While it may not be a game-changing update, the Xiaomi 17 does just enough to stay competitive and cement itself as one of the top compact flagships on the market. If you’re looking for a smaller flagship without the compromises, look no further.
Compact size
Super powerful
Solid cameras
Great battery life
Not a massive upgrade over the previous model
Software support terms don’t match the competition
No charger in the box
Squirrel Widget
Key Features
Smaller size
Arguably, the biggest draw of the Xiaomi 17 is its relatively compact footprint. It’s similarly sized to the iPhone 17 and Galaxy S26, which makes it perfect for smaller hands and pockets.
Mega powerful
Advertisement
Despite being smaller, the Xiaomi 17 is still a performance beast. With the latest Snapdragon 8 Elite Gen 5 at its core, it’ll handle high-end gaming and intense productivity workloads with ease.
Big battery and speedy charging
Another surprising aspect, considering the size, is that the Xiaomi 17 has a huge battery inside (bigger than the 17 Ultra), and it charges at up to 100W speeds.
Introduction
The base model Xiaomi 17 aims to be a do-it-all flagship in a smaller, more pocketable form factor. It’s Xiaomi’s answer to the likes of the iPhone 17 and Galaxy S26.
Advertisement
While it may look slightly different, the Xiaomi 17 has quite familiar specifications. It’s roughly the same size and shape as its predecessor, and the cameras seem to be mostly unchanged, too.
What you do get, this time around, is the latest Snapdragon chip, a brighter screen, a bigger battery, and quicker charging. Is that enough to compete with the big dogs? I’ve been using it for the past week to find out.
Advertisement
Design
151.1×71.8×8.1 mm, 191g
Aluminium frame, glass fibre back
IP68 rated
As mentioned, the Xiaomi 17 has roughly the same footprint as its predecessor, which means it’s refreshingly compact. If you want a smaller handset, but you don’t want to skimp on specifications, your options are quite limited, and this phone is one of the top contenders.
Image Credit (Trusted Reviews)
While the phone is smaller, it strikes a nice balance. The screen doesn’t feel too cramped, and there’s a bit of heft to it, which adds to the premium feel.
Aesthetically, there has been a pretty big change with this generation. Xiaomi has done away with the black rectangular camera island and switched to a more iPhone-like “plateau”. The notable difference here is that there’s an extra lens compared to the base-model iPhone 17.
Advertisement
Advertisement
The rear panel has a frosted matte finish, while the camera surround and Xiaomi logo are glossy – again, just like the latest iPhones. My test sample came in a fetching green colour, which is new for the global release. It’s also available in Blue and Black.
Image Credit (Trusted Reviews)
The phone has a flat front and rear with flat side rails. At the risk of sounding like a broken record, it’s basically iPhone-shaped. It’s no bad thing, I like the way iPhones look and feel, and unsurprisingly, I like this, too.
There are, however, a few differences between this and Apple’s latest. For starters, there are no additional buttons, just the usual power button and volume rocker combination. You also get a hard-shell clear case included in the box, and a factory-applied screen protector; there are no such goodies in Apple’s packages.
Image Credit (Trusted Reviews)
The Xiaomi 17 is IP68-rated, which means it’s basically immune to dust ingress, and it can withstand brief dunks in fresh water. It doesn’t get the higher IP69K rating like the Ultra, but since that’s mostly to do with hot water jets, it’ll have little effect on the durability in most circumstances.
Advertisement
Advertisement
Screen
6.3-inch 120Hz 1220×2656 OLED
Flat display
3500 nits peak brightness
The Xiaomi 17 has a 6.3-inch flat OLED display with a 120Hz refresh rate and a peak brightness of 3500 nits. It’s about 300 nits brighter than the last generation, and it also has a higher PWM dimming frequency of 2160Hz, up from 1920Hz.
Image Credit (Trusted Reviews)
The extra brightness is the most impactful change. It’s not worlds apart from the previous generation, but it’s easier to see in direct sunlight, and that’s always a good thing.
The most unique thing about the display is that it’s on the smaller side. It’s much easier to reach the top of the screen if you have smaller hands, and the slim symmetrical bezels and small punch-hole camera cutout mean that it doesn’t feel cramped or undersized.
Image Credit (Trusted Reviews)
Advertisement
Colours appear accurate with plenty of vibrance, and the black levels are excellent, as you’ll find with most modern OLED panels. Whether you’re playing games, watching YouTube, or catching up on your favourite Netflix show, you’re in for a visual treat.
I didn’t feel the need to adjust the default colour profile, but if you want to calibrate further, Xiaomi gives you plenty of options to tweak the output.
Cameras
50MP main camera (1/1.3-inch sensor)
50MP ultrawide (1/2.76-inch)
50MP 2.6x telephoto (1/2.76-inch)
50MP selfie camera (AF)
The Xiaomi 17 has a triple 50MP camera setup on the rear. There’s an 17mm equivalent ultrawide, a 23mm main and 60mm telephoto camera.
Image Credit (Trusted Reviews)
The specs are essentially the same as last year’s array, and the shortcomings are the same, too. For me, the biggest disappointment was that the ultrawide lens is fixed focus. That’s fine for landscapes and architecture, but it means close-ups and group photos are out of the question.
