Just over a year ago, OpenAI co-founder Andrej Karpathy coined the term “vibe coding” and it’s exactly what it sounds like. In a post on X, he wrote that it’s where “you fully give in to the vibes, embrace exponentials, and forget that the code even exists.”
Tech
5 Tech Tips To Keep Your Work Private And Personal Data Safe
It’s often said that those with nothing to hide have nothing to fear, but we now live in a world where that attitude has a chance of upending your life. With hackers, identity thieves, rogue nation-states, data-hungry tech companies, and AI agents on the loose, information that would normally be innocuous can become a devastating weapon against you or your loved ones. Moreover, if an attacker steals company data you were responsible for, it could result in massive losses for your employer and the termination of your employment.
You’ve probably heard about some of the usual threats: suspicious emails that could be phishing attempts, pop-ups that claim your device is hacked, and so on. You’ve been told to change your passwords regularly and not to use the same one with multiple accounts. Many corporate workers have had details about these sorts of attacks and security reminders drilled into them through company training.
But cybersecurity is an infinitely deep rabbit hole, and there are many more things you can do to keep your data private and safe as you work. Half of the battle is knowledge. You can’t fight back unless you know what you’re up against. So, from locking down your accounts and devices to practicing good digital hygiene, here are five tips that will leave you better equipped to deal with digital threats, keeping your work private and personal data safe.
Use passkeys, not passwords, where possible
Passwords have never been the best way to keep our digital lives secure, but we’ve been stuck with them out of necessity. They force us to choose between convenience and security. Do you use the same password for everything and risk having your entire digital life stolen when a single account is exposed, or do you set unique, complex passwords for each of your accounts and risk losing access when you inevitably forget one? Password managers have stepped in to fill that gap, remembering unique passwords so you don’t have to, but that just makes your password manager an attractive target for hackers.
One of the most basic steps anyone can take to improve their digital privacy and security is to use passkeys instead of passwords. Passkeys store an encrypted “key” on your device. When you sign into an account, you’ll be asked to use the PIN, password, or biometric scan you normally use to unlock the device itself. Instead of remembering a hundred passwords, your computer or phone’s unlock code becomes the only thing you need. This may seem less secure, but because passkeys are tied to your specific device, the website knows you aren’t some hacker on the other side of the world. The service checks your device, and your device confirms that it’s really you.
You can already use passkeys on many commonly used accounts, including Google, Microsoft, and more. Check in the security sections of each service’s settings to make the switch. You should also pick a passkey manager to store your passkeys. Common options include 1Password, Proton Pass, NordPass, and Google Password Manager.
Use a password on your phone, not fingerprint or face unlock
When setting up the lock screen on your smartphone, you will be presented with a few options. All devices offer a password or PIN, while Android phones offer a pattern lock and often a fingerprint sensor or camera-based face unlock, and iPhones offer the three-dimensional Face ID system. However, due to legal and technical factors, the only options security-conscious users should choose are a password, PIN, or pattern. Although you must take care not to reveal your password, it cannot be forcibly extracted from you.
In the United States, police and other law enforcement officers cannot warrantlessly breach your password. That’s because the Supreme Court has ruled that a password is private knowledge protected by the Fourth Amendment, meaning that you cannot be compelled to divulge it against your will. However, the law currently does not prevent a law enforcement officer from physically forcing you to unlock your phone or other devices by forcibly pressing your thumb to the fingerprint reader or putting you in a headlock to hold your face still while Face ID scans you.
Circuit courts have ruled in opposite directions, with a 9th Circuit judge finding in 2024 that forcing a defendant’s thumb to the phone’s fingerprint reader was no different than forcibly taking his fingerprints during booking. In 2025, the D.C. Circuit ruled the opposite, finding that a January 6th insurrectionist’s rights were violated when the FBI forced him to open his phone with biometrics. Until the Supreme Court weighs in, it’s a gray area. Either way, an individual officer may not know or care what the law says. For more information, see our explainer on why you should never give the police your phone without a warrant.
Be aware of your surroundings when dealing with sensitive information
Many people worried about their digital privacy and security go to great technical lengths to lock down their devices from prying eyes, but neglect to consider threats in the physical world around them. The weak point in all digital security is the human element, and the most effective hackers are often not typing on a supercomputer from some basement. Instead, they’re using what are called social engineering attacks — in other words, chatting you up in an attempt to make you divulge the name of your first pet and the street you grew up on so they can reset your passwords, or asking you for your number so they can see you type your phone’s password.
