as a major influence on Silent Hill 2 in particular, even the jacket James is wearing is the same. Email your comments to: gamecentral@metro.co.uk Seeing the future I know everyone likes to think of themselves as Nostradamus, but I have to admit I have absolutely no clue what Sony is planning for the PlayStation 6. A new console that is just the usual update, that sits under your TV, is easy enough to imagine but surely they’re not going to do that again?But the idea of having new home and portable machines that come out at the same time seems so unlikely to me. Surely the portable wouldn’t be a separate format, but I can’t see it being any kind of portable that runs its own games because it’d never be as powerful as the home machine. So, it’s really just a PlayStation Portal 2? Like I said, I don’t know, but for some reason I have a bad feeling about that the next gen and whatever Sony does end up unveiling. I suspect that whatever they and Microsoft does it’s going to end up making the Switch 2 (and PC) seem even more appealing by comparison.Gonch Hidden insight I’m not going to say that Welcome Tour is a good game but what I will say is that I found it very interesting at times and I’m actually kind of surprised that Nintendo revealed some of the information that they did. Most of it could probably be found out by reverse engineering it and just taking it apart but I’m still surprised it went into as much detail as it did.You’re right that it’s all presented in a very dull way but personally I found the ‘Insights’ to be the best part of the game. The minigames really are not very good and I was always glad when they were over. So, while I would not necessarily recommend the game (it’s not really a game) I would say that it can be of interest to people who have an interest in how consoles work and how Nintendo think.Mogwai Purchase privilege I’ve recently had the privilege of buying Clair Obscur: Expedition 33 from the website CDKeys, using a 10% discount code. I was lucky enough to only spend a total of £25.99; much cheaper than purchasing the title for console. If only Ubisoft had the foresight to see what they allowed to slip through their fingers. I’d also like to mention that from what I’ve read quite recently ,and a couple of mixed views, I don’t see myself cancelling my Switch 2. On the contrary, it just is coming across as a disappointment.From the battery life to the lack of launch titles, an empty open world is never a smart choice to make not even Mario is safe from that. That leaves the upcoming ROG Xbox Ally that’s recently been showcased and is set for an October launch. I won’t lie it does look in the same vein as the Switch 2, far too similar to the ROG Ally X model. Just with grips and a dedicated Xbox button. The Z2 Extreme chip has me intrigued, however. How much of a transcendental shift it makes is another question however. I’ll have to wait to receive official confirmation for a price and release date. But there’s also a Lenovo Legion Go 2 waiting in the wings. I hope we hear more information soon. Preferably before my 28th in August.Shahzaib Sadiq Tip of the iceberg Interesting to hear about Cyberpunk 2077 running well on the Switch 2. I think if they’re getting that kind of performance at launch, from a third party not use to working with Nintendo hardware, that bodes very well for the future.I think we’re probably underestimating the Switch 2 a lot at the moment and stuff we’ll be seeing in two or three years is going to be amazing, I predict. What I can’t predict is when we’ll hear about any of this. I really hope there’s a Nintendo Direct this week.Dano Changing opinions So just a little over a week with the Switch 2 and after initially feeling incredibly meh about the new console and Mario Kart a little more playtime has been more optimistic about the console and much more positive about Mario Kart World.It did feel odd having a new console from Nintendo that didn’t inspire that childlike excitement. An iterative upgrade isn’t very exciting and as I own a Steam Deck the advancements in processing weren’t all that exciting either. I can imagine someone who only bough an OG Switch back in 2017 really noticing the improvements but if you bought an OLED it’s basically a Switch Pro (minus the OLED). The criminally low level of software support doesn’t help. I double dipped Street Fighter 6 only to discover I can’t transfer progress or DLC across from my Xbox, which sort of means if I want both profiles to have parity I have to buy everything twice! I also treated myself to a new Pro Controller and find using it for Street Fighter almost unplayable as the L and ZL buttons are far too easy to accidently press when playing. Mario Kart initially felt like more of the same and it was only after I made an effort to explore the world map, unlock characters and karts, and try the new grinding/ollie mechanic that it clicked. I am now really enjoying it, especially the remixed soundtracks. I do however want more Switch 2 exclusive experiences – going back through my back catalogue for improved frame rates doesn’t cut it Nintendo! As someone with a large digital library the system transfer was very frustrating and the new virtual cartridges are just awful – does a Switch 2 need to be online all the time now? Not the best idea for a portable system. So, the start of a new console lifecycle and hopefully lots of new IP – I suspect Nintendo will try and get us to revisit our back catalogues first though.BristolPete Inbox also-rans Just thought I would mention that if anyone’s interested in purchasing the Mortal Kombat 1 Definitive Edition, which includes all DLC, that it’s currently an absolute steal on the Xbox store at £21.99.Nick The GreekI’ve just won my first Knockout Tour online race on Mario Kart World! I’ve got to say, the feeling is magnificent.Rable More Trending Email your comments to: gamecentral@metro.co.uk The small printNew Inbox updates appear every weekday morning, with special Hot Topic Inboxes at the weekend. Readers’ letters are used on merit and may be edited for length and content. You can also submit your own 500 to 600-word Reader’s Feature at any time via email or our Submit Stuff page, which if used will be shown in the next available weekend slot. You can also leave your comments below and don’t forget to follow us on Twitter. Arrow MORE: Games Inbox: Is Mario Kart World too hard? GameCentral Sign up for exclusive analysis, latest releases, and bonus community content. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Your information will be used in line with our Privacy Policy
    Like
    Love
    Wow
    Angry
    Sad
    506
    2 Comments 0 Shares
  • Over 8M patient records leaked in healthcare data breach

    Published
    June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
    In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    #over #patient #records #leaked #healthcare
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work  Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data     How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop  5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcare
    WWW.FOXNEWS.COM
    Over 8M patient records leaked in healthcare data breach
    Published June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work   (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data      (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop   (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    Like
    Love
    Wow
    Sad
    Angry
    507
    0 Comments 0 Shares
  • Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

    Jun 16, 2025Ravie LakshmananMalware / DevOps

    Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others.
    The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions."
    The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week.
    Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload.
    Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer.

    The stealer malware is equipped to siphon a wide range of data from infected machines. This includes -

    JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers
    Pod sandbox environment authentication tokens and git information
    CI/CD information from environment variables
    Zscaler host configuration
    Amazon Web Services account information and tokens
    Public IP address
    General platform, user, and host information

    The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems.
    The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis.
    "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said.

    "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity."
    The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below -

    eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry.
    SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown.
    "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said.
    Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed.
    "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work."
    Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server.
    This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB.
    "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL."

    Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user.
    The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT.
    "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent."
    Crypto Malware in the Open-Source Supply Chain
    The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem.

    Some of the examples of these packages include -

    express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys
    bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing.
    lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers

    "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said.
    "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets."
    AI and Slopsquatting
    The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks.
    Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences.

    Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting.
    "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said.
    "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases."