Advertisement
Advertisement
Thankfully, macro duties are taken on by the telephoto camera, which can focus as close as 10cm from the lens. I prefer to use the telephoto for macro shots anyway, so I’d chalk it up as a win overall.
The only camera to receive a proper spec bump is the selfie snapper. It’s now 50MP, up from 32MP, and it also has autofocus, whereas the previous generation was fixed-focus. It makes a big difference; the results from the selfie camera are noticeably sharper and more detailed than the previous model.
Just as I found when testing the 17 Ultra, Xiaomi’s image processing feels more refined than ever, and it’s now easily among my favourites. Colours are life-like without looking dull, and if you want to add a little more flavour to your shots, you have a wide array of stylish filters to choose from.
Of course, this camera array isn’t quite on the same level as Xiaomi’s Ultra flagship, but the shared DNA is plain to see. The main drawbacks, comparatively, are the smaller sensor sizes, which means the Xiaomi 17 doesn’t do quite as well in low light conditions, and the shorter reach of the telephoto lens.
Advertisement
Advertisement
If you’re zooming over long distances, the base model can’t compete with its Ultra sibling. It’s not bad, but you’ll start to see a lot of image degradation once you move past 15x or so.
That being said, on the other end of the spectrum, the base model is actually much more impressive for macro photography. It may not have the same reach, but it can focus much, much closer and capture some excellent details.
While the camera system might not bring any exciting features along with it, it’s definitely amongst the best available in a compact flagship handset. I was really pleased with the results I got from it, and solid portrait mode effects and filters only add to the appeal.
Advertisement
It’s no slouch in the video department, either. You can shoot in Log at 4K60 on all of the rear lenses with full Pro controls. You can even shoot at 8K, if you feel the need.
Performance
Qualcomm Snapdragon 8 Elite Gen 5
12GB RAM, 512GB storage
Dual stereo speakers
Advertisement
The Xiaomi 17 is powered by Qualcomm’s most powerful SoC to date, the Snapdragon 8 Elite Gen 5. The global release pairs it with 12GB of RAM and 512GB of storage.
As you might expect, it’s a super-powerful phone. Whether you’re multitasking heavily, editing videos on the go, or playing the most demanding mobile games, the Xiaomi 17 handles everything readily.
Image Credit (Trusted Reviews)
Just as I found with its Ultra sibling, the Xiaomi 17 stays impressively cool under load, too. With the settings maxed out on Genshin Impact, the phone had barely begun to heat up after half an hour of play.
That’s not to say it never heats up. It got very toasty during our new AI benchmark test, for example, but in actual use, the phone stayed cool as a cucumber.
Advertisement
Image Credit (Trusted Reviews)
Advertisement
The speakers on this phone also impressed me. They’re not the loudest around, and rivals compete well in terms of detail, but the Xiaomi 17 has the upper hand when it comes to bass response. The phone manages to add some real thump to the lower frequencies without sounding too boomy or distorted.
Software & AI
HyperOS 3, based on Android 16
New iOS-like styling
Lots of AI features
The Xiaomi 17 runs HyperOS 3, Xiaomi’s custom software built on top of Android 16. If you’ve used a recent Xiaomi device, you’ll have a good idea of what to expect, but the latest version comes with some nice visual tweaks and of course, plenty of AI functionality.
Image Credit (Trusted Reviews)
HyperOS 3 looks and feels more iOS-inspired than ever, but personally, I’m fine with that. It has its own version of the Dynamic Island, lock screen options with depth effects and widgets, and a very Apple-looking quick settings panel.
Possibly the best thing about HyperOS, though, is how customisable it is. You can change just the way everything looks using the various themes and settings menus, even the animations can be swapped around.
Advertisement
Image Credit (Trusted Reviews)
What I don’t like so much are the aggressive battery-saving measures. You’ll need to do some fiddling with background power use options for various apps to ensure that your notifications remain timely.
There are lots of AI tools for image editing, ranging from simple things like object removal to outpainting, beautification, upscaling, and more. There are also plenty of productivity tools, including the usual AI-powered transcription, translation, and writing assistance options.
Advertisement
Image Credit (Trusted Reviews)
Of course, you get the standard Google goodies, too. Gemini is set as the default assistant, and you can use Circle to Search to quickly find information about anything on your screen.
Battery life
6300mAh battery
100W wired charging
50W wireless charging
Advertisement
Bizarrely, the Xiaomi 17 base model outperforms the Ultra in the battery department. Not only does it feature a larger 6300mAh cell, compared to the Ultra’s 6000mAh, but it charges quicker, supporting up to 100W speeds, rather than 90W.
Image Credit (Trusted Reviews)
With my typical use, the Xiaomi 17 got me through the day with no difficulty. Often, I would end the day with well over 40% remaining. I couldn’t quite squeeze two days from it, but if you’re more considerate with your usage, it may be within reach.
There’s no charger included in the box, just a USB cable, so you might want to budget for a speedy wall adapter to make the most of it. I was happy to see that it still charges extremely quickly with third-party PD chargers, though, so a Xiaomi-branded one might not be a necessity.
