Connect with us

Tech

Xiaomi 17 Review – Trusted Reviews

Published

on

Verdict

While it may not be a game-changing update, the Xiaomi 17 does just enough to stay competitive and cement itself as one of the top compact flagships on the market. If you’re looking for a smaller flagship without the compromises, look no further.


  • Compact size

  • Super powerful

  • Solid cameras

  • Great battery life

  • Not a massive upgrade over the previous model

  • Software support terms don’t match the competition

  • No charger in the box

Key Features


  • Smaller size


    Arguably, the biggest draw of the Xiaomi 17 is its relatively compact footprint. It’s similarly sized to the iPhone 17 and Galaxy S26, which makes it perfect for smaller hands and pockets.


  • Mega powerful

    Advertisement


    Despite being smaller, the Xiaomi 17 is still a performance beast. With the latest Snapdragon 8 Elite Gen 5 at its core, it’ll handle high-end gaming and intense productivity workloads with ease.


  • Big battery and speedy charging


    Another surprising aspect, considering the size, is that the Xiaomi 17 has a huge battery inside (bigger than the 17 Ultra), and it charges at up to 100W speeds.

Introduction

The base model Xiaomi 17 aims to be a do-it-all flagship in a smaller, more pocketable form factor. It’s Xiaomi’s answer to the likes of the iPhone 17 and Galaxy S26.

Advertisement

While it may look slightly different, the Xiaomi 17 has quite familiar specifications. It’s roughly the same size and shape as its predecessor, and the cameras seem to be mostly unchanged, too.

What you do get, this time around, is the latest Snapdragon chip, a brighter screen, a bigger battery, and quicker charging. Is that enough to compete with the big dogs? I’ve been using it for the past week to find out.

Advertisement

Design 

  • 151.1×71.8×8.1 mm, 191g
  • Aluminium frame, glass fibre back
  • IP68 rated

As mentioned, the Xiaomi 17 has roughly the same footprint as its predecessor, which means it’s refreshingly compact. If you want a smaller handset, but you don’t want to skimp on specifications, your options are quite limited, and this phone is one of the top contenders.

Xiaomi 17 - rear of the phoneXiaomi 17 - rear of the phone
Image Credit (Trusted Reviews)

While the phone is smaller, it strikes a nice balance. The screen doesn’t feel too cramped, and there’s a bit of heft to it, which adds to the premium feel.

Aesthetically, there has been a pretty big change with this generation. Xiaomi has done away with the black rectangular camera island and switched to a more iPhone-like “plateau”. The notable difference here is that there’s an extra lens compared to the base-model iPhone 17.

Advertisement

Advertisement

The rear panel has a frosted matte finish, while the camera surround and Xiaomi logo are glossy – again, just like the latest iPhones. My test sample came in a fetching green colour, which is new for the global release. It’s also available in Blue and Black.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

The phone has a flat front and rear with flat side rails. At the risk of sounding like a broken record, it’s basically iPhone-shaped. It’s no bad thing, I like the way iPhones look and feel, and unsurprisingly, I like this, too.

There are, however, a few differences between this and Apple’s latest. For starters, there are no additional buttons, just the usual power button and volume rocker combination. You also get a hard-shell clear case included in the box, and a factory-applied screen protector; there are no such goodies in Apple’s packages.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

The Xiaomi 17 is IP68-rated, which means it’s basically immune to dust ingress, and it can withstand brief dunks in fresh water. It doesn’t get the higher IP69K rating like the Ultra, but since that’s mostly to do with hot water jets, it’ll have little effect on the durability in most circumstances.

Advertisement

Advertisement

Screen 

  • 6.3-inch 120Hz 1220×2656 OLED
  • Flat display
  • 3500 nits peak brightness

The Xiaomi 17 has a 6.3-inch flat OLED display with a 120Hz refresh rate and a peak brightness of 3500 nits. It’s about 300 nits brighter than the last generation, and it also has a higher PWM dimming frequency of 2160Hz, up from 1920Hz.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

The extra brightness is the most impactful change. It’s not worlds apart from the previous generation, but it’s easier to see in direct sunlight, and that’s always a good thing.

The most unique thing about the display is that it’s on the smaller side. It’s much easier to reach the top of the screen if you have smaller hands, and the slim symmetrical bezels and small punch-hole camera cutout mean that it doesn’t feel cramped or undersized.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

Advertisement

Colours appear accurate with plenty of vibrance, and the black levels are excellent, as you’ll find with most modern OLED panels. Whether you’re playing games, watching YouTube, or catching up on your favourite Netflix show, you’re in for a visual treat.

I didn’t feel the need to adjust the default colour profile, but if you want to calibrate further, Xiaomi gives you plenty of options to tweak the output.

Cameras 

  • 50MP main camera (1/1.3-inch sensor)
  • 50MP ultrawide (1/2.76-inch)
  • 50MP 2.6x telephoto (1/2.76-inch)
  • 50MP selfie camera (AF)

The Xiaomi 17 has a triple 50MP camera setup on the rear. There’s an 17mm equivalent ultrawide, a 23mm main and 60mm telephoto camera.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

The specs are essentially the same as last year’s array, and the shortcomings are the same, too. For me, the biggest disappointment was that the ultrawide lens is fixed focus. That’s fine for landscapes and architecture, but it means close-ups and group photos are out of the question.

Advertisement

Advertisement

Thankfully, macro duties are taken on by the telephoto camera, which can focus as close as 10cm from the lens. I prefer to use the telephoto for macro shots anyway, so I’d chalk it up as a win overall.