Some attacks may not involve any interaction, but did you notice that the security camera in your favorite cafe is pointed right toward your laptop as you type in your banking credentials? What about the man seated next to you, whose wandering eyes may have taken note of the same? Of course, one easy solution for some accounts is to use passkeys in tandem with biometric authentication on your phone, eliminating the need to enter passwords. As we discussed above, biometric security can backfire if you’re ever in a tense situation with law enforcement, so it’s up to individuals to determine whether state or non-state actors are likely to present the larger threat to you.
It’s a bit crude, but a good rule of thumb when you’re unsure whether to handle sensitive information in a particular environment is to ask yourself whether you’d look at “not safe for work” content there. If the answer is no, it’s probably a good idea to wait until you’re in a more private setting.
Always update your devices to get the latest security patches
You should almost always install updates on your phone, laptop, PC, and other devices when prompted. Your devices are doing a lot of work on their own to protect you from threats. Major operating systems like Windows, macOS, Android, or iOS include multiple layers of defense that, in most cases, block the most severe threats without any work on your part. However, because of the complexity of our devices and OSes, there are always hidden vulnerabilities waiting to be discovered. In the worst case scenario, which is known as a zero-day exploit, a threat actor discovers them first and deploys them against defenseless users. In the best case, your OS vendor discovers them first and issues a security patch.
When you don’t update your phone or computer, you could lose a lot more than the five minutes it would have taken to install the latest software. Almost every system update to your devices contains at least a few security fixes, and if your OS vendor knows about those vulnerabilities, so do the bad guys. The sooner you update, the safer you’ll be. There are minor exceptions. In January, a series of bad updates wreaked havoc on Windows PCs, breaking important features and even causing boot cycle issues. Microsoft quickly released an out-of-band patch to rectify those issues, at which point responsible users finally updated. If an update is known to cause problems, you should hold off until they’re fixed.
Keep in mind that devices outside your phone and computer may need updates. Your smart TV, game console, smartwatch, wireless earbuds, and many other devices also receive occasional updates that should be applied as soon as possible.
Be cautious with Wi-Fi connections
In “The Lord of the Rings,” the corrupted wizard Saruman uses a scrying orb called a palantir to communicate with the villain Sauron. Gandalf, unaware that his old friend has succumbed to evil, warns him against using the orb, saying, “We do not know who else may be watching.” This is a particularly good metaphor for Wi-Fi, a technology nearly everyone relies on day-to-day. One of the things people aren’t taught about Wi-Fi is that it’s a two-way window. If a network is compromised, a threat actor could see everything you do and steal your most private work and personal data.
Evil twin attacks are among the most common Wi-Fi attacks, and happen most often in public areas like coffee shops, airports, and hotels, where lots of people are connected to the Wi-Fi. An attacker makes a network they control with the same name as the real network. Users may not notice that there are two networks named “Coffee Shop Guest” and connect to the fake one. Another common attack is man-in-the-middle, where an attacker positions themselves between two parties who are communicating, such as a payment vendor and a shopping site. And because Wi-Fi sends data through the air, sniffing attacks — where an attacker uses a specialized sniffing tool to intercept data packets — are also common.
You can prevent some attacks by encrypting your data, most commonly through a VPN. Because a VPN encrypts your network traffic, a network attacker will only see scrambled data if they breach a Wi-Fi network you’re connected to. However, not all VPNs are created equal, and there are plenty of shady-looking services out there. Be sure to choose one of the best VPN services to ensure that your traffic is properly anonymized.
Tech
Court Says Pentagon Can’t Pick And Choose Which News Outlets Have Access
from the five-stars-don’t-beat-one-amendment dept
This was extremely wild shit to be happening anywhere, much less in the land of the First Amendment. No sooner had Donald Trump decided it was time to rename the Department of Defense to the Department of War than the head of DoD operations decided it would be sorting news agencies by level of subservience.
Pretending this was all about national security, the Defense Department basically kicked everyone out of the Pentagon’s press office and stated that only those that chose to play by the new rules would be allowed back inside.
Booted: NBC News, the New York Times, NPR. Welcomed back into the fold: OAN, Newsmax, Breitbart. The Pentagon wanted a state-run press, but without having to do all the heavy lifting that comes with instituting a state-run press in the Land of the Free.
Somewhat surprisingly, some of those explicitly invited to partake of the new Defense Department media wing refused to participate. Fox and Newsmax decided to stay out, rather than promise they’d never publish leaked documents. Those choosing to bend the knee were those who never needed this sort of coercion in the first place: One America News (OAN), The Federalist, and far-right weirdos, the Epoch Times. In other words, MAGA-heavy breathers that have never been known for their independence, much less their journalism.