Image Credit (Trusted Reviews)
My Ugreen Nexode 200W desktop charger was able to take the phone from fully flat to almost 65% charged in just half an hour. Not a bad showing considering the capacious 6300mAh tank.
Advertisement
The phone also supports blazing-fast 50W wireless charging, but you’ll need a Xiaomi charging pad if you want to reach such speeds.
Advertisement
Squirrel Widget
Should you buy it?
You want a compact flagship with very few compromises
The Xiaomi 17 is a great phone in just about every area, and it manages to do so while remaining compact and pocket-friendly. If you’re in the market for a smaller flagship phone, there are few as well-rounded as this.
Advertisement
You want the absolute best cameras
There’s no way around it; the smaller sensors on this device can’t match the fidelity and low-light performance of its Ultra sibling. If you want the absolute best cameras, you’ll need to settle for a larger phone.
Advertisement
Final Thoughts
On one hand, the Xiaomi 17 doesn’t feel like a massive generational leap over the Xiaomi 15, and for that reason, I can’t imagine existing owners rushing to upgrade. On the other hand, it’s a great all-rounder, and if you’re looking for a flagship in a more compact chassis, few come close to this.
It has a significantly bigger battery and faster charging than either the iPhone 17 or Galaxy S26, and in my opinion, better cameras, too. Software is a matter of personal preference, but HyperOS is super customisable, so if there’s anything you’re not keen on, you can likely change it.
Advertisement
What Xiaomi can’t quite match is the software support terms. So if you’re planning to hold onto your phone for a long time, that could play into your decision.
I have thoroughly enjoyed my time with the Xiaomi 17; it has been great for gaming, content consumption, and photography alike. It’s an easy recommendation for anyone looking for a smaller flagship phone in 2026.
How We Test
We test every mobile phone we review thoroughly. We use industry-standard tests to compare features properly and we use the phone as our main device over the review period. We’ll always tell you what we find and we never, ever, accept money to review a product.
Used as a main phone for over a week
Thorough camera testing in a variety of conditions
Tested and benchmarked using respected industry tests and real-world data
FAQs
Is the Xiaomi 17 waterproof?
Yes, the Xiaomi 17 is IP68 rated, which means it can withstand dunks in fresh water at up to 1.5 metre depths for up to 30 minutes.
Advertisement
Does the Xiaomi 17 support eSIM?
Yes, the global release of the Xiaomi 17 has eSIM support (but the Chinese model doesn’t.)
Advertisement
Advertisement
Test Data
Xiaomi 17
Geekbench 6 single core
3484
Geekbench 6 multi core
10083
Geekbench 6 GPU
23297
AI performance
21142
AI efficiency
46.4
1 hour video playback (Netflix, HDR)
4 %
30 minute gaming (light)
8 %
Time from 0-100% charge
65 min
Time from 0-50% charge
23 Min
30-min recharge (no charger included)
64 %
15-min recharge (no charger included)
33 %
Full Specs
Xiaomi 17 Review
Manufacturer
Xiaomi
Screen Size
6.3 inches
Storage Capacity
256GB, 512GB, 1TB
Rear Camera
50MP + 50MP + 50MP
Front Camera
50MP
Video Recording
Yes
IP rating
IP68
Battery
6300 mAh
Wireless charging
Yes
Fast Charging
Yes
Size (Dimensions)
71.8 x 8.1 x 151.1 MM
Weight
191 G
Operating System
HyperOS 3 (Android 16)
Release Date
2026
First Reviewed Date
28/02/2026
Resolution
1220 x 2656
HDR
Yes
Refresh Rate
120 Hz
Ports
USB-C
Chipset
Snapdragon 8 Elite Gen 5
RAM
12GB, 16GB
Colours
Black, Venture Green, Alpine Pink, Ice Blue, White
When security teams talk about attack surface, the conversation usually starts in familiar places. Servers, identity systems, VPN access, cloud workloads, maybe browsers. Those are visible. They show up in diagrams and asset inventories.
What gets less attention are the everyday tools people use to actually get work done.
PDF readers. Compression utilities. Remote access clients. Word processors. Spreadsheet tools. Email clients. Browsers. Screen sharing software. Update managers. The background software that quietly powers normal business activity.
Most organizations do not spend much time debating whether to deploy these. They are simply part of operating in a digital economy. Contracts arrive as PDFs. Finance works in spreadsheets. HR reviews resumes. IT supports users remotely. Executives live in email and browsers. These tools become part of the environment almost by default.
Advertisement
At Action1, where visibility into third-party software exposure across endpoints is a daily focus, these background tools consistently emerge as a defining part of the real-world attack surface.
That commonness is what makes them attractive targets from a threat actor’s perspective.
The value of being ordinary
From the outside, modern enterprises look different. Networks vary. Architectures change. Security stacks evolve. But, inside most environments, the same classes of applications appear again and again, and more often than not, the same software titles dominate the majority of installations.
It is difficult to function in modern business without an email client, document processing software, a browser, and tools for packaging, previewing, and sharing files. Using similar products is less about preference and more about compatibility.