The only camera to receive a proper spec bump is the selfie snapper. It’s now 50MP, up from 32MP, and it also has autofocus, whereas the previous generation was fixed-focus. It makes a big difference; the results from the selfie camera are noticeably sharper and more detailed than the previous model.

Just as I found when testing the 17 Ultra, Xiaomi’s image processing feels more refined than ever, and it’s now easily among my favourites. Colours are life-like without looking dull, and if you want to add a little more flavour to your shots, you have a wide array of stylish filters to choose from.

Of course, this camera array isn’t quite on the same level as Xiaomi’s Ultra flagship, but the shared DNA is plain to see. The main drawbacks, comparatively, are the smaller sensor sizes, which means the Xiaomi 17 doesn’t do quite as well in low light conditions, and the shorter reach of the telephoto lens.

Advertisement

Advertisement

If you’re zooming over long distances, the base model can’t compete with its Ultra sibling. It’s not bad, but you’ll start to see a lot of image degradation once you move past 15x or so.

That being said, on the other end of the spectrum, the base model is actually much more impressive for macro photography. It may not have the same reach, but it can focus much, much closer and capture some excellent details.

While the camera system might not bring any exciting features along with it, it’s definitely amongst the best available in a compact flagship handset. I was really pleased with the results I got from it, and solid portrait mode effects and filters only add to the appeal.

Advertisement

It’s no slouch in the video department, either. You can shoot in Log at 4K60 on all of the rear lenses with full Pro controls. You can even shoot at 8K, if you feel the need.

Performance 

  • Qualcomm Snapdragon 8 Elite Gen 5
  • 12GB RAM, 512GB storage
  • Dual stereo speakers

Advertisement

The Xiaomi 17 is powered by Qualcomm’s most powerful SoC to date, the Snapdragon 8 Elite Gen 5. The global release pairs it with 12GB of RAM and 512GB of storage.

As you might expect, it’s a super-powerful phone. Whether you’re multitasking heavily, editing videos on the go, or playing the most demanding mobile games, the Xiaomi 17 handles everything readily.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

Just as I found with its Ultra sibling, the Xiaomi 17 stays impressively cool under load, too. With the settings maxed out on Genshin Impact, the phone had barely begun to heat up after half an hour of play. 

That’s not to say it never heats up. It got very toasty during our new AI benchmark test, for example, but in actual use, the phone stayed cool as a cucumber.

Advertisement
Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

Advertisement

The speakers on this phone also impressed me. They’re not the loudest around, and rivals compete well in terms of detail, but the Xiaomi 17 has the upper hand when it comes to bass response. The phone manages to add some real thump to the lower frequencies without sounding too boomy or distorted.

Software & AI

  • HyperOS 3, based on Android 16
  • New iOS-like styling
  • Lots of AI features

The Xiaomi 17 runs HyperOS 3, Xiaomi’s custom software built on top of Android 16. If you’ve used a recent Xiaomi device, you’ll have a good idea of what to expect, but the latest version comes with some nice visual tweaks and of course, plenty of AI functionality.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

HyperOS 3 looks and feels more iOS-inspired than ever, but personally, I’m fine with that. It has its own version of the Dynamic Island, lock screen options with depth effects and widgets, and a very Apple-looking quick settings panel.

Possibly the best thing about HyperOS, though, is how customisable it is. You can change just the way everything looks using the various themes and settings menus, even the animations can be swapped around.

Advertisement

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

What I don’t like so much are the aggressive battery-saving measures. You’ll need to do some fiddling with background power use options for various apps to ensure that your notifications remain timely.

There are lots of AI tools for image editing, ranging from simple things like object removal to outpainting, beautification, upscaling, and more. There are also plenty of productivity tools, including the usual AI-powered transcription, translation, and writing assistance options.

Advertisement
Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

Of course, you get the standard Google goodies, too. Gemini is set as the default assistant, and you can use Circle to Search to quickly find information about anything on your screen.

Battery life 

  • 6300mAh battery
  • 100W wired charging
  • 50W wireless charging

Advertisement

Bizarrely, the Xiaomi 17 base model outperforms the Ultra in the battery department. Not only does it feature a larger 6300mAh cell, compared to the Ultra’s 6000mAh, but it charges quicker, supporting up to 100W speeds, rather than 90W.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

With my typical use, the Xiaomi 17 got me through the day with no difficulty. Often, I would end the day with well over 40% remaining. I couldn’t quite squeeze two days from it, but if you’re more considerate with your usage, it may be within reach.

There’s no charger included in the box, just a USB cable, so you might want to budget for a speedy wall adapter to make the most of it. I was happy to see that it still charges extremely quickly with third-party PD chargers, though, so a Xiaomi-branded one might not be a necessity.

Xiaomi 17Xiaomi 17
Image Credit (Trusted Reviews)

My Ugreen Nexode 200W desktop charger was able to take the phone from fully flat to almost 65% charged in just half an hour. Not a bad showing considering the capacious 6300mAh tank.

Advertisement

The phone also supports blazing-fast 50W wireless charging, but you’ll need a Xiaomi charging pad if you want to reach such speeds.

Advertisement

Should you buy it?

You want a compact flagship with very few compromises

The Xiaomi 17 is a great phone in just about every area, and it manages to do so while remaining compact and pocket-friendly. If you’re in the market for a smaller flagship phone, there are few as well-rounded as this.

Advertisement

You want the absolute best cameras

There’s no way around it; the smaller sensors on this device can’t match the fidelity and low-light performance of its Ultra sibling. If you want the absolute best cameras, you’ll need to settle for a larger phone.