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

    SHARE




    #malicious #pypi #package #masquerades #chimera
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Indexrepository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development ofsolutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithmin order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compatts-runtime-compat-checksolders@mediawave/libAll the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former packageto retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server. This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domainand configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB. "is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account controlusing a combination of FodHelper.exe and programmatic identifiersto evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language modelscan hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE     #malicious #pypi #package #masquerades #chimera
    THEHACKERNEWS.COM
    Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data
    Jun 16, 2025Ravie LakshmananMalware / DevOps Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that's capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targets users of a service called Chimera Sandbox, which was released by Singaporean tech company Grab last August to facilitate "experimentation and development of [machine learning] solutions." The package masquerades as a helper module for Chimera Sandbox, but "aims to steal credentials and other sensitive information such as Jamf configuration, CI/CD environment variables, AWS tokens, and more," JFrog security researcher Guy Korolevski said in a report published last week. Once installed, it attempts to connect to an external domain whose domain name is generated using a domain generation algorithm (DGA) in order to download and execute a next-stage payload. Specifically, the malware acquires from the domain an authentication token, which is then used to send a request to the same domain and retrieve the Python-based information stealer. The stealer malware is equipped to siphon a wide range of data from infected machines. This includes - JAMF receipts, which are records of software packages installed by Jamf Pro on managed computers Pod sandbox environment authentication tokens and git information CI/CD information from environment variables Zscaler host configuration Amazon Web Services account information and tokens Public IP address General platform, user, and host information The kind of data gathered by the malware shows that it's mainly geared towards corporate and cloud infrastructure. In addition, the extraction of JAMF receipts indicates that it's also capable of targeting Apple macOS systems. The collected information is sent via a POST request back to the same domain, after which the server assesses if the machine is a worthy target for further exploitation. However, JFrog said it was unable to obtain the payload at the time of analysis. "The targeted approach employed by this malware, along with the complexity of its multi-stage targeted payload, distinguishes it from the more generic open-source malware threats we have encountered thus far, highlighting the advancements that malicious packages have made recently," Jonathan Sar Shalom, director of threat research at JFrog Security Research team, said. "This new sophistication of malware underscores why development teams remain vigilant with updates—alongside proactive security research – to defend against emerging threats and maintain software integrity." The disclosure comes as SafeDep and Veracode detailed a number of malware-laced npm packages that are designed to execute remote code and download additional payloads. The packages in question are listed below - eslint-config-airbnb-compat (676 Downloads) ts-runtime-compat-check (1,588 Downloads) solders (983 Downloads) @mediawave/lib (386 Downloads) All the identified npm packages have since been taken down from npm, but not before they were downloaded hundreds of times from the package registry. SafeDep's analysis of eslint-config-airbnb-compat found that the JavaScript library has ts-runtime-compat-check listed as a dependency, which, in turn, contacts an external server defined in the former package ("proxy.eslint-proxy[.]site") to retrieve and execute a Base64-encoded string. The exact nature of the payload is unknown. "It implements a multi-stage remote code execution attack using a transitive dependency to hide the malicious code," SafeDep researcher Kunal Singh said. Solders, on the other hand, has been found to incorporate a post-install script in its package.json, causing the malicious code to be automatically executed as soon as the package is installed. "At first glance, it's hard to believe that this is actually valid JavaScript," the Veracode Threat Research team said. "It looks like a seemingly random collection of Japanese symbols. It turns out that this particular obfuscation scheme uses the Unicode characters as variable names and a sophisticated chain of dynamic code generation to work." Decoding the script reveals an extra layer of obfuscation, unpacking which reveals its main function: Check if the compromised machine is Windows, and if so, run a PowerShell command to retrieve a next-stage payload from a remote server ("firewall[.]tel"). This second-stage PowerShell script, also obscured, is designed to fetch a Windows batch script from another domain ("cdn.audiowave[.]org") and configures a Windows Defender Antivirus exclusion list to avoid detection. The batch script then paves the way for the execution of a .NET DLL that reaches out to a PNG image hosted on ImgBB ("i.ibb[.]co"). "[The DLL] is grabbing the last two pixels from this image and then looping through some data contained elsewhere in it," Veracode said. "It ultimately builds up in memory YET ANOTHER .NET DLL." Furthermore, the DLL is equipped to create task scheduler entries and features the ability to bypass user account control (UAC) using a combination of FodHelper.exe and programmatic identifiers (ProgIDs) to evade defenses and avoid triggering any security alerts to the user. The newly-downloaded DLL is Pulsar RAT, a "free, open-source Remote Administration Tool for Windows" and a variant of the Quasar RAT. "From a wall of Japanese characters to a RAT hidden within the pixels of a PNG file, the attacker went to extraordinary lengths to conceal their payload, nesting it a dozen layers deep to evade detection," Veracode said. "While the attacker's ultimate objective for deploying the Pulsar RAT remains unclear, the sheer complexity of this delivery mechanism is a powerful indicator of malicious intent." Crypto Malware in the Open-Source Supply Chain The findings also coincide with a report from Socket that identified credential stealers, cryptocurrency drainers, cryptojackers, and clippers as the main types of threats targeting the cryptocurrency and blockchain development ecosystem. Some of the examples of these packages include - express-dompurify and pumptoolforvolumeandcomment, which are capable of harvesting browser credentials and cryptocurrency wallet keys bs58js, which drains a victim's wallet and uses multi-hop transfers to obscure theft and frustrate forensic tracing. lsjglsjdv, asyncaiosignal, and raydium-sdk-liquidity-init, which functions as a clipper to monitor the system clipboard for cryptocurrency wallet strings and replace them with threat actor‑controlled addresses to reroute transactions to the attackers "As Web3 development converges with mainstream software engineering, the attack surface for blockchain-focused projects is expanding in both scale and complexity," Socket security researcher Kirill Boychenko said. "Financially motivated threat actors and state-sponsored groups are rapidly evolving their tactics to exploit systemic weaknesses in the software supply chain. These campaigns are iterative, persistent, and increasingly tailored to high-value targets." AI and Slopsquatting The rise of artificial intelligence (AI)-assisted coding, also called vibe coding, has unleashed another novel threat in the form of slopsquatting, where large language models (LLMs) can hallucinate non-existent but plausible package names that bad actors can weaponize to conduct supply chain attacks. Trend Micro, in a report last week, said it observed an unnamed advanced agent "confidently" cooking up a phantom Python package named starlette-reverse-proxy, only for the build process to crash with the error "module not found." However, should an adversary upload a package with the same name on the repository, it can have serious security consequences. Furthermore, the cybersecurity company noted that advanced coding agents and workflows such as Claude Code CLI, OpenAI Codex CLI, and Cursor AI with Model Context Protocol (MCP)-backed validation can help reduce, but not completely eliminate, the risk of slopsquatting. "When agents hallucinate dependencies or install unverified packages, they create an opportunity for slopsquatting attacks, in which malicious actors pre-register those same hallucinated names on public registries," security researcher Sean Park said. "While reasoning-enhanced agents can reduce the rate of phantom suggestions by approximately half, they do not eliminate them entirely. Even the vibe-coding workflow augmented with live MCP validations achieves the lowest rates of slip-through, but still misses edge cases." Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post. SHARE    
    Like
    Love
    Wow
    Sad
    Angry
    514
    2 Comments 0 Shares
  • Archaeologists Stumble Onto Sprawling Ancient Roman Villa During Construction of a Road in France