Advertisement
Business depends on exchanging information in formats everyone else can use. Without those standards, we go back to the days of file-format wars, “I cannot open that, we use something else,” and lost time just trying to make data usable. That friction is why the industry standardized, and why the same major names still dominate.
Attackers pay attention to that.
Rather than predicting every custom application an organization might run, they look for overlap. If a vulnerability appears in a widely used PDF engine, spreadsheet parser, email preview component, or remote access utility, the chances it connects with something real are high. The exploit is aimed less at unique architecture and more at familiarity.
Most successful exploitation does not rely on exotic techniques. It relies on muscle memory. Users open PDFs, Word files, spreadsheets, and links all day long. Attackers are betting those actions feel routine enough that nobody hesitates.
Advertisement
That familiarity shapes how campaigns are built, and it should influence how defense strategies are planned.
Good thing Action1 does it for you, now on Linux too—alongside Windows, macOS, and third-party apps.
One platform. Zero infrastructure. Real-time visibility. Finally, patching that just works.
Many attacks historically looked like guesswork. An attacker might send a crafted email for Outlook, hoping the recipient uses Outlook. Or attach a weaponized spreadsheet, hoping Excel is present. Or send a malicious PDF, hoping the reader is vulnerable.
Advertisement
There is uncertainty in that approach. The exploit launches before the attacker truly knows what exists on the other end. This increases chances the attack will be detected before being effective, and it risks valuable exploit code to failure, where it may be detected, profiled, then henceforth scanned and detected.
What changes with common utilities is the probability curve.
Email clients, browsers, word processors, spreadsheets, PDF readers, and archive tools appear in most business environments because the work itself requires them. An attacker does not need perfect information to expect something compatible nearby.
Instead of treating exploitation as a one-off guess, attackers think in likelihood. They invest effort where overlap is largest. The more widespread the tool, the more attractive it becomes as an entry point.
Advertisement
That is why vulnerabilities in these utilities move quickly through exploit ecosystems. Once something works in a familiar toolchain, it scales. If one user relies on Outlook, Word, and Adobe, there is a good chance coworkers and business relations do as well for interoperability reasons.
Figure 1: Automated detection and remediation of critical vulnerabilities in third-party applications.
The standard business footprint in practice
These tools also travel together.
If an email clearly originated from Outlook, it already hints at part of the environment. Email workflows connect to document workflows. If Outlook is present, Word and Excel are often nearby.
Each utility reinforces the presence of others.
For attackers, that enables paths rather than isolated exploits. An issue in an email client connects to attachment handling, preview engines, document renderers, shared libraries, and integrations that tend to coexist on the same system.
Advertisement
Instead of targeting a single application, the attack surface starts to resemble the business footprint itself, the collection of tools people rely on every day.
When vulnerabilities appear in that footprint, they attract more attention because they fit naturally into how people already work.
Quiet signals and small leaks
Another part of the story is information people do not realize they share.
Documents often contain metadata. PDFs reference the engine that produced them. Spreadsheets carry formatting behavior tied to specific suites. Email headers expose client details. Browser traffic advertises user agents. File structures reveal habits and versions.
Advertisement
A single attachment, email, or shared document can quietly describe parts of the software stack behind it.
In isolation it does not look sensitive. Often it is not even visible. Over time it builds a picture of what tools are common, what standards they follow, and how files are processed.
What created it, what version, how recently, so when old software details show in current workflows, the software processing it is old. And old software often means years of exploit potential bottled up in one package. That is often what turns speculation into precision.
Those breadcrumbs help attackers shape payloads that align with what exists on the other side, increasing effectiveness while reducing noisy experimentation.
Advertisement
Why third-party software drifts
Most enterprises put real effort into operating system patching. Update pipelines are understood. Browsers update often. Mobile devices follow management policies. Systems start with baselines and are monitored.
Third-party utilities live differently.
Vendors ship different installers. Some auto-update. Some rely on users. Some get disabled by packaging systems. Some stay frozen because workflows depend on a version.
Over time, multiple builds of the same tool spread across endpoints. Some become stale. Some live for years with known vulnerabilities simply because they fell off the radar.
Advertisement
In Action1’s analysis of enterprise environments, it is common to find multiple versions of the same third-party application coexisting, some lagging years behind current security fixes. This fragmentation quietly accumulates exploit potential without triggering obvious alerts.
From a security view, that drift matters because attackers do not need new exploits. They benefit from whatever version still exists somewhere in the footprint. A five-year-old PDF reader quietly carries five years of cumulative exploit potential.
What feels like small technical debt widens the opportunity window for major exploitation.
Trust and everyday behavior
There is also a human side to these tools.
Advertisement
Email, documents, browsers, and archives feel like infrastructure. People trust them like desks and keyboards. Opening a PDF does not feel like running code. Previewing an email does not feel like execution. Extracting a file feels routine.
By the time behavior looks unusual, the initial interaction already happened in a place people rarely question. These actions occur thousands of times a day, which makes tracing a compromise back to a document, email, or user extremely difficult.
Figure 2: Secure, scalable patch management across Windows, macOS, and third-party apps, with compliance reporting and 200 forever-free endpoints.
Looking at the footprint, not just the platform
For leadership teams, the value here is perspective, not fear.