Advertisement

Final Thoughts

On one hand, the Xiaomi 17 doesn’t feel like a massive generational leap over the Xiaomi 15, and for that reason, I can’t imagine existing owners rushing to upgrade. On the other hand, it’s a great all-rounder, and if you’re looking for a flagship in a more compact chassis, few come close to this.

It has a significantly bigger battery and faster charging than either the iPhone 17 or Galaxy S26, and in my opinion, better cameras, too. Software is a matter of personal preference, but HyperOS is super customisable, so if there’s anything you’re not keen on, you can likely change it.

Advertisement

What Xiaomi can’t quite match is the software support terms. So if you’re planning to hold onto your phone for a long time, that could play into your decision.

I have thoroughly enjoyed my time with the Xiaomi 17; it has been great for gaming, content consumption, and photography alike. It’s an easy recommendation for anyone looking for a smaller flagship phone in 2026.

How We Test

We test every mobile phone we review thoroughly. We use industry-standard tests to compare features properly and we use the phone as our main device over the review period. We’ll always tell you what we find and we never, ever, accept money to review a product.

  • Used as a main phone for over a week
  • Thorough camera testing in a variety of conditions
  • Tested and benchmarked using respected industry tests and real-world data

FAQs

Is the Xiaomi 17 waterproof?

Yes, the Xiaomi 17 is IP68 rated, which means it can withstand dunks in fresh water at up to 1.5 metre depths for up to 30 minutes.

Advertisement
Does the Xiaomi 17 support eSIM?

Yes, the global release of the Xiaomi 17 has eSIM support (but the Chinese model doesn’t.)

Advertisement

Advertisement

Test Data

  Xiaomi 17
Geekbench 6 single core 3484
Geekbench 6 multi core 10083
Geekbench 6 GPU 23297
AI performance 21142
AI efficiency 46.4
1 hour video playback (Netflix, HDR) 4 %
30 minute gaming (light) 8 %
Time from 0-100% charge 65 min
Time from 0-50% charge 23 Min
30-min recharge (no charger included) 64 %
15-min recharge (no charger included) 33 %

Full Specs

  Xiaomi 17 Review
Manufacturer Xiaomi
Screen Size 6.3 inches
Storage Capacity 256GB, 512GB, 1TB
Rear Camera 50MP + 50MP + 50MP
Front Camera 50MP
Video Recording Yes
IP rating IP68
Battery 6300 mAh
Wireless charging Yes
Fast Charging Yes
Size (Dimensions) 71.8 x 8.1 x 151.1 MM
Weight 191 G
Operating System HyperOS 3 (Android 16)
Release Date 2026
First Reviewed Date 28/02/2026
Resolution 1220 x 2656
HDR Yes
Refresh Rate 120 Hz
Ports USB-C
Chipset Snapdragon 8 Elite Gen 5
RAM 12GB, 16GB
Colours Black, Venture Green, Alpine Pink, Ice Blue, White
Stated Power 100 W

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Third-Party Patching and the Business Footprint We All Share

Published

on

A hacker hacking

When security teams talk about attack surface, the conversation usually starts in familiar places. Servers, identity systems, VPN access, cloud workloads, maybe browsers. Those are visible. They show up in diagrams and asset inventories.

What gets less attention are the everyday tools people use to actually get work done.

PDF readers. Compression utilities. Remote access clients. Word processors. Spreadsheet tools. Email clients. Browsers. Screen sharing software. Update managers. The background software that quietly powers normal business activity.

Most organizations do not spend much time debating whether to deploy these. They are simply part of operating in a digital economy. Contracts arrive as PDFs. Finance works in spreadsheets. HR reviews resumes. IT supports users remotely. Executives live in email and browsers. These tools become part of the environment almost by default.

Advertisement

At Action1, where visibility into third-party software exposure across endpoints is a daily focus, these background tools consistently emerge as a defining part of the real-world attack surface.

That commonness is what makes them attractive targets from a threat actor’s perspective.

The value of being ordinary

From the outside, modern enterprises look different. Networks vary. Architectures change. Security stacks evolve. But, inside most environments, the same classes of applications appear again and again, and more often than not, the same software titles dominate the majority of installations.

It is difficult to function in modern business without an email client, document processing software, a browser, and tools for packaging, previewing, and sharing files. Using similar products is less about preference and more about compatibility.

Advertisement

Business depends on exchanging information in formats everyone else can use. Without those standards, we go back to the days of file-format wars, “I cannot open that, we use something else,” and lost time just trying to make data usable. That friction is why the industry standardized, and why the same major names still dominate.

Attackers pay attention to that.

Rather than predicting every custom application an organization might run, they look for overlap. If a vulnerability appears in a widely used PDF engine, spreadsheet parser, email preview component, or remote access utility, the chances it connects with something real are high. The exploit is aimed less at unique architecture and more at familiarity.

Most successful exploitation does not rely on exotic techniques. It relies on muscle memory. Users open PDFs, Word files, spreadsheets, and links all day long. Attackers are betting those actions feel routine enough that nobody hesitates.

Advertisement

That familiarity shapes how campaigns are built, and it should influence how defense strategies are planned.

Good thing Action1 does it for you, now on Linux too—alongside Windows, macOS, and third-party apps.

One platform. Zero infrastructure. Real-time visibility. Finally, patching that just works.

See it in action »

How probability shapes attacks

Many attacks historically looked like guesswork. An attacker might send a crafted email for Outlook, hoping the recipient uses Outlook. Or attach a weaponized spreadsheet, hoping Excel is present. Or send a malicious PDF, hoping the reader is vulnerable.