    Cool Finds

    Archaeologists Stumble Onto Sprawling Ancient Roman Villa During Construction of a Road in France
    Located near Auxerre, the grand estate once possessed an exorbitant level of wealth, with thermal baths and heated floors

    Aerial view of the villa, with thermal baths at the bottom right, the garden and fountain in the center, and the agricultural fields expanding to the left
    Ch. Fouquin / INRAP

    In ancient times, all roads led to Rome—or so the saying goes. Nowadays, new roads can lead to Roman ruins.
    During construction on an alternative route to D606, a regional road just under two miles outside of Auxerre, in central France, salvage archaeologists unearthed a sprawling Roman villa complete with a stately garden, a fountain and an elaborate system of underfloor heating known as a hypocaust, according to a statement from the French National Institute for Preventive Archaeological Research.
    While researchers have been aware of the ruins on the outskirts of the Gallo-Roman settlement of Autissiodorumsince the 19th century, previous excavations have been limited. The most recent dig, in 1966, found a 7,500-square-foot building with ten rooms and amenities that suggested its residents enjoyed great wealth and regional power.

    The site of Sainte-Nitasse, adjacent to a regional highway

    Ch. Fouquin / INRAP

    But until now, the true scale of the villa known as Sainte-Nitasse and its surrounding agricultural estates along the River Yonne was unclear. Archaeologists at INRAP have since discovered a 43,000-square-foot building thought to date to between the first and third centuries C.E. It suggests a previously unimagined level of grandeur.
    INRAP identifies the site as one of the “grand villas of Roman Gaul,” according to the statement. Grand villas are typified by their vast dimensions and sophisticated architectural style. They typically encompass both agricultural and residential portions, known in Latin as pars rustica and pars urbana, respectively. In the pars urbana, grand villas tend to feature stately construction materials like marble; extensive mosaics and frescoes; and amenities like private baths, fountains and gardens.
    So far, the excavations at Sainte-Nitasse have revealed all these features and more.
    The villa’s development is extensive. A 4,800-square-foot garden is enclosed by a fountain to the south and a water basin, or an ornamental pond, to the north. The hypocaust, an ancient system of central heating that circulated hot air beneath the floors of the house, signals a level of luxury atypical for rural estates in Roman Gaul.

    A section of the villa's hypocaust heating system, which circulated hot air beneath the floor

    Ch. Fouquin / INRAP

    “We can imagine it as an ‘aristocratic’ villa, belonging to someone with riches, responsibilities—perhaps municipal, given the proximity to Auxerre—a landowner who had staff on site,” Alexandre Burgevin, the archaeologist in charge of the excavations with INRAP, tells France Info’s Lisa Guyenne.
    Near the banks of the Yonne, a thermal bath site contains several pools where the landowner and his family bathed. On the other side of the garden, workers toiled in the fields of a massive agricultural estate.
    Aside from its size and amenities, the villa’s level of preservation also astounded archaeologists. “For a rural site, it’s quite exceptional,” Burgevin tells L’Yonne Républicaine’s Titouan Stücker. “You can walk on floors from the time period, circulate between rooms like the Gallo-Romans did.”Over time, Autissiodorum grew to become a major city along the Via Agrippa, eventually earning the honor of serving as a provincial Roman capital by the fourth century C.E. As Gaul began slipping away from the Roman Empire around the same time, the prominence of the city fluctuated. INRAP archaeologists speculate that the site was repurposed during medieval times, around the 13th century.
    Burgevin offers several explanations for why the site remained so well preserved in subsequent centuries. The humid conditions along the banks of the river might have prevented excess decay. Since this portion of the River Yonne wasn’t canalized until the 19th century, engineers may have already been aware of the presence of ruins. Or, perhaps the rubble of the villa created “bumpy,” intractable soil that was “not easy to pass over with a tractor,” he tells France Info.
    While the site will briefly open to the public on June 15 for European Archaeology Days, an annual event held at sites across the continent, excavations will continue until September, at which time construction on the road will resume. Much work is to be done, including filling in large gaps of the site’s chronology between the Roman and medieval eras.
    “We have well-built walls but few objects,” says Burgevin, per L’Yonne Républicaine. “It will be necessary to continue digging to understand better.”