That didn’t stop Hegseth and the department he’s mismanaging from attempting to take a victory lap. And it certainly didn’t stop news agencies like the New York Times from suing over this blatant violation of the First Amendment.
It’s so obvious it only took the NYT four months to secure a win in a federal court (DC) that is positively swamped with litigation generated by Trump’s swamp. (h/t Adam Klasfield)
The decision [PDF] makes it clear in the opening paragraph how this is going to go for the administration and its extremely selective “respect” of enshrined rights and freedoms.
A primary purpose of the First Amendment is to enable the press to publish what it will and the public to read what it chooses, free of any official proscription. Those who drafted the First Amendment believed that the nation’s security requires a free press and an informed people and that such security is endangered by governmental suppression of political speech. That principle has preserved the nation’s security for almost 250 years. It must not be abandoned now.
Amen.
The court notes that in the past, there has been some friction between national security concerns and reporting by journalists. In some cases, the friction has been little more than the government chafing a bit when something has been published that it would rather have kept a secret. In other cases, leaks involving sensitive information have provoked reform efforts on both sides of the equation, seeking to balance these concerns with serving the public interest.
Up until now, any efforts to expel reporters have been limited to backroom bitching. What’s happening now, however, is unprecedented.
Historically, though, even when Department leaders disliked a journalist’s reporting, they did not consider suspending, revoking, or not renewing the journalist’s press credentials in response to that reporting. Julian Barnes, Pete Williams, and Robert Burns—reporters who have spent decades covering the Pentagon—as well as former Pentagon officials, are not aware of the Department ever suspending, revoking, or not renewing a journalist’s credentials due to concern over the safety or security of Department personnel or property or based on the content of their reporting.
This may be new, but the court isn’t willing to make it the “new normal.” It’s the decades of precedent that truly matter, not the vindictive whims of the overgrown toddlers currently holding office.
The Pentagon claims that demanding journalists agree not to “solicit,” much less print data or information not explicitly approved for release by the Defense Department doesn’t reach any further than existing laws governing the handling of classified documents. The court disagrees, noting that the new policy allows the government to conflate the illegal solicitation of classified material with the sort of soliciting — i.e., requests for information, etc. — journalists do every day in hopes of securing something newsworthy.
On top of allowing the government to punish people for things that weren’t previously considered unlawful, the demand for obeisance wasn’t created in a vacuum. Instead, it flowed directly from this entire administration’s constant attacks on the press by the president and pretty much every one in his Cabinet.
The plaintiffs are correct: “The record is replete with undisputed evidence that the Policy is viewpoint discriminatory.” That evidence tells the story of a Department whose leadership has been and continues to be openly hostile to the “mainstream media” whose reporting it views as unfavorable, but receptive to outlets that have expressed “support for the Trump administration in the past.”
The story begins prior to the adoption of the Policy, when—following extensive reporting on Secretary Hegseth’s background and qualifications during his confirmation process—Secretary Hegseth and Department officials “openly complained about reporting they perceive[d] as unfavorable to them and the Department.” Then, in the weeks and months leading up to the issuance of the Policy, Department officials repeatedly condemned certain news organizations—including The Times—for their coverage of the Department. For example, in response to reporting by The Times on Secretary Hegseth’s alleged misuse of the messaging platform Signal, Mr. Parnell posted on X to call out The Times “and all other Fake News that repeat their garbage.” Mr. Parnell decried these news organizations as “Trump-hating media” who “continue[] to be obsessed with destroying anyone committed to President Trump’s agenda.” In other social media posts leading up to the issuance of the Policy, Department officials referred to journalists from The Washington Post as “scum” and called for their “severe punishment” in response to reporting on Secretary Hegseth’s security detail.
It was never about keeping loose lips from sinking ships. It was always about cutting off access to news agencies the administration didn’t like. And once you’ve gotten rid of the critics, you’re left with the functional equivalent of a state-run media, but without the nastiness of having to disappear people into concentration camps or usher them out of their cubicles at gunpoint.
The court won’t let this stand. The new policy violates both the First Amendment and Fifth Amendment (due to the vagueness of its ban on “soliciting” sensitive information). That’s never been acceptable before in this nation. Just because there’s an aspiring tyrant leaning heavily on the Resolute Desk these days doesn’t make it any more permissible.
The Court recognizes that national security must be protected, the security of our troops must be protected, and war plans must be protected. But especially in light of the country’s recent incursion into Venezuela and its ongoing war with Iran, it is more important than ever that the public have access to information from a variety of perspectives about what its government is doing—so that the public can support government policies, if it wants to support them; protest, if it wants to protest; and decide based on full, complete, and open information who they are going to vote for in the next election. As Justice Brandeis correctly observed, “sunlight is the most powerful of all disinfectants.”