Security strategies often start with the platform layer, operating systems, networks, identity, cloud infrastructure. Those matter, but they do not tell the full story of how work actually happens.
Work happens in email clients, spreadsheets, PDFs, browsers, archive tools, and remote sessions. That is where files open, previews render, links get clicked, and data moves between people.
Advertisement
That makes them predictable.
That is why third-party patching often carries more risk weight than expected. The operating system may be tightly managed, while the tools on top quietly define real exposure.
Looking at the footprint is less about assuming weakness and more about understanding where everyday work intersects with real security concerns.
A quieter way to think about patching
Third-party patching often feels operational rather than strategic. Yet these utilities sit at the intersection of people, files, and execution.
Advertisement
They are ordinary, and that is exactly why they matter.
Not because every organization looks the same, but because they look similar enough that attackers design around that similarity.
When teams examine environments, the focus is usually infrastructure. There is also value in asking what the standard business suite looks like across endpoints, how it evolves, and how consistently it stays current.
Which tools are actually needed? Which are simply part of a default deploy? Which stay installed even when unused? Which stop getting updated because nobody notices them?
Advertisement
This is why, in practice, teams working with platforms like Action1 consistently see third-party patching deliver a greater reduction in real-world risk than many more visible security controls. Exploitation rarely hinges on a single overlooked vulnerability. It is enabled by years of accumulated drift across third-party applications that quietly fall out of date while remaining embedded in everyday workflows.
Those conditions exist long before an exploit is written or deployed. They shape the practical attack surface by defining which software actually executes, which files get opened, and which actions feel routine enough to avoid scrutiny.
Third-party software is not adjacent to the platform — it is part of how the platform operates, and it is often where exposure concentrates when everything else appears well-managed.
Action1is a founder-led company, brought to you by the original minds behind Netwrix. At the time of this writing, it is one of the fastest-growing private software companies in the US because organizations are recognizing that OS and third-party patching can no longer be treated as a secondary task.
Advertisement
Addressing modern risk requires continuous visibility into third-party software and the ability to remediate vulnerable applications across endpoints quickly and consistently. When teams evaluate modern patch management solutions, Action1 increasingly represents the option designed around that reality.
One of the problems with being a graffiti artist is that you have to carry around a different spray can for each color you intend to use. [Sandesh Manik] decided to solve this problem by building a rig that can produce a wider range of colors by mixing the paint from several cans at once. Check it out in the video below.
The project is called Spectrum. It uses four off-the-shelf spray paint cans—colored red, blue, yellow, and white—and mixes them to create a wider range of colors. All four cans are hooked up to a single output nozzle via a nest of tubing and a four-to-one tube manifold. Key to controlling the flow of paint is a custom device which [Sandesh] calls the “rotary pinch valve,” with one fitted to the feed line coming from each spray can. These valves use a motor-driven lever to pinch a plastic tube shut, allowing them to control the paint flow. This design keeps the mechanism and paint completely separate, which was important to stop paint from fouling the valves in short order. It also prevents backflow, which keeps the paint going towards the outlet and prevents ugly messes. By quickly actuating the valve, the paint flow from each can is modulated to mix various colors as desired.
The mixing valves are under the command of an Arduino Nano. The microcontroller reads a series of knobs to select the amount of each component color to mix, and displays relevant information on a screen. Then, when a pushbutton is pressed, the valves are actuated to spit out the right amount of each paint from the atomizer nozzle. [Sandesh] went so far as to include an advanced “gradient” mode, where a force-sensitive button allows the device to transition smoothly from one color to another depending on how hard the button is pushed.
Advertisement
It’s a neat concept which we’d love to see explored further, perhaps with a more traditional selection of CMYK paints rather than the more unusual red, yellow, blue, and white. We’ve also seen some fun spray paint projects before, like this neat wall-mount plotter. Video after the break.
The Bugatti W16 Mistral ‘La Perle Rare’, the last of a vanishing breed, marks the end of an era defined by raw mechanical power and an obsessive quest of perfection. There are only 99 of these Mistrals in total, and each starts at over €5 million. ‘La Perle Rare’, on the other hand, is a handmade unique that will cost a little more than $8-9 million.
It all began at the 2023 Pebble Beach Concours d’Elegance, when a client commissioned Bugatti to produce something absolutely special. Over time, the client and Jascha Straub, the guy in charge of Bugatti’s bespoke business, came up with proposals ranging from a silver tint to numerous shades of white before settling on something that seemed to capture the essence of light. The project began in August 2023, and we can safely assume that the designers in Berlin and engineers in Molsheim worked long hours on it.
HIGH SPEED THRILLS – Kids construct an authentic race car with the LEGO Technic Bugatti Chiron Pur Sport Hypercar (42222) building toy for boys and…
REALISTIC FEATURES & FUNCTIONS – Young builders can steer using the knob on top, explore the W16 engine, and open the doors and hood to discover…
VIBRANT BUGATTI DESIGN – This hypercar model features the eye-catching orange bodywork and black design inspired by the real Bugatti Chiron Pur…
The exterior of ‘La Perle Rare’ is a true show-stopper, with a two-tone color scheme that separates the vehicle into two distinct areas. The top area is a warm color tinged with gold and iridescence, as well as a sprinkle of metallic particles that sparkle beautifully. The second part is a sophisticated, warm white color. Getting the separating lines between the colors just right required a lot of precision. Even the wheels received special treatment, resulting in stunning diamond-cut rims painted in the interior color of the vehicle, which is an understatement given that the wheels are coated in a custom paint combination that matches the exact colors of gold and white. The end result is a car that shines like a rare gem while maintaining the original Mistral design.