    Get the latest stories in your inbox every weekday.
    #archaeologists #stumble #onto #sprawling #ancient
    Archaeologists Stumble Onto Sprawling Ancient Roman Villa During Construction of a Road in France
    Cool Finds Archaeologists Stumble Onto Sprawling Ancient Roman Villa During Construction of a Road in France Located near Auxerre, the grand estate once possessed an exorbitant level of wealth, with thermal baths and heated floors Aerial view of the villa, with thermal baths at the bottom right, the garden and fountain in the center, and the agricultural fields expanding to the left Ch. Fouquin / INRAP In ancient times, all roads led to Rome—or so the saying goes. Nowadays, new roads can lead to Roman ruins. During construction on an alternative route to D606, a regional road just under two miles outside of Auxerre, in central France, salvage archaeologists unearthed a sprawling Roman villa complete with a stately garden, a fountain and an elaborate system of underfloor heating known as a hypocaust, according to a statement from the French National Institute for Preventive Archaeological Research. While researchers have been aware of the ruins on the outskirts of the Gallo-Roman settlement of Autissiodorumsince the 19th century, previous excavations have been limited. The most recent dig, in 1966, found a 7,500-square-foot building with ten rooms and amenities that suggested its residents enjoyed great wealth and regional power. The site of Sainte-Nitasse, adjacent to a regional highway Ch. Fouquin / INRAP But until now, the true scale of the villa known as Sainte-Nitasse and its surrounding agricultural estates along the River Yonne was unclear. Archaeologists at INRAP have since discovered a 43,000-square-foot building thought to date to between the first and third centuries C.E. It suggests a previously unimagined level of grandeur. INRAP identifies the site as one of the “grand villas of Roman Gaul,” according to the statement. Grand villas are typified by their vast dimensions and sophisticated architectural style. They typically encompass both agricultural and residential portions, known in Latin as pars rustica and pars urbana, respectively. In the pars urbana, grand villas tend to feature stately construction materials like marble; extensive mosaics and frescoes; and amenities like private baths, fountains and gardens. So far, the excavations at Sainte-Nitasse have revealed all these features and more. The villa’s development is extensive. A 4,800-square-foot garden is enclosed by a fountain to the south and a water basin, or an ornamental pond, to the north. The hypocaust, an ancient system of central heating that circulated hot air beneath the floors of the house, signals a level of luxury atypical for rural estates in Roman Gaul. A section of the villa's hypocaust heating system, which circulated hot air beneath the floor Ch. Fouquin / INRAP “We can imagine it as an ‘aristocratic’ villa, belonging to someone with riches, responsibilities—perhaps municipal, given the proximity to Auxerre—a landowner who had staff on site,” Alexandre Burgevin, the archaeologist in charge of the excavations with INRAP, tells France Info’s Lisa Guyenne. Near the banks of the Yonne, a thermal bath site contains several pools where the landowner and his family bathed. On the other side of the garden, workers toiled in the fields of a massive agricultural estate. Aside from its size and amenities, the villa’s level of preservation also astounded archaeologists. “For a rural site, it’s quite exceptional,” Burgevin tells L’Yonne Républicaine’s Titouan Stücker. “You can walk on floors from the time period, circulate between rooms like the Gallo-Romans did.”Over time, Autissiodorum grew to become a major city along the Via Agrippa, eventually earning the honor of serving as a provincial Roman capital by the fourth century C.E. As Gaul began slipping away from the Roman Empire around the same time, the prominence of the city fluctuated. INRAP archaeologists speculate that the site was repurposed during medieval times, around the 13th century. Burgevin offers several explanations for why the site remained so well preserved in subsequent centuries. The humid conditions along the banks of the river might have prevented excess decay. Since this portion of the River Yonne wasn’t canalized until the 19th century, engineers may have already been aware of the presence of ruins. Or, perhaps the rubble of the villa created “bumpy,” intractable soil that was “not easy to pass over with a tractor,” he tells France Info. While the site will briefly open to the public on June 15 for European Archaeology Days, an annual event held at sites across the continent, excavations will continue until September, at which time construction on the road will resume. Much work is to be done, including filling in large gaps of the site’s chronology between the Roman and medieval eras. “We have well-built walls but few objects,” says Burgevin, per L’Yonne Républicaine. “It will be necessary to continue digging to understand better.” Get the latest stories in your inbox every weekday. #archaeologists #stumble #onto #sprawling #ancient
    WWW.SMITHSONIANMAG.COM
    Archaeologists Stumble Onto Sprawling Ancient Roman Villa During Construction of a Road in France
    Cool Finds Archaeologists Stumble Onto Sprawling Ancient Roman Villa During Construction of a Road in France Located near Auxerre, the grand estate once possessed an exorbitant level of wealth, with thermal baths and heated floors Aerial view of the villa, with thermal baths at the bottom right, the garden and fountain in the center, and the agricultural fields expanding to the left Ch. Fouquin / INRAP In ancient times, all roads led to Rome—or so the saying goes. Nowadays, new roads can lead to Roman ruins. During construction on an alternative route to D606, a regional road just under two miles outside of Auxerre, in central France, salvage archaeologists unearthed a sprawling Roman villa complete with a stately garden, a fountain and an elaborate system of underfloor heating known as a hypocaust, according to a statement from the French National Institute for Preventive Archaeological Research (INRAP). While researchers have been aware of the ruins on the outskirts of the Gallo-Roman settlement of Autissiodorum (as Auxerre was once known) since the 19th century, previous excavations have been limited. The most recent dig, in 1966, found a 7,500-square-foot building with ten rooms and amenities that suggested its residents enjoyed great wealth and regional power. The site of Sainte-Nitasse, adjacent to a regional highway Ch. Fouquin / INRAP But until now, the true scale of the villa known as Sainte-Nitasse and its surrounding agricultural estates along the River Yonne was unclear. Archaeologists at INRAP have since discovered a 43,000-square-foot building thought to date to between the first and third centuries C.E. It suggests a previously unimagined level of grandeur. INRAP identifies the site as one of the “grand villas of Roman Gaul,” according to the statement. Grand villas are typified by their vast dimensions and sophisticated architectural style. They typically encompass both agricultural and residential portions, known in Latin as pars rustica and pars urbana, respectively. In the pars urbana, grand villas tend to feature stately construction materials like marble; extensive mosaics and frescoes; and amenities like private baths, fountains and gardens. So far, the excavations at Sainte-Nitasse have revealed all these features and more. The villa’s development is extensive. A 4,800-square-foot garden is enclosed by a fountain to the south and a water basin, or an ornamental pond, to the north. The hypocaust, an ancient system of central heating that circulated hot air beneath the floors of the house, signals a level of luxury atypical for rural estates in Roman Gaul. A section of the villa's hypocaust heating system, which circulated hot air beneath the floor Ch. Fouquin / INRAP “We can imagine it as an ‘aristocratic’ villa, belonging to someone with riches, responsibilities—perhaps municipal, given the proximity to Auxerre—a landowner who had staff on site,” Alexandre Burgevin, the archaeologist in charge of the excavations with INRAP, tells France Info’s Lisa Guyenne. Near the banks of the Yonne, a thermal bath site contains several pools where the landowner and his family bathed. On the other side of the garden, workers toiled in the fields of a massive agricultural estate. Aside from its size and amenities, the villa’s level of preservation also astounded archaeologists. “For a rural site, it’s quite exceptional,” Burgevin tells L’Yonne Républicaine’s Titouan Stücker. “You can walk on floors from the time period, circulate between rooms like the Gallo-Romans did.”Over time, Autissiodorum grew to become a major city along the Via Agrippa, eventually earning the honor of serving as a provincial Roman capital by the fourth century C.E. As Gaul began slipping away from the Roman Empire around the same time, the prominence of the city fluctuated. INRAP archaeologists speculate that the site was repurposed during medieval times, around the 13th century. Burgevin offers several explanations for why the site remained so well preserved in subsequent centuries. The humid conditions along the banks of the river might have prevented excess decay. Since this portion of the River Yonne wasn’t canalized until the 19th century, engineers may have already been aware of the presence of ruins. Or, perhaps the rubble of the villa created “bumpy,” intractable soil that was “not easy to pass over with a tractor,” he tells France Info. While the site will briefly open to the public on June 15 for European Archaeology Days, an annual event held at sites across the continent, excavations will continue until September, at which time construction on the road will resume. Much work is to be done, including filling in large gaps of the site’s chronology between the Roman and medieval eras. “We have well-built walls but few objects,” says Burgevin, per L’Yonne Républicaine. “It will be necessary to continue digging to understand better.” Get the latest stories in your inbox every weekday.
    Like
    Love
    Wow
    Sad
    Angry
    509
    2 Comments 0 Shares
  • Tech billionaires are making a risky bet with humanity’s future

    “The best way to predict the future is to invent it,” the famed computer scientist Alan Kay once said. Uttered more out of exasperation than as inspiration, his remark has nevertheless attained gospel-like status among Silicon Valley entrepreneurs, in particular a handful of tech billionaires who fancy themselves the chief architects of humanity’s future. 