Advertisement

There is uncertainty in that approach. The exploit launches before the attacker truly knows what exists on the other end. This increases chances the attack will be detected before being effective, and it risks valuable exploit code to failure, where it may be detected, profiled, then henceforth scanned and detected.

What changes with common utilities is the probability curve.

Email clients, browsers, word processors, spreadsheets, PDF readers, and archive tools appear in most business environments because the work itself requires them. An attacker does not need perfect information to expect something compatible nearby.

Instead of treating exploitation as a one-off guess, attackers think in likelihood. They invest effort where overlap is largest. The more widespread the tool, the more attractive it becomes as an entry point.

Advertisement

That is why vulnerabilities in these utilities move quickly through exploit ecosystems. Once something works in a familiar toolchain, it scales. If one user relies on Outlook, Word, and Adobe, there is a good chance coworkers and business relations do as well for interoperability reasons.

Automated detection and remediation of critical vulnerabilities in third-party applications.
Figure 1: Automated detection and remediation of critical vulnerabilities in third-party applications.

The standard business footprint in practice

These tools also travel together.

If an email clearly originated from Outlook, it already hints at part of the environment. Email workflows connect to document workflows. If Outlook is present, Word and Excel are often nearby.

Each utility reinforces the presence of others.

For attackers, that enables paths rather than isolated exploits. An issue in an email client connects to attachment handling, preview engines, document renderers, shared libraries, and integrations that tend to coexist on the same system.

Advertisement

Instead of targeting a single application, the attack surface starts to resemble the business footprint itself, the collection of tools people rely on every day.

When vulnerabilities appear in that footprint, they attract more attention because they fit naturally into how people already work.

Quiet signals and small leaks

Another part of the story is information people do not realize they share.

Documents often contain metadata. PDFs reference the engine that produced them. Spreadsheets carry formatting behavior tied to specific suites. Email headers expose client details. Browser traffic advertises user agents. File structures reveal habits and versions.

Advertisement

A single attachment, email, or shared document can quietly describe parts of the software stack behind it.

In isolation it does not look sensitive. Often it is not even visible. Over time it builds a picture of what tools are common, what standards they follow, and how files are processed.

What created it, what version, how recently, so when old software details show in current workflows, the software processing it is old. And old software often means years of exploit potential bottled up in one package. That is often what turns speculation into precision.

Those breadcrumbs help attackers shape payloads that align with what exists on the other side, increasing effectiveness while reducing noisy experimentation.

Advertisement

Why third-party software drifts

Most enterprises put real effort into operating system patching. Update pipelines are understood. Browsers update often. Mobile devices follow management policies. Systems start with baselines and are monitored.

Third-party utilities live differently.

Vendors ship different installers. Some auto-update. Some rely on users. Some get disabled by packaging systems. Some stay frozen because workflows depend on a version.

Over time, multiple builds of the same tool spread across endpoints. Some become stale. Some live for years with known vulnerabilities simply because they fell off the radar.

Advertisement

In Action1’s analysis of enterprise environments, it is common to find multiple versions of the same third-party application coexisting, some lagging years behind current security fixes. This fragmentation quietly accumulates exploit potential without triggering obvious alerts.

From a security view, that drift matters because attackers do not need new exploits. They benefit from whatever version still exists somewhere in the footprint. A five-year-old PDF reader quietly carries five years of cumulative exploit potential.

What feels like small technical debt widens the opportunity window for major exploitation.

Trust and everyday behavior

There is also a human side to these tools.

Advertisement

Email, documents, browsers, and archives feel like infrastructure. People trust them like desks and keyboards. Opening a PDF does not feel like running code. Previewing an email does not feel like execution. Extracting a file feels routine.

By the time behavior looks unusual, the initial interaction already happened in a place people rarely question. These actions occur thousands of times a day, which makes tracing a compromise back to a document, email, or user extremely difficult.

Secure, scalable patch management across Windows, macOS, and third-party apps, with compliance reporting and 200 forever-free endpoints.
Figure 2: Secure, scalable patch management across Windows, macOS, and third-party apps, with compliance reporting and 200 forever-free endpoints.

Looking at the footprint, not just the platform

For leadership teams, the value here is perspective, not fear.

Security strategies often start with the platform layer, operating systems, networks, identity, cloud infrastructure. Those matter, but they do not tell the full story of how work actually happens.

Work happens in email clients, spreadsheets, PDFs, browsers, archive tools, and remote sessions. That is where files open, previews render, links get clicked, and data moves between people.

Advertisement

That makes them predictable.

That is why third-party patching often carries more risk weight than expected. The operating system may be tightly managed, while the tools on top quietly define real exposure.

Looking at the footprint is less about assuming weakness and more about understanding where everyday work intersects with real security concerns.

A quieter way to think about patching

Third-party patching often feels operational rather than strategic. Yet these utilities sit at the intersection of people, files, and execution.

Advertisement

They are ordinary, and that is exactly why they matter.

Not because every organization looks the same, but because they look similar enough that attackers design around that similarity.

When teams examine environments, the focus is usually infrastructure. There is also value in asking what the standard business suite looks like across endpoints, how it evolves, and how consistently it stays current.

Which tools are actually needed? Which are simply part of a default deploy? Which stay installed even when unused? Which stop getting updated because nobody notices them?

Advertisement

This is why, in practice, teams working with platforms like Action1 consistently see third-party patching deliver a greater reduction in real-world risk than many more visible security controls. Exploitation rarely hinges on a single overlooked vulnerability. It is enabled by years of accumulated drift across third-party applications that quietly fall out of date while remaining embedded in everyday workflows.