Rembrandt Bugatti’s famed Dancing Elephant sculpture is featured in a few of the car’s more subtle details, like the gear selector, body panels behind the front wheels, and even the headrests. To add a personal touch, the name ‘La Perle Rare’ is stitched in the center tunnel, stamped on the engine cover, and painted on the active rear wing. These little details return the automobile to Bugatti’s artistic roots.
Inside ‘La Perle Rare,’ the cabin takes on an entirely new level of brightness, a luminous continuation of the outer motif that is difficult to describe. Every visible piece of carbon fibre has been coated white to give it a jewel-like appearance. Door panels feature alternating white and warm gold lines that look lovely on their sculpted, concave surfaces. The ambient lighting has just the right amount of warmth to it, highlighting the interplay between light and material. The steering wheel, center console clocks, and door handles are all machined and polished aluminum, with each meant to catch reflections in a particularly stunning way.
The power comes from the same quad-turbocharged 8.0-litre W16 engine found in all Mistrals. It’s not exactly small in any way, with 1,579 horsepower and 1,600 Nm of torque, it can go from 0 to 62 in 2.4 seconds, 0 to 124 in 5.6 seconds, and 0 to 186 in 12.1 seconds, and all of that power is sent to all four wheels via a seven-speed dual clutch transmission. Top speed? The record for the fastest open-top production car is already in the records, 282 mph and all, thanks to this car, but, for obvious reasons, you won’t be able to get it up to that sort of speed on the road, closer to 236 mph if you want to play it safe. [Source]
In the time it takes you to read this sentence, the Large Hadron Collider (LHC) will have smashed billions of particles together. In all likelihood, it will have found exactly what it found yesterday: more evidence to support the Standard Model of particle physics.
For the engineers who built this 27-kilometer-long ring, this consistency is a triumph. But for theoretical physicists, it has been rather frustrating. As Matthew Hutson reports in “AI Hunts for the Next Big Thing in Physics,” the field is currently gripped by a quiet crisis. In an email discussing his reporting, Hutson explains that the Standard Model, which describes the known elementary particles and forces, is not a complete picture. “So theorists have proposed new ideas, and experimentalists have built giant facilities to test them, but despite the gobs of data, there have been no big breakthroughs,” Hutson says. “There are key components of reality we’re completely missing.”
That’s why researchers are turning artificial intelligence loose on particle physics. They aren’t simply asking AI to comb through accelerator data to confirm existing theories, Hutson explains. They’re asking AI to point the way toward theories that they’ve never imagined. “Instead of looking to support theories that humans have generated,” he says, “unsupervised AI can highlight anything out of the ordinary, expanding our reach into unknown unknowns.” By asking AI to flag anomalies in the data, researchers hope to find their way to “new physics” that extends the Standard Model.
On the surface, this article might sound like another “AI for X” story. As IEEESpectrum’s AI editor, I get a steady stream of pitches for such stories: AI for drug discovery, AI for farming, AI for wildlife tracking. Often what that really means is faster data processing or automation around the edges. Useful, sure, but incremental.
Advertisement
What struck me in Hutson’s reporting is that this effort feels different. Instead of analyzing experimental data after the fact, the AI essentially becomes part of the instrument, scanning for subtle patterns and deciding in real time what’s interesting. At the LHC, detectors record 40 million collisions per second. There’s simply no way to preserve all that data, so engineers have always had to build filters to decide which events get saved for analysis and which are discarded; nearly everything is thrown away.
Now those split-second decisions are increasingly handed to machine learning systems running on field-programmable gate arrays (FPGAs) connected to the detectors. The code must run on the chip’s limited logic and memory, and compressing a neural network into that hardware isn’t easy. Hutson describes one theorist pleading with an engineer, “Which of my algorithms fits on your bloody FPGA?”
This moment is part of a much older pattern. As Hutson writes in the article, new instruments have opened doors to the unexpected throughout the history of science. Galileo’s telescoperevealed moons circling Jupiter. Early microscopes exposed entire worlds of “animalcules” swimming around. These better tools didn’t just answer existing questions; they made it possible to ask new ones.
If there’s a crisis in particle physics, in other words, it may not just be about missing particles. It’s about how to look beyond the limits of the human imagination. Hutson’s story suggests that AI might not solve the mysteries of the universe outright, but it could change how we search for answers.
For a late-1990s engineer with good soldering skills, many a free pint of beer could be earned by installing modchips on the game consoles of the day. Modchips were usually a small microcontroller connected with a few wires to selected pins on the chips or pads on the board that masked or overrode the copy protection and region locking. This scene was brought back for us by a recent [Modern vintage gamer] video looking at the history of console hardware mods, and it’s worth a watch (see the video, below).