    Sam Altman, Jeff Bezos, Elon Musk, and others may have slightly different goals and ambitions in the near term, but their grand visions for the next decade and beyond are remarkably similar. Framed less as technological objectives and more as existential imperatives, they include aligning AI with the interests of humanity; creating an artificial superintelligence that will solve all the world’s most pressing problems; merging with that superintelligence to achieve immortality; establishing a permanent, self-­sustaining colony on Mars; and, ultimately, spreading out across the cosmos.

    While there’s a sprawling patchwork of ideas and philosophies powering these visions, three features play a central role, says Adam Becker, a science writer and astrophysicist: an unshakable certainty that technology can solve any problem, a belief in the necessity of perpetual growth, and a quasi-religious obsession with transcending our physical and biological limits. In his timely new book, More Everything Forever: AI Overlords, Space Empires, and Silicon Valley’s Crusade to Control the Fate of Humanity, Becker calls this triumvirate of beliefs the “ideology of technological salvation” and warns that tech titans are using it to steer humanity in a dangerous direction. 

    “In most of these isms you’ll find the idea of escape and transcendence, as well as the promise of an amazing future, full of unimaginable wonders—so long as we don’t get in the way of technological progress.”

    “The credence that tech billionaires give to these specific science-fictional futures validates their pursuit of more—to portray the growth of their businesses as a moral imperative, to reduce the complex problems of the world to simple questions of technology,to justify nearly any action they might want to take,” he writes. Becker argues that the only way to break free of these visions is to see them for what they are: a convenient excuse to continue destroying the environment, skirt regulations, amass more power and control, and dismiss the very real problems of today to focus on the imagined ones of tomorrow. 

    A lot of critics, academics, and journalists have tried to define or distill the Silicon Valley ethos over the years. There was the “Californian Ideology” in the mid-’90s, the “Move fast and break things” era of the early 2000s, and more recently the “Libertarianism for me, feudalism for thee”  or “techno-­authoritarian” views. How do you see the “ideology of technological salvation” fitting in? 

    I’d say it’s very much of a piece with those earlier attempts to describe the Silicon Valley mindset. I mean, you can draw a pretty straight line from Max More’s principles of transhumanism in the ’90s to the Californian Ideologyand through to what I call the ideology of technological salvation. The fact is, many of the ideas that define or animate Silicon Valley thinking have never been much of a ­mystery—libertarianism, an antipathy toward the government and regulation, the boundless faith in technology, the obsession with optimization. 

    What can be difficult is to parse where all these ideas come from and how they fit together—or if they fit together at all. I came up with the ideology of technological salvation as a way to name and give shape to a group of interrelated concepts and philosophies that can seem sprawling and ill-defined at first, but that actually sit at the center of a worldview shared by venture capitalists, executives, and other thought leaders in the tech industry. 

    Readers will likely be familiar with the tech billionaires featured in your book and at least some of their ambitions. I’m guessing they’ll be less familiar with the various “isms” that you argue have influenced or guided their thinking. Effective altruism, rationalism, long­termism, extropianism, effective accelerationism, futurism, singularitarianism, ­transhumanism—there are a lot of them. Is there something that they all share? 

    They’re definitely connected. In a sense, you could say they’re all versions or instantiations of the ideology of technological salvation, but there are also some very deep historical connections between the people in these groups and their aims and beliefs. The Extropians in the late ’80s believed in self-­transformation through technology and freedom from limitations of any kind—ideas that Ray Kurzweil eventually helped popularize and legitimize for a larger audience with the Singularity. 

    In most of these isms you’ll find the idea of escape and transcendence, as well as the promise of an amazing future, full of unimaginable wonders—so long as we don’t get in the way of technological progress. I should say that AI researcher Timnit Gebru and philosopher Émile Torres have also done a lot of great work linking these ideologies to one another and showing how they all have ties to racism, misogyny, and eugenics.

    You argue that the Singularity is the purest expression of the ideology of technological salvation. How so?

    Well, for one thing, it’s just this very simple, straightforward idea—the Singularity is coming and will occur when we merge our brains with the cloud and expand our intelligence a millionfold. This will then deepen our awareness and consciousness and everything will be amazing. In many ways, it’s a fantastical vision of a perfect technological utopia. We’re all going to live as long as we want in an eternal paradise, watched over by machines of loving grace, and everything will just get exponentially better forever. The end.

    The other isms I talk about in the book have a little more … heft isn’t the right word—they just have more stuff going on. There’s more to them, right? The rationalists and the effective altruists and the longtermists—they think that something like a singularity will happen, or could happen, but that there’s this really big danger between where we are now and that potential event. We have to address the fact that an all-powerful AI might destroy humanity—the so-called alignment problem—before any singularity can happen. 

    Then you’ve got the effective accelerationists, who are more like Kurzweil, but they’ve got more of a tech-bro spin on things. They’ve taken some of the older transhumanist ideas from the Singularity and updated them for startup culture. Marc Andreessen’s “Techno-Optimist Manifesto”is a good example. You could argue that all of these other philosophies that have gained purchase in Silicon Valley are just twists on Kurzweil’s Singularity, each one building on top of the core ideas of transcendence, techno­-optimism, and exponential growth. 

    Early on in the book you take aim at that idea of exponential growth—specifically, Kurzweil’s “Law of Accelerating Returns.” Could you explain what that is and why you think it’s flawed?

    Kurzweil thinks there’s this immutable “Law of Accelerating Returns” at work in the affairs of the universe, especially when it comes to technology. It’s the idea that technological progress isn’t linear but exponential. Advancements in one technology fuel even more rapid advancements in the future, which in turn lead to greater complexity and greater technological power, and on and on. This is just a mistake. Kurzweil uses the Law of Accelerating Returns to explain why the Singularity is inevitable, but to be clear, he’s far from the only one who believes in this so-called law.

    “I really believe that when you get as rich as some of these guys are, you can just do things that seem like thinking and no one is really going to correct you or tell you things you don’t want to hear.”

    My sense is that it’s an idea that comes from staring at Moore’s Law for too long. Moore’s Law is of course the famous prediction that the number of transistors on a chip will double roughly every two years, with a minimal increase in cost. Now, that has in fact happened for the last 50 years or so, but not because of some fundamental law in the universe. It’s because the tech industry made a choice and some very sizable investments to make it happen. Moore’s Law was ultimately this really interesting observation or projection of a historical trend, but even Gordon Mooreknew that it wouldn’t and couldn’t last forever. In fact, some think it’s already over. 

    These ideologies take inspiration from some pretty unsavory characters. Transhumanism, you say, was first popularized by the eugenicist Julian Huxley in a speech in 1951. Marc Andreessen’s “Techno-Optimist Manifesto” name-checks the noted fascist Filippo Tommaso Marinetti and his futurist manifesto. Did you get the sense while researching the book that the tech titans who champion these ideas understand their dangerous origins?