Those conditions exist long before an exploit is written or deployed. They shape the practical attack surface by defining which software actually executes, which files get opened, and which actions feel routine enough to avoid scrutiny.

Third-party software is not adjacent to the platform — it is part of how the platform operates, and it is often where exposure concentrates when everything else appears well-managed.

Action1is a founder-led company, brought to you by the original minds behind Netwrix. At the time of this writing, it is one of the fastest-growing private software companies in the US because organizations are recognizing that OS and third-party patching can no longer be treated as a secondary task.

Advertisement

Addressing modern risk requires continuous visibility into third-party software and the ability to remediate vulnerable applications across endpoints quickly and consistently. When teams evaluate modern patch management solutions, Action1 increasingly represents the option designed around that reality.

Activate your first 200 free endpoints and see how effective patch management can transform your team’s security posture.

Sponsored and written by Action1.

Advertisement

Source link

Continue Reading

Tech

Color Mixing Spray Paint On The Fly

Published

on

One of the problems with being a graffiti artist is that you have to carry around a different spray can for each color you intend to use. [Sandesh Manik] decided to solve this problem by building a rig that can produce a wider range of colors by mixing the paint from several cans at once. Check it out in the video below.

The project is called Spectrum. It uses four off-the-shelf spray paint cans—colored red, blue, yellow, and white—and mixes them to create a wider range of colors. All four cans are hooked up to a single output nozzle via a nest of tubing and a four-to-one tube manifold.  Key to controlling the flow of paint is a custom device which [Sandesh] calls the “rotary pinch valve,” with one fitted to the feed line coming from each spray can. These valves use a motor-driven lever to pinch a plastic tube shut, allowing them to control the paint flow. This design keeps the mechanism and paint completely separate, which was important to stop paint from fouling the valves in short order. It also prevents backflow, which keeps the paint going towards the outlet and prevents ugly messes. By quickly actuating the valve, the paint flow from each can is modulated to mix various colors as desired.

The mixing valves are under the command of an Arduino Nano. The microcontroller reads a series of knobs to select the amount of each component color to mix, and displays relevant information on a screen. Then, when a pushbutton is pressed, the valves are actuated to spit out the right amount of each paint from the atomizer nozzle. [Sandesh] went so far as to include an advanced “gradient” mode, where a force-sensitive button allows the device to transition smoothly from one color to another depending on how hard the button is pushed.

Advertisement

It’s a neat concept which we’d love to see explored further, perhaps with a more traditional selection of CMYK paints rather than the more unusual red, yellow, blue, and white. We’ve also seen some fun spray paint projects before, like this neat wall-mount plotter. Video after the break.

Advertisement

Source link

Continue Reading

Tech

This is the World’s First and Only Bugatti W16 Mistral La Perle Rare

Published

on

Bugatti W16 Mistral La Perle Rare Reveal
The Bugatti W16 Mistral ‘La Perle Rare’, the last of a vanishing breed, marks the end of an era defined by raw mechanical power and an obsessive quest of perfection. There are only 99 of these Mistrals in total, and each starts at over €5 million. ‘La Perle Rare’, on the other hand, is a handmade unique that will cost a little more than $8-9 million.



It all began at the 2023 Pebble Beach Concours d’Elegance, when a client commissioned Bugatti to produce something absolutely special. Over time, the client and Jascha Straub, the guy in charge of Bugatti’s bespoke business, came up with proposals ranging from a silver tint to numerous shades of white before settling on something that seemed to capture the essence of light. The project began in August 2023, and we can safely assume that the designers in Berlin and engineers in Molsheim worked long hours on it.


LEGO Technic Bugatti Chiron Pur Sport Hypercar Building Toy for Boys & Girls – Sports Car Toy W/Realistic…
  • HIGH SPEED THRILLS – Kids construct an authentic race car with the LEGO Technic Bugatti Chiron Pur Sport Hypercar (42222) building toy for boys and…
  • REALISTIC FEATURES & FUNCTIONS – Young builders can steer using the knob on top, explore the W16 engine, and open the doors and hood to discover…
  • VIBRANT BUGATTI DESIGN – This hypercar model features the eye-catching orange bodywork and black design inspired by the real Bugatti Chiron Pur…

Bugatti W16 Mistral La Perle Rare
The exterior of ‘La Perle Rare’ is a true show-stopper, with a two-tone color scheme that separates the vehicle into two distinct areas. The top area is a warm color tinged with gold and iridescence, as well as a sprinkle of metallic particles that sparkle beautifully. The second part is a sophisticated, warm white color. Getting the separating lines between the colors just right required a lot of precision. Even the wheels received special treatment, resulting in stunning diamond-cut rims painted in the interior color of the vehicle, which is an understatement given that the wheels are coated in a custom paint combination that matches the exact colors of gold and white. The end result is a car that shines like a rare gem while maintaining the original Mistral design.

Bugatti W16 Mistral La Perle Rare
Rembrandt Bugatti’s famed Dancing Elephant sculpture is featured in a few of the car’s more subtle details, like the gear selector, body panels behind the front wheels, and even the headrests. To add a personal touch, the name ‘La Perle Rare’ is stitched in the center tunnel, stamped on the engine cover, and painted on the active rear wing. These little details return the automobile to Bugatti’s artistic roots.