The administration will definitely appeal this decision. And it almost definitely will try to bypass the DC Appeals Court and go straight to the Supreme Court by claiming not being able to expel reporters it doesn’t like is some sort of national emergency. It will probably even claim that the fight it picked in Iran justifies the actions it took months before it decided to involve us in the nation’s latest Afghanistan/Vietnam.
But it definitely shouldn’t win. This isn’t some obscure permutation of First Amendment law. This is the government crafting a policy that allows it to decide what gets to be printed and who gets to print it. That’s never been acceptable here. And it never should be.
Filed Under: 1st amendment, defense department, dod, free speech, leaks, pete hegseth, trump administration
Companies: ny times
Tech
Congress Is Dropping The Ball With A Clean Extension Of FISA
from the mass-surveillance-winning-again dept
Two years ago, Congress passed the “Reforming Intelligence and Securing America” Act (RISAA) that included nominal reforms to Section 702 of the Foreign Intelligence Surveillance Act (FISA). The bill unfortunately included some problematic expansions of the law—but it also included a relatively big victory for civil liberties advocates: Section 702 authorities were only extended for two years, allowing Congress to continue the important work of negotiating a warrant requirement for Americans as well as some other critical reforms.
However, Congress clearly did not continue this work. In fact, it now appears that Congress is poised to consider another extension of this program without even attempting to include necessary and common sense reforms. Most notably, Congress is not considering a requirement to obtain a warrant before looking at data on U.S. persons that was indiscriminately and warrantlessly collected. House Speaker Mike Johnson confirmed that “the plan is to move a clean extension of FISA … for at least 18 months.”
Even more disappointing, House Judiciary Chair Jim Jordan, who has previously been a champion of both the warrant requirement and closing the data broker loophole, told the press he would vote for a clean extension of FISA, claiming that RISAA included enough reforms for the moment.
It’s important to note RISAA was just a reauthorization of this mass surveillance program with a long history of abuse. Prior to the 2024 reauthorization, Section 702 was already misused to run improper queries on peaceful protesters, federal and state lawmakers, Congressional staff, thousands of campaign donors, journalists, and a judge reporting civil rights violations by local police. RISAA further expanded the government’s authority by allowing it to compel a much larger group of people and providers into assisting with this surveillance. As we said when it passed, overall, RISAA is a travesty for Americans who deserve basic constitutional rights and privacy whether they are communicating with people and services inside or outside of the US.
Section 702 should not be reauthorized without any additional safeguards or oversight. Fortunately, there are currently three reform bills for Congress to consider: SAFE, PLEWSA, and GSRA. While none of these bills are perfect, they are all significantly better than the status quo, and should be considered instead of a bill that attempts no reform at all.
Mass spying—accessing a massive amount of communications by and with Americans first and sorting out targets second and secretly—has always been a problem for our rights. It was a problem at first when President George W. Bush authorized it in secret without Congressional or court oversight. And it remained a problem even after the passage of Section 702 in 2008 created the possibility of some oversight. Congress was right that this surveillance is dangerous, and that’s why it set Section 702 up for regular reconsideration. That reconsideration has not occurred, even as the circumstances of the NSA, Justice Department, and FBI leadership, have radically changed. Reform is long overdue, and now it’s urgent.
Republished from the EFF’s Deeplinks blog.
Filed Under: congress, fisa, jim jordan, mass surveillance, section 702, surveillance
Tech
What is vibe coding? AI coding with Claude, Codex, and Gemini, explained
Since then, coders from all backgrounds — and folks with zero experience — have tapped into their vibes to make apps and websites. Vibe coding platforms, powered by AI models like Claude, Codex, and Gemini, have gained traction as a way to give normies a toolset to code whatever they want, without writing a single line of script.
Tech behemoths like Amazon and bustling Silicon Valley startups even have their coders using it. It’s doing the grunt work for now, but they say it’s opening up a whole new world of possibilities. One possibility: It takes their job. But it’s a trade-off that some of them are willing to make.
Clive Thompson wrote a book about this and spent time with over 70 vibe coders to understand how the technology is upending the industry and if this is the end of computer programming as we know it. On Today, Explained, co-host Sean Rameswaram dug into these questions and even vibe coded a simple website while doing it.
Below is an excerpt of the conversation, edited for length and clarity. There’s much more in the full podcast, so listen to Today, Explained wherever you get podcasts, including Apple Podcasts, Pandora, and Spotify.