    You’re assuming in the framing of that question that there’s any rigorous thought going on here at all. As I say in the book, Andreessen’s manifesto runs almost entirely on vibes, not logic. I think someone may have told him about the futurist manifesto at some point, and he just sort of liked the general vibe, which is why he paraphrases a part of it. Maybe he learned something about Marinetti and forgot it. Maybe he didn’t care. 

    I really believe that when you get as rich as some of these guys are, you can just do things that seem like thinking and no one is really going to correct you or tell you things you don’t want to hear. For many of these billionaires, the vibes of fascism, authoritarianism, and colonialism are attractive because they’re fundamentally about creating a fantasy of control. 

    You argue that these visions of the future are being used to hasten environmental destruction, increase authoritarianism, and exacerbate inequalities. You also admit that they appeal to lots of people who aren’t billionaires. Why do you think that is? 

    I think a lot of us are also attracted to these ideas for the same reasons the tech billionaires are—they offer this fantasy of knowing what the future holds, of transcending death, and a sense that someone or something out there is in control. It’s hard to overstate how comforting a simple, coherent narrative can be in an increasingly complex and fast-moving world. This is of course what religion offers for many of us, and I don’t think it’s an accident that a sizable number of people in the rationalist and effective altruist communities are actually ex-evangelicals.

    More than any one specific technology, it seems like the most consequential thing these billionaires have invented is a sense of inevitability—that their visions for the future are somehow predestined. How does one fight against that?

    It’s a difficult question. For me, the answer was to write this book. I guess I’d also say this: Silicon Valley enjoyed well over a decade with little to no pushback on anything. That’s definitely a big part of how we ended up in this mess. There was no regulation, very little critical coverage in the press, and a lot of self-mythologizing going on. Things have started to change, especially as the social and environmental damage that tech companies and industry leaders have helped facilitate has become more clear. That understanding is an essential part of deflating the power of these tech billionaires and breaking free of their visions. When we understand that these dreams of the future are actually nightmares for the rest of us, I think you’ll see that senseof inevitability vanish pretty fast. 

    This interview was edited for length and clarity.