Bugatti W16 Mistral La Perle Rare Interior
Bugatti W16 Mistral La Perle Rare Interior
Bugatti W16 Mistral La Perle Rare Interior
Inside ‘La Perle Rare,’ the cabin takes on an entirely new level of brightness, a luminous continuation of the outer motif that is difficult to describe. Every visible piece of carbon fibre has been coated white to give it a jewel-like appearance. Door panels feature alternating white and warm gold lines that look lovely on their sculpted, concave surfaces. The ambient lighting has just the right amount of warmth to it, highlighting the interplay between light and material. The steering wheel, center console clocks, and door handles are all machined and polished aluminum, with each meant to catch reflections in a particularly stunning way.

Bugatti W16 Mistral La Perle Rare
The power comes from the same quad-turbocharged 8.0-litre W16 engine found in all Mistrals. It’s not exactly small in any way, with 1,579 horsepower and 1,600 Nm of torque, it can go from 0 to 62 in 2.4 seconds, 0 to 124 in 5.6 seconds, and 0 to 186 in 12.1 seconds, and all of that power is sent to all four wheels via a seven-speed dual clutch transmission. Top speed? The record for the fastest open-top production car is already in the records, 282 mph and all, thanks to this car, but, for obvious reasons, you won’t be able to get it up to that sort of speed on the road, closer to 236 mph if you want to play it safe.
[Source]

Source link

Advertisement
Continue Reading

Tech

AI for New Physics: AI Looks Beyond the Standard Model

Published

on

In the time it takes you to read this sentence, the Large Hadron Collider (LHC) will have smashed billions of particles together. In all likelihood, it will have found exactly what it found yesterday: more evidence to support the Standard Model of particle physics.

For the engineers who built this 27-kilometer-long ring, this consistency is a triumph. But for theoretical physicists, it has been rather frustrating. As Matthew Hutson reports in “AI Hunts for the Next Big Thing in Physics,” the field is currently gripped by a quiet crisis. In an email discussing his reporting, Hutson explains that the Standard Model, which describes the known elementary particles and forces, is not a complete picture. “So theorists have proposed new ideas, and experimentalists have built giant facilities to test them, but despite the gobs of data, there have been no big breakthroughs,” Hutson says. “There are key components of reality we’re completely missing.”

That’s why researchers are turning artificial intelligence loose on particle physics. They aren’t simply asking AI to comb through accelerator data to confirm existing theories, Hutson explains. They’re asking AI to point the way toward theories that they’ve never imagined. “Instead of looking to support theories that humans have generated,” he says, “unsupervised AI can highlight anything out of the ordinary, expanding our reach into unknown unknowns.” By asking AI to flag anomalies in the data, researchers hope to find their way to “new physics” that extends the Standard Model.

On the surface, this article might sound like another “AI for X” story. As IEEE Spectrum’s AI editor, I get a steady stream of pitches for such stories: AI for drug discovery, AI for farming, AI for wildlife tracking. Often what that really means is faster data processing or automation around the edges. Useful, sure, but incremental.

Advertisement

What struck me in Hutson’s reporting is that this effort feels different. Instead of analyzing experimental data after the fact, the AI essentially becomes part of the instrument, scanning for subtle patterns and deciding in real time what’s interesting. At the LHC, detectors record 40 million collisions per second. There’s simply no way to preserve all that data, so engineers have always had to build filters to decide which events get saved for analysis and which are discarded; nearly everything is thrown away.

Now those split-second decisions are increasingly handed to machine learning systems running on field-programmable gate arrays (FPGAs) connected to the detectors. The code must run on the chip’s limited logic and memory, and compressing a neural network into that hardware isn’t easy. Hutson describes one theorist pleading with an engineer, “Which of my algorithms fits on your bloody FPGA?”

This moment is part of a much older pattern. As Hutson writes in the article, new instruments have opened doors to the unexpected throughout the history of science. Galileo’s telescope revealed moons circling Jupiter. Early microscopes exposed entire worlds of “animalcules” swimming around. These better tools didn’t just answer existing questions; they made it possible to ask new ones.

If there’s a crisis in particle physics, in other words, it may not just be about missing particles. It’s about how to look beyond the limits of the human imagination. Hutson’s story suggests that AI might not solve the mysteries of the universe outright, but it could change how we search for answers.

Advertisement

From Your Site Articles

Related Articles Around the Web

Source link

Advertisement
Continue Reading

Tech

The Long Afterlife Of The Console Modchip

Published

on

For a late-1990s engineer with good soldering skills, many a free pint of beer could be earned by installing modchips on the game consoles of the day. Modchips were usually a small microcontroller connected with a few wires to selected pins on the chips or pads on the board that masked or overrode the copy protection and region locking. This scene was brought back for us by a recent [Modern vintage gamer] video looking at the history of console hardware mods, and it’s worth a watch (see the video, below).

The story starts in 1996 with the original PlayStation, largely the source of those free pints for a nascent Hackaday scribe back in the day. Along the way, as he expands the story, we find other memories, for example, the LPC bus-based hijacks of the first XBox console, and the huge modding scenes on both that machine and Sony’s PS2. The conclusion is that this community left its mark on today’s consoles even though the easy hardware hacks may be a thing of the past on the latest hardware, and as past Hackaday articles can attest, jailbreaking older consoles still has a way to go.

In the early days, our recollection is that the PlayStation modchips were driven by the region locking rather than piracy, for the simple reason that Sony used 80-minute ISOs which wouldn’t fit on the then-available consumer 74-minute CD-R. We also remember them being used by people who couldn’t afford a blue debuugging PlayStation,. or the rare black developer model.