The story starts in 1996 with the original PlayStation, largely the source of those free pints for a nascent Hackaday scribe back in the day. Along the way, as he expands the story, we find other memories, for example, the LPC bus-based hijacks of the first XBox console, and the huge modding scenes on both that machine and Sony’s PS2. The conclusion is that this community left its mark on today’s consoles even though the easy hardware hacks may be a thing of the past on the latest hardware, and as past Hackaday articles can attest, jailbreaking older consoles still has a way to go.
In the early days, our recollection is that the PlayStation modchips were driven by the region locking rather than piracy, for the simple reason that Sony used 80-minute ISOs which wouldn’t fit on the then-available consumer 74-minute CD-R. We also remember them being used by people who couldn’t afford a blue debuugging PlayStation,. or the rare black developer model.
Consumers can expect a long wait for the next version of the iPad Pro, but the 2027 refresh will get vapor chamber cooling, not a major revamp in design.
iPad Pro
While Apple is set to make a number of product announcements within days, the iPad Pro won’t be among them. Instead, you’re going to be waiting until early 2027 for the next iteration. Writing in Bloomberg’s “Power On” newsletter on Sunday, Mark Gurman answers a query about the next iPad Pro and when it will launch. In his response, he tempers expectations of an imminent update, providing a more realistic outlook for the tablet line. Rumor Score: 🤔 Possible Continue Reading on AppleInsider | Discuss on our Forums
Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs
As part of the agreement, the TV manufacturer will revise its privacy disclosures to clearly explain its data collection and processing practices to consumers.
Last December, Texas Attorney General Ken Paxton filed a lawsuit against several TV manufacturers, including Samsung, alleging that they use Automated Content Recognition (ACR) technology to collect and process viewing data without first obtaining their express, informed consent.
In January, Texas obtained a short-lived temporary restraining order (TRO) against Samsung to stop the unlawful collection of consumer data in the state, confirming a violation of the Texas Deceptive Trade Practices Act (DTPA).
Advertisement
Although the order was vacated on the following day, the lawsuit remained active.
The allegations against Samsung were that it uses ACR technology to capture screenshots of consumers’ TVs to determine what they’re watching. The South Korean tech giant would use this information for targeted advertising.
In support of the TRO, the Court found that there was “good cause to believe” that Samsung automatically enrolled customers in this system using “dark patterns” that included “over 200 clicks spread across four or more menus for a consumer to read the privacy statements and disclosures.”
In a statement to BleepingComputer, Samsung stated that, while it does not agree that its Viewing Information Services (VIS) system violated any regulations, it has agreed to “make enhancements to further strengthen our privacy disclosures.”
Advertisement
“While we maintain our original television privacy policy and notices followed existing Texas state regulations, as a trusted brand, Samsung is proud to be at the forefront of protecting consumer privacy and security,” stated a spokesperson of Samsung Electronics America.
“The settlement affirms what Samsung has said since this lawsuit was filed – Samsung TVs do not spy on consumers. In fact, Samsung allows you to control your privacy – and change your privacy settings at any time.”
“As part of the agreement, Samsung must halt any collection or processing of ACR viewing data without obtaining Texas consumers’ express consent,” announced Texas AG Ken Paxton.
“Additionally, it compels Samsung to promptly update its smart TVs and implement disclosures and consent screens that are clear and conspicuous to ensure that Texans can make an informed decision regarding whether their data is collected and how it’s used.”
Advertisement
Paxton commended Samsung for agreeing to implement consumer safeguards, while he underlined that others haven’t moved with a similar fervor as of yet.
Smart TV manufacturers, including Sony, LG, Hisense, and TCL Technologies, have not made any changes in response to the lawsuits yet.
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.
Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices.
The update focuses on the implant’s undetected latency on the appliances and its “sophisticated network-level evasion and authentication techniques” that enable covert communication with the attacker.
CISA originally documented the malware on March 28 last year, saying that it can survive reboots, create webshells for stealing credentials, create accounts, reset passwords, and escalate privileges.
According to researchers at incident response company Mandiant, the critical CVE-2025-0282 vulnerability was exploited as a zero-day since mid-December 2024 by a threat actor linked to China, tracked internally as UNC5221.
Advertisement
Network-level evasion
CISA’s updated bulletin provides additional technical information on RESURGE, a malicious 32-bit Linux Shared Object file named libdsupgrade.so that was extracted from a compromised device.
The implant is described as a passive command-and-control (C2) implant with rootkit, bootkit, backdoor, dropper, proxying, and tunneling capabilities.
Instead of beaconing to the C2, it waits indefinitely for a particular inbound TLS connection, evading network monitoring, CISA says in the updated document.
When loaded under the ‘web’ process, it hooks the ‘accept()’ function to inspect incoming TLS packets before they reach the web server, looking for specific connection attempts from a remote attacker that are identified using the CRC32 TLS fingerprint hashing scheme.
Advertisement
If the fingerprint does not match, traffic is directed to the legitimate Ivanti server. CISA further details Rusrge’s authentication mechanism saying that the threat actor also uses a fake Ivanti certificate to ensure that they are interacting with the implant and not the Ivanti web server.