    Bryan Gardiner is a writer based in Oakland, California. 
    #tech #billionaires #are #making #risky
    Tech billionaires are making a risky bet with humanity’s future
    “The best way to predict the future is to invent it,” the famed computer scientist Alan Kay once said. Uttered more out of exasperation than as inspiration, his remark has nevertheless attained gospel-like status among Silicon Valley entrepreneurs, in particular a handful of tech billionaires who fancy themselves the chief architects of humanity’s future.  Sam Altman, Jeff Bezos, Elon Musk, and others may have slightly different goals and ambitions in the near term, but their grand visions for the next decade and beyond are remarkably similar. Framed less as technological objectives and more as existential imperatives, they include aligning AI with the interests of humanity; creating an artificial superintelligence that will solve all the world’s most pressing problems; merging with that superintelligence to achieve immortality; establishing a permanent, self-­sustaining colony on Mars; and, ultimately, spreading out across the cosmos. While there’s a sprawling patchwork of ideas and philosophies powering these visions, three features play a central role, says Adam Becker, a science writer and astrophysicist: an unshakable certainty that technology can solve any problem, a belief in the necessity of perpetual growth, and a quasi-religious obsession with transcending our physical and biological limits. In his timely new book, More Everything Forever: AI Overlords, Space Empires, and Silicon Valley’s Crusade to Control the Fate of Humanity, Becker calls this triumvirate of beliefs the “ideology of technological salvation” and warns that tech titans are using it to steer humanity in a dangerous direction.  “In most of these isms you’ll find the idea of escape and transcendence, as well as the promise of an amazing future, full of unimaginable wonders—so long as we don’t get in the way of technological progress.” “The credence that tech billionaires give to these specific science-fictional futures validates their pursuit of more—to portray the growth of their businesses as a moral imperative, to reduce the complex problems of the world to simple questions of technology,to justify nearly any action they might want to take,” he writes. Becker argues that the only way to break free of these visions is to see them for what they are: a convenient excuse to continue destroying the environment, skirt regulations, amass more power and control, and dismiss the very real problems of today to focus on the imagined ones of tomorrow.  A lot of critics, academics, and journalists have tried to define or distill the Silicon Valley ethos over the years. There was the “Californian Ideology” in the mid-’90s, the “Move fast and break things” era of the early 2000s, and more recently the “Libertarianism for me, feudalism for thee”  or “techno-­authoritarian” views. How do you see the “ideology of technological salvation” fitting in?  I’d say it’s very much of a piece with those earlier attempts to describe the Silicon Valley mindset. I mean, you can draw a pretty straight line from Max More’s principles of transhumanism in the ’90s to the Californian Ideologyand through to what I call the ideology of technological salvation. The fact is, many of the ideas that define or animate Silicon Valley thinking have never been much of a ­mystery—libertarianism, an antipathy toward the government and regulation, the boundless faith in technology, the obsession with optimization.  What can be difficult is to parse where all these ideas come from and how they fit together—or if they fit together at all. I came up with the ideology of technological salvation as a way to name and give shape to a group of interrelated concepts and philosophies that can seem sprawling and ill-defined at first, but that actually sit at the center of a worldview shared by venture capitalists, executives, and other thought leaders in the tech industry.  Readers will likely be familiar with the tech billionaires featured in your book and at least some of their ambitions. I’m guessing they’ll be less familiar with the various “isms” that you argue have influenced or guided their thinking. Effective altruism, rationalism, long­termism, extropianism, effective accelerationism, futurism, singularitarianism, ­transhumanism—there are a lot of them. Is there something that they all share?  They’re definitely connected. In a sense, you could say they’re all versions or instantiations of the ideology of technological salvation, but there are also some very deep historical connections between the people in these groups and their aims and beliefs. The Extropians in the late ’80s believed in self-­transformation through technology and freedom from limitations of any kind—ideas that Ray Kurzweil eventually helped popularize and legitimize for a larger audience with the Singularity.  In most of these isms you’ll find the idea of escape and transcendence, as well as the promise of an amazing future, full of unimaginable wonders—so long as we don’t get in the way of technological progress. I should say that AI researcher Timnit Gebru and philosopher Émile Torres have also done a lot of great work linking these ideologies to one another and showing how they all have ties to racism, misogyny, and eugenics. You argue that the Singularity is the purest expression of the ideology of technological salvation. How so? Well, for one thing, it’s just this very simple, straightforward idea—the Singularity is coming and will occur when we merge our brains with the cloud and expand our intelligence a millionfold. This will then deepen our awareness and consciousness and everything will be amazing. In many ways, it’s a fantastical vision of a perfect technological utopia. We’re all going to live as long as we want in an eternal paradise, watched over by machines of loving grace, and everything will just get exponentially better forever. The end. The other isms I talk about in the book have a little more … heft isn’t the right word—they just have more stuff going on. There’s more to them, right? The rationalists and the effective altruists and the longtermists—they think that something like a singularity will happen, or could happen, but that there’s this really big danger between where we are now and that potential event. We have to address the fact that an all-powerful AI might destroy humanity—the so-called alignment problem—before any singularity can happen.  Then you’ve got the effective accelerationists, who are more like Kurzweil, but they’ve got more of a tech-bro spin on things. They’ve taken some of the older transhumanist ideas from the Singularity and updated them for startup culture. Marc Andreessen’s “Techno-Optimist Manifesto”is a good example. You could argue that all of these other philosophies that have gained purchase in Silicon Valley are just twists on Kurzweil’s Singularity, each one building on top of the core ideas of transcendence, techno­-optimism, and exponential growth.  Early on in the book you take aim at that idea of exponential growth—specifically, Kurzweil’s “Law of Accelerating Returns.” Could you explain what that is and why you think it’s flawed? Kurzweil thinks there’s this immutable “Law of Accelerating Returns” at work in the affairs of the universe, especially when it comes to technology. It’s the idea that technological progress isn’t linear but exponential. Advancements in one technology fuel even more rapid advancements in the future, which in turn lead to greater complexity and greater technological power, and on and on. This is just a mistake. Kurzweil uses the Law of Accelerating Returns to explain why the Singularity is inevitable, but to be clear, he’s far from the only one who believes in this so-called law. “I really believe that when you get as rich as some of these guys are, you can just do things that seem like thinking and no one is really going to correct you or tell you things you don’t want to hear.” My sense is that it’s an idea that comes from staring at Moore’s Law for too long. Moore’s Law is of course the famous prediction that the number of transistors on a chip will double roughly every two years, with a minimal increase in cost. Now, that has in fact happened for the last 50 years or so, but not because of some fundamental law in the universe. It’s because the tech industry made a choice and some very sizable investments to make it happen. Moore’s Law was ultimately this really interesting observation or projection of a historical trend, but even Gordon Mooreknew that it wouldn’t and couldn’t last forever. In fact, some think it’s already over.  These ideologies take inspiration from some pretty unsavory characters. Transhumanism, you say, was first popularized by the eugenicist Julian Huxley in a speech in 1951. Marc Andreessen’s “Techno-Optimist Manifesto” name-checks the noted fascist Filippo Tommaso Marinetti and his futurist manifesto. Did you get the sense while researching the book that the tech titans who champion these ideas understand their dangerous origins? You’re assuming in the framing of that question that there’s any rigorous thought going on here at all. As I say in the book, Andreessen’s manifesto runs almost entirely on vibes, not logic. I think someone may have told him about the futurist manifesto at some point, and he just sort of liked the general vibe, which is why he paraphrases a part of it. Maybe he learned something about Marinetti and forgot it. Maybe he didn’t care.  I really believe that when you get as rich as some of these guys are, you can just do things that seem like thinking and no one is really going to correct you or tell you things you don’t want to hear. For many of these billionaires, the vibes of fascism, authoritarianism, and colonialism are attractive because they’re fundamentally about creating a fantasy of control.  You argue that these visions of the future are being used to hasten environmental destruction, increase authoritarianism, and exacerbate inequalities. You also admit that they appeal to lots of people who aren’t billionaires. Why do you think that is?  I think a lot of us are also attracted to these ideas for the same reasons the tech billionaires are—they offer this fantasy of knowing what the future holds, of transcending death, and a sense that someone or something out there is in control. It’s hard to overstate how comforting a simple, coherent narrative can be in an increasingly complex and fast-moving world. This is of course what religion offers for many of us, and I don’t think it’s an accident that a sizable number of people in the rationalist and effective altruist communities are actually ex-evangelicals. More than any one specific technology, it seems like the most consequential thing these billionaires have invented is a sense of inevitability—that their visions for the future are somehow predestined. How does one fight against that? It’s a difficult question. For me, the answer was to write this book. I guess I’d also say this: Silicon Valley enjoyed well over a decade with little to no pushback on anything. That’s definitely a big part of how we ended up in this mess. There was no regulation, very little critical coverage in the press, and a lot of self-mythologizing going on. Things have started to change, especially as the social and environmental damage that tech companies and industry leaders have helped facilitate has become more clear. That understanding is an essential part of deflating the power of these tech billionaires and breaking free of their visions. When we understand that these dreams of the future are actually nightmares for the rest of us, I think you’ll see that senseof inevitability vanish pretty fast.  This interview was edited for length and clarity. Bryan Gardiner is a writer based in Oakland, California.  #tech #billionaires #are #making #risky
    WWW.TECHNOLOGYREVIEW.COM
    Tech billionaires are making a risky bet with humanity’s future