Advertisement

Source link

Advertisement
Continue Reading

Tech

iPad Pro with vapor chamber cooling will wait until early 2027

Published

on

Consumers can expect a long wait for the next version of the iPad Pro, but the 2027 refresh will get vapor chamber cooling, not a major revamp in design.

Hands using a stylus to digitally paint a colorful futuristic city street with neon signs and traffic barriers on a tablet resting on a wooden desk
iPad Pro

While Apple is set to make a number of product announcements within days, the iPad Pro won’t be among them. Instead, you’re going to be waiting until early 2027 for the next iteration.
Writing in Bloomberg’s “Power On” newsletter on Sunday, Mark Gurman answers a query about the next iPad Pro and when it will launch. In his response, he tempers expectations of an imminent update, providing a more realistic outlook for the tablet line.
Rumor Score: 🤔 Possible
Continue Reading on AppleInsider | Discuss on our Forums

Source link

Continue Reading

Tech

Samsung TVs to stop collecting Texans’ data without express consent

Published

on

Samsung

Samsung and the State of Texas have reached a settlement agreement over the alleged unlawful collection of content-viewing information through its smart TVs

As part of the agreement, the TV manufacturer will revise its privacy disclosures to clearly explain its data collection and processing practices to consumers.

Last December, Texas Attorney General Ken Paxton filed a lawsuit against several TV manufacturers, including Samsung, alleging that they use Automated Content Recognition (ACR) technology to collect and process viewing data without first obtaining their express, informed consent.

In January, Texas obtained a short-lived temporary restraining order (TRO) against Samsung to stop the unlawful collection of consumer data in the state, confirming a violation of the Texas Deceptive Trade Practices Act (DTPA).

Advertisement

Although the order was vacated on the following day, the lawsuit remained active.

The allegations against Samsung were that it uses ACR technology to capture screenshots of consumers’ TVs to determine what they’re watching. The South Korean tech giant would use this information for targeted advertising.

In support of the TRO, the Court found that there was “good cause to believe” that Samsung automatically enrolled customers in this system using “dark patterns” that included “over 200 clicks spread across four or more menus for a consumer to read the privacy statements and disclosures.”

In a statement to BleepingComputer, Samsung stated that, while it does not agree that its Viewing Information Services (VIS) system violated any regulations, it has agreed to “make enhancements to further strengthen our privacy disclosures.”

Advertisement

“While we maintain our original television privacy policy and notices followed existing Texas state regulations, as a trusted brand, Samsung is proud to be at the forefront of protecting consumer privacy and security,” stated a spokesperson of Samsung Electronics America.

“The settlement affirms what Samsung has said since this lawsuit was filed – Samsung TVs do not spy on consumers. In fact, Samsung allows you to control your privacy – and change your privacy settings at any time.”

“As part of the agreement, Samsung must halt any collection or processing of ACR viewing data without obtaining Texas consumers’ express consent,” announced Texas AG Ken Paxton.

“Additionally, it compels Samsung to promptly update its smart TVs and implement disclosures and consent screens that are clear and conspicuous to ensure that Texans can make an informed decision regarding whether their data is collected and how it’s used.”

Advertisement

Paxton commended Samsung for agreeing to implement consumer safeguards, while he underlined that others haven’t moved with a similar fervor as of yet.

Smart TV manufacturers, including Sony, LG, Hisense, and TCL Technologies, have not made any changes in response to the lawsuits yet.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

CISA warns that RESURGE malware can be dormant on Ivanti devices

Published

on

CISA warns that RESURGE malware can be dormant on Ivanti devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released new details about RESURGE, a malicious implant used in zero-day attacks exploiting CVE-2025-0282 to breach Ivanti Connect Secure devices.

The update focuses on the implant’s undetected latency on the appliances and its “sophisticated network-level evasion and authentication techniques” that enable covert communication with the attacker.

CISA originally documented the malware on March 28 last year, saying that it can survive reboots, create webshells for stealing credentials, create accounts, reset passwords, and escalate privileges.

According to researchers at incident response company Mandiant, the critical CVE-2025-0282 vulnerability was exploited as a zero-day since mid-December 2024 by a threat actor linked to China, tracked internally as UNC5221.

Advertisement

Network-level evasion

CISA’s updated bulletin provides additional technical information on RESURGE, a malicious 32-bit Linux Shared Object file named libdsupgrade.so that was extracted from a compromised device.

The implant is described as a passive command-and-control (C2) implant with rootkit, bootkit, backdoor, dropper, proxying, and tunneling capabilities.

Instead of beaconing to the C2, it waits indefinitely for a particular inbound TLS connection, evading network monitoring, CISA says in the updated document.

When loaded under the ‘web’ process, it hooks the ‘accept()’ function to inspect incoming TLS packets before they reach the web server, looking for specific connection attempts from a remote attacker that are identified using the CRC32 TLS fingerprint hashing scheme.

Advertisement

If the fingerprint does not match, traffic is directed to the legitimate Ivanti server. CISA further details Rusrge’s authentication mechanism saying that the threat actor also uses a fake Ivanti certificate to ensure that they are interacting with the implant and not the Ivanti web server.

The agency highlights that the certificate’s purpose is just to for authentication and verification purposes, as it is not used to encrypt communication. Furthermore, the fake certificate also helps the actor evade detection by impersonating the legitimate server.

Because the forged certificate is sent unencrypted over the internet, CISA says that defenders could use it as a network signature to detect an active compromise.

After fingerprint validation and authentication with the malware, the threat actor establishes secure remote access to the implant using a Mutual TLS session encrypted with the Elliptic Curve protocol.