The agency highlights that the certificate’s purpose is just to for authentication and verification purposes, as it is not used to encrypt communication. Furthermore, the fake certificate also helps the actor evade detection by impersonating the legitimate server.
Because the forged certificate is sent unencrypted over the internet, CISA says that defenders could use it as a network signature to detect an active compromise.
After fingerprint validation and authentication with the malware, the threat actor establishes secure remote access to the implant using a Mutual TLS session encrypted with the Elliptic Curve protocol.
Advertisement
“Static analysis indicates the RESURGE implant will request the remote actors’ EC key to utilize for encryption, and will also verify it with a hard-coded EC Certificate Authority (CA) key,” CISA says.
By mimicking legitimate TLS/SSH traffic, the implant achieves stealth and persistence, the American cybersecurity agency says.
Another file analyzed is a variant of the SpawnSloth malware using the name liblogblock.so and contained by the RESURGE implant. Its main purpose is log tampering to hide malicious activity on compromised devices.
A third file that CISA analyzed is dsmain, a kernel extraction script that embeds the open-source script ‘extract_vmlinux.sh’ and the BusyBox collection of Unix/Linux utilities.
It allows RESURGE to decrypt, modify, and re-encrypt coreboot firmware images and manipulate filesystem contents for boot-level persistence.
“CISA’s updated analysis shows that RESURGE can remain latent on systems until a remote actor attempts to connect to the compromised device,” the agency notes. Because of this, the malicious implant “may be dormant and undetected on Ivanti Connect Secure devices and remains an active threat.”
CISA suggests that system administrators use the updated indicators of compromise (IoCs) to discover dormant RESURGE infections and remove them from Ivanti devices.
Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.
Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.
Anthropic’s chatbot Claude seems to have benefited from the attention around the company’s fraught negotiations with the Pentagon.
As first reported by CNBC, Claude has been rising to the top of the free app rankings in Apple’s US App Store. On Saturday evening, it overtook OpenAI’s ChatGPT to claim the number one spot, a position that it still held on Sunday morning.
According to data from SensorTower, Claude was just outside the top 100 at the end of January, and has spent most of February somewhere in the top 20. It’s climbed rapidly in the past few days, from sixth on Wednesday, then fourth on Thursday, then first on Saturday.
A company spokesperson said that daily signups have broken the all-time record every day this week, free users have increased more than 60% since January, and paid subscribers have more than doubled this year.
Advertisement
After Anthropic attempted to negotiate for safeguards preventing the Department of Defense from using its AI models for mass domestic surveillance or fully autonomous weapons, President Donald Trump directed federal agencies to stop using all Anthropic products and Secretary of Defense Pete Hegseth said he’s designating the company a supply-chain threat.
This post was first published on February 28, 2026. It has been updated to reflect Anthropic reaching No. 1, and to include growth numbers from the company.
In the not-so-distant past, cars weren’t as commonplace as they are today. Naturally, this also means that the now-essential elements of widespread car travel, like highways and mechanics, weren’t around yet. The gas station, which is a building on just about every corner in the modern era, was no exception. Way back in the late 1800s, early drivers had to pay a visit to their local pharmacy to purchase cans of fuel. One had to pour the fuel from the cans into their vehicle to get it running.
The most famous instance of filling up a vehicle using pharmacy supplies was in 1888, when Bertha Benz, the wife of automobile pioneer Carl Benz, drove from Mannheim to Pforzheim, Germany, in the Benz Patent-Motorwagen, the first car ever invented. Early on in her trip, she made her first benzene refueling stop at the Stadt-Apotheke pharmacy in Wiesloch, giving it the historical distinction of being the world’s first filling station. So began the trend of pharmacies providing drivers with their much-needed vehicle fuel.
Of course, in the over a century since Bertha’s historic trip, car refueling has changed. In fact, it didn’t take long after her landmark drive for the first thing we recognize as a gas station to be established, making pharmacy refueling nothing more than a historical footnote.
Advertisement
It didn’t take long for true gas stations to appear
Ej_rodriquez/Getty Images
In the years following Bertha Benz’s drive, cars became more and more popular. Thus, a better way to fuel up was needed, and in the United States, the answer came in the year 1905. That year saw the establishment of the world’s first designated filling station, which opened for business in St. Louis, Missouri, and allowed folks to drive up and purchase fuel without having to get it by the canister. At the same time, it has also been claimed by Standard Oil that the real first gas station was opened two years later in 1907. This station pumped gasoline directly into cars from a massive tank.
These systems worked well enough, but there was still some evolution to be done to get use to the gas stations we know today. Less than a decade later, in 1913, Gulf Refining Company opened the doors to its first drive-up gas station. Located in Pittsburgh, Pennsylvania, on the corner of Baum Boulevard and St. Clair Street, this station also offered free air, water, crankcase service, and tire and tube installation. This extensive service is just one of the many reasons why the gas stations of yesteryear are considered better than those in operation today.
Advertisement
Over the past century-plus, gas stations have come a long way. Even with their flaws, and the comparatively high price of modern gas, the current setup is certainly a far and away improvement on the old pharmacies that early drivers had to work with.