    “The best way to predict the future is to invent it,” the famed computer scientist Alan Kay once said. Uttered more out of exasperation than as inspiration, his remark has nevertheless attained gospel-like status among Silicon Valley entrepreneurs, in particular a handful of tech billionaires who fancy themselves the chief architects of humanity’s future.  Sam Altman, Jeff Bezos, Elon Musk, and others may have slightly different goals and ambitions in the near term, but their grand visions for the next decade and beyond are remarkably similar. Framed less as technological objectives and more as existential imperatives, they include aligning AI with the interests of humanity; creating an artificial superintelligence that will solve all the world’s most pressing problems; merging with that superintelligence to achieve immortality (or something close to it); establishing a permanent, self-­sustaining colony on Mars; and, ultimately, spreading out across the cosmos. While there’s a sprawling patchwork of ideas and philosophies powering these visions, three features play a central role, says Adam Becker, a science writer and astrophysicist: an unshakable certainty that technology can solve any problem, a belief in the necessity of perpetual growth, and a quasi-religious obsession with transcending our physical and biological limits. In his timely new book, More Everything Forever: AI Overlords, Space Empires, and Silicon Valley’s Crusade to Control the Fate of Humanity, Becker calls this triumvirate of beliefs the “ideology of technological salvation” and warns that tech titans are using it to steer humanity in a dangerous direction.  “In most of these isms you’ll find the idea of escape and transcendence, as well as the promise of an amazing future, full of unimaginable wonders—so long as we don’t get in the way of technological progress.” “The credence that tech billionaires give to these specific science-fictional futures validates their pursuit of more—to portray the growth of their businesses as a moral imperative, to reduce the complex problems of the world to simple questions of technology, [and] to justify nearly any action they might want to take,” he writes. Becker argues that the only way to break free of these visions is to see them for what they are: a convenient excuse to continue destroying the environment, skirt regulations, amass more power and control, and dismiss the very real problems of today to focus on the imagined ones of tomorrow.  A lot of critics, academics, and journalists have tried to define or distill the Silicon Valley ethos over the years. There was the “Californian Ideology” in the mid-’90s, the “Move fast and break things” era of the early 2000s, and more recently the “Libertarianism for me, feudalism for thee”  or “techno-­authoritarian” views. How do you see the “ideology of technological salvation” fitting in?  I’d say it’s very much of a piece with those earlier attempts to describe the Silicon Valley mindset. I mean, you can draw a pretty straight line from Max More’s principles of transhumanism in the ’90s to the Californian Ideology [a mashup of countercultural, libertarian, and neoliberal values] and through to what I call the ideology of technological salvation. The fact is, many of the ideas that define or animate Silicon Valley thinking have never been much of a ­mystery—libertarianism, an antipathy toward the government and regulation, the boundless faith in technology, the obsession with optimization.  What can be difficult is to parse where all these ideas come from and how they fit together—or if they fit together at all. I came up with the ideology of technological salvation as a way to name and give shape to a group of interrelated concepts and philosophies that can seem sprawling and ill-defined at first, but that actually sit at the center of a worldview shared by venture capitalists, executives, and other thought leaders in the tech industry.  Readers will likely be familiar with the tech billionaires featured in your book and at least some of their ambitions. I’m guessing they’ll be less familiar with the various “isms” that you argue have influenced or guided their thinking. Effective altruism, rationalism, long­termism, extropianism, effective accelerationism, futurism, singularitarianism, ­transhumanism—there are a lot of them. Is there something that they all share?  They’re definitely connected. In a sense, you could say they’re all versions or instantiations of the ideology of technological salvation, but there are also some very deep historical connections between the people in these groups and their aims and beliefs. The Extropians in the late ’80s believed in self-­transformation through technology and freedom from limitations of any kind—ideas that Ray Kurzweil eventually helped popularize and legitimize for a larger audience with the Singularity.  In most of these isms you’ll find the idea of escape and transcendence, as well as the promise of an amazing future, full of unimaginable wonders—so long as we don’t get in the way of technological progress. I should say that AI researcher Timnit Gebru and philosopher Émile Torres have also done a lot of great work linking these ideologies to one another and showing how they all have ties to racism, misogyny, and eugenics. You argue that the Singularity is the purest expression of the ideology of technological salvation. How so? Well, for one thing, it’s just this very simple, straightforward idea—the Singularity is coming and will occur when we merge our brains with the cloud and expand our intelligence a millionfold. This will then deepen our awareness and consciousness and everything will be amazing. In many ways, it’s a fantastical vision of a perfect technological utopia. We’re all going to live as long as we want in an eternal paradise, watched over by machines of loving grace, and everything will just get exponentially better forever. The end. The other isms I talk about in the book have a little more … heft isn’t the right word—they just have more stuff going on. There’s more to them, right? The rationalists and the effective altruists and the longtermists—they think that something like a singularity will happen, or could happen, but that there’s this really big danger between where we are now and that potential event. We have to address the fact that an all-powerful AI might destroy humanity—the so-called alignment problem—before any singularity can happen.  Then you’ve got the effective accelerationists, who are more like Kurzweil, but they’ve got more of a tech-bro spin on things. They’ve taken some of the older transhumanist ideas from the Singularity and updated them for startup culture. Marc Andreessen’s “Techno-Optimist Manifesto” [from 2023] is a good example. You could argue that all of these other philosophies that have gained purchase in Silicon Valley are just twists on Kurzweil’s Singularity, each one building on top of the core ideas of transcendence, techno­-optimism, and exponential growth.  Early on in the book you take aim at that idea of exponential growth—specifically, Kurzweil’s “Law of Accelerating Returns.” Could you explain what that is and why you think it’s flawed? Kurzweil thinks there’s this immutable “Law of Accelerating Returns” at work in the affairs of the universe, especially when it comes to technology. It’s the idea that technological progress isn’t linear but exponential. Advancements in one technology fuel even more rapid advancements in the future, which in turn lead to greater complexity and greater technological power, and on and on. This is just a mistake. Kurzweil uses the Law of Accelerating Returns to explain why the Singularity is inevitable, but to be clear, he’s far from the only one who believes in this so-called law. “I really believe that when you get as rich as some of these guys are, you can just do things that seem like thinking and no one is really going to correct you or tell you things you don’t want to hear.” My sense is that it’s an idea that comes from staring at Moore’s Law for too long. Moore’s Law is of course the famous prediction that the number of transistors on a chip will double roughly every two years, with a minimal increase in cost. Now, that has in fact happened for the last 50 years or so, but not because of some fundamental law in the universe. It’s because the tech industry made a choice and some very sizable investments to make it happen. Moore’s Law was ultimately this really interesting observation or projection of a historical trend, but even Gordon Moore [who first articulated it] knew that it wouldn’t and couldn’t last forever. In fact, some think it’s already over.  These ideologies take inspiration from some pretty unsavory characters. Transhumanism, you say, was first popularized by the eugenicist Julian Huxley in a speech in 1951. Marc Andreessen’s “Techno-Optimist Manifesto” name-checks the noted fascist Filippo Tommaso Marinetti and his futurist manifesto. Did you get the sense while researching the book that the tech titans who champion these ideas understand their dangerous origins? You’re assuming in the framing of that question that there’s any rigorous thought going on here at all. As I say in the book, Andreessen’s manifesto runs almost entirely on vibes, not logic. I think someone may have told him about the futurist manifesto at some point, and he just sort of liked the general vibe, which is why he paraphrases a part of it. Maybe he learned something about Marinetti and forgot it. Maybe he didn’t care.  I really believe that when you get as rich as some of these guys are, you can just do things that seem like thinking and no one is really going to correct you or tell you things you don’t want to hear. For many of these billionaires, the vibes of fascism, authoritarianism, and colonialism are attractive because they’re fundamentally about creating a fantasy of control.  You argue that these visions of the future are being used to hasten environmental destruction, increase authoritarianism, and exacerbate inequalities. You also admit that they appeal to lots of people who aren’t billionaires. Why do you think that is?  I think a lot of us are also attracted to these ideas for the same reasons the tech billionaires are—they offer this fantasy of knowing what the future holds, of transcending death, and a sense that someone or something out there is in control. It’s hard to overstate how comforting a simple, coherent narrative can be in an increasingly complex and fast-moving world. This is of course what religion offers for many of us, and I don’t think it’s an accident that a sizable number of people in the rationalist and effective altruist communities are actually ex-evangelicals. More than any one specific technology, it seems like the most consequential thing these billionaires have invented is a sense of inevitability—that their visions for the future are somehow predestined. How does one fight against that? It’s a difficult question. For me, the answer was to write this book. I guess I’d also say this: Silicon Valley enjoyed well over a decade with little to no pushback on anything. That’s definitely a big part of how we ended up in this mess. There was no regulation, very little critical coverage in the press, and a lot of self-mythologizing going on. Things have started to change, especially as the social and environmental damage that tech companies and industry leaders have helped facilitate has become more clear. That understanding is an essential part of deflating the power of these tech billionaires and breaking free of their visions. When we understand that these dreams of the future are actually nightmares for the rest of us, I think you’ll see that senseof inevitability vanish pretty fast.  This interview was edited for length and clarity. Bryan Gardiner is a writer based in Oakland, California. 
    Like
    Love
    Wow
    Sad
    Angry
    535
    2 Comments 0 Shares
More Results
CGShares https://cgshares.com