Advertisement

“Static analysis indicates the RESURGE implant will request the remote actors’ EC key to utilize for encryption, and will also verify it with a hard-coded EC Certificate Authority (CA) key,” CISA says.

By mimicking legitimate TLS/SSH traffic, the implant achieves stealth and persistence, the American cybersecurity agency says.

Another file analyzed is a variant of the SpawnSloth malware using the name liblogblock.so and contained by the RESURGE implant. Its main purpose is log tampering to hide malicious activity on compromised devices.

A third file that CISA analyzed is dsmain, a kernel extraction script that embeds the open-source script ‘extract_vmlinux.sh’ and the BusyBox collection of Unix/Linux utilities.

Advertisement

liblogblock.so - 3526af9189533470bc0e90d54bafb0db7bda784be82a372ce112e361f7c7b104
libdsupgrade.so - 52bbc44eb451cb5e16bf98bc5b1823d2f47a18d71f14543b460395a1c1b1aeda
dsmain - b1221000f43734436ec8022caaa34b133f4581ca3ae8eccd8d57ea62573f301d

It allows RESURGE to decrypt, modify, and re-encrypt coreboot firmware images and manipulate filesystem contents for boot-level persistence.

“CISA’s updated analysis shows that RESURGE can remain latent on systems until a remote actor attempts to connect to the compromised device,” the agency notes. Because of this, the malicious implant “may be dormant and undetected on Ivanti Connect Secure devices and remains an active threat.”

CISA suggests that system administrators use the updated indicators of compromise (IoCs) to discover dormant RESURGE infections and remove them from Ivanti devices.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Advertisement

Source link

Continue Reading

Tech

Anthropic’s Claude rises to No. 1 in the App Store following Pentagon dispute

Published

on

Anthropic’s chatbot Claude seems to have benefited from the attention around the company’s fraught negotiations with the Pentagon.

As first reported by CNBC, Claude has been rising to the top of the free app rankings in Apple’s US App Store. On Saturday evening, it overtook OpenAI’s ChatGPT to claim the number one spot, a position that it still held on Sunday morning.

According to data from SensorTower, Claude was just outside the top 100 at the end of January, and has spent most of February somewhere in the top 20. It’s climbed rapidly in the past few days, from sixth on Wednesday, then fourth on Thursday, then first on Saturday.

A company spokesperson said that daily signups have broken the all-time record every day this week, free users have increased more than 60% since January, and paid subscribers have more than doubled this year.

Advertisement

After Anthropic attempted to negotiate for safeguards preventing the Department of Defense from using its AI models for mass domestic surveillance or fully autonomous weapons, President Donald Trump directed federal agencies to stop using all Anthropic products and Secretary of Defense Pete Hegseth said he’s designating the company a supply-chain threat.

OpenAI subsequently announced its own agreement with the Pentagon, which CEO Sam Altman claimed includes safeguards related to domestic surveillance and autonomous weapons.

This post was first published on February 28, 2026. It has been updated to reflect Anthropic reaching No. 1, and to include growth numbers from the company.

Techcrunch event

Advertisement

San Francisco, CA
|
October 13-15, 2026

Source link

Advertisement
Continue Reading

Tech

The Wild Way Early Drivers Filled Up Their Cars Before Gas Stations Existed

Published

on





In the not-so-distant past, cars weren’t as commonplace as they are today. Naturally, this also means that the now-essential elements of widespread car travel, like highways and mechanics, weren’t around yet. The gas station, which is a building on just about every corner in the modern era, was no exception. Way back in the late 1800s, early drivers had to pay a visit to their local pharmacy to purchase cans of fuel. One had to pour the fuel from the cans into their vehicle to get it running.

The most famous instance of filling up a vehicle using pharmacy supplies was in 1888, when Bertha Benz, the wife of automobile pioneer Carl Benz, drove from Mannheim to Pforzheim, Germany, in the Benz Patent-Motorwagen, the first car ever invented. Early on in her trip, she made her first benzene refueling stop at the Stadt-Apotheke pharmacy in Wiesloch, giving it the historical distinction of being the world’s first filling station. So began the trend of pharmacies providing drivers with their much-needed vehicle fuel.

Of course, in the over a century since Bertha’s historic trip, car refueling has changed. In fact, it didn’t take long after her landmark drive for the first thing we recognize as a gas station to be established, making pharmacy refueling nothing more than a historical footnote.

Advertisement

It didn’t take long for true gas stations to appear

In the years following Bertha Benz’s drive, cars became more and more popular. Thus, a better way to fuel up was needed, and in the United States, the answer came in the year 1905. That year saw the establishment of the world’s first designated filling station, which opened for business in St. Louis, Missouri, and allowed folks to drive up and purchase fuel without having to get it by the canister. At the same time, it has also been claimed by Standard Oil that the real first gas station was opened two years later in 1907. This station pumped gasoline directly into cars from a massive tank.

These systems worked well enough, but there was still some evolution to be done to get use to the gas stations we know today. Less than a decade later, in 1913, Gulf Refining Company opened the doors to its first drive-up gas station. Located in Pittsburgh, Pennsylvania, on the corner of Baum Boulevard and St. Clair Street, this station also offered free air, water, crankcase service, and tire and tube installation. This extensive service is just one of the many reasons why the gas stations of yesteryear are considered better than those in operation today.

Advertisement

Over the past century-plus, gas stations have come a long way. Even with their flaws, and the comparatively high price of modern gas, the current setup is certainly a far and away improvement on the old pharmacies that early drivers had to work with.



Advertisement

Source link

Continue Reading

Trending

Copyright © 2025