You spent a lot of time hanging out with coders who were vibe coding. And from what I could tell from reading your piece in the New York Times Magazine is that they’re not vibe coding the same way that I was vibe coding.
No, they’re doing something that’s a lot more aggressive and ambitious. What they’re doing is they are using multiple agents, kind of swarms of agents at the same time. If they’re using Claude Code or Codex or Gemini they will have it wired into their laptops. Those agents can create files, destroy files. They can take code that’s been written, they can push it live into production in the world.
And they will also work little teams. So when they want to create a piece of software, sometimes they’ll write, like, a spec, like a page saying, “Here’s what I want to do.” Or sometimes they’ll just talk to the agent. But they’ll be kind of talking to the lead agent that’s going to be the head of the team and they’ll talk to it and say, “Here’s what I want you to do. What do you think? Give me your ideas.” And they’ll sort of go back and forth generating a plan. And when they’re confident that this top agent understands what is to be done, they’ll say, “All right. Go do it.”
And that one will spawn off several subagents. It will have one agent that’s writing code, another one that is testing the code. It’s quite wild to watch them do this. And sometimes if it does something wrong, they’ll have to yell at it. They’ll be like, “This is unacceptable.” Or they’ll say things like, you know, “This is embarrassing. You’re humiliating me.”
And I said to him, “What’s up with that? Does that language improve the sort of output of these agents?” And he was like, “I couldn’t prove it. But generally we find that when we sort of reprimand them a little bit, they become a little more reliable.”
Can you help us understand just how much time, money, human labor is being saved by vibe coding at the level that you observed?
Yeah, it can be really significant. They’re most significant when someone is building something new from scratch. The startup founders, one- or two-person, three-person shops, they’re like, “I need to get to market fast. There might be 10 other people with this idea. I got to beat them.” It’s dizzying. Some of those people were telling me that they were working 20 times faster than they would on their own. Stuff that would normally have taken them a day now takes half an hour.
But at a very large and mature company like Amazon or Google, you’ve got billions of lines of existing code and if one little part of it stops working, that could cascade through everything. So those folks are definitely using the agents, but they are less likely to be pushing stuff rapidly out. They’re more likely to be looking carefully at it and putting it through what’s known as code review, where multiple humans look at it and go, “Oh, okay, does that work?” So for them, basically it’s like a 10 percent improvement in terms of the velocity of productivity of the engineers, how fast they go from having an idea to making it happen.
And what’s really interesting, and you may have discovered this too, in your vibe coding: a lot of engineers told me that it was even less about speed than about the ability to experiment with a bunch of ideas and see which one might really work.
In the before times, you’d have an idea for a feature. Are you really going to spend six weeks developing it just to discover that it’s not really what you thought it was going to be?
Now, well, let’s just do 10 different versions of that over the next week and let’s look at all of them and then we can pick the one we want. You might not necessarily have gone faster, but the feature that you’ve got is exactly the one you wanted and you know because you held it in your hands.
A lot of tech layoffs in the past few years, and now we’re talking about how vibe coding has dramatically overturned the norms in engineering. How are developers feeling about that?
Well, here’s the thing. So there is definitely a civil war insofar as there is the majority of people that I spoke to, and I reached out to a very wide array — I talked to 75 developers.
And I actively wanted to talk to ones that didn’t like AI because I wanted to know their feelings. It’s a minority of people that are really hotly opposed, but they’re very, very strongly opposed. They don’t like the fact that these are trained on stolen materials. They don’t like the fact that it uses tons of energy. They don’t like the fact that they think it’s going to de-skill [people].
Why do you think they’re not the majority, when this is so clearly going to replace so many of them and bypass all of their ethical, moral concerns and objections?
I think it’s because for a lot of developers it’s just such a delightful experience in the short term of going from everything being a slow slog to it being like, “Oh my God, all these ideas and things I wanted to do, I can now try them and do them.”
Because it’s fun, basically.
It’s enormously fun. The pleasure of coding used to be that there were a lot of these little wins when you got something working. Those little wins have gone away because you’re not doing that bug fixing, you’re not doing that line writing.
So the big wins are just coming in avalanches and it’s very intoxicating. Also, there are ones who essentially don’t think that those bad labor things are going to obtain. They think there’s a potential that more [jobs] will get created in areas that they have previously been unable to be created.
Give it five years for us. Does this harken the end of computer programming as we know it?
No, I would not go so far as to say that it ends in five years. I do think it becomes something very different potentially. I still think — everyone told me, and I believe — that you still need some understanding of the way a code base works to do the complicated things.
Weirdly, what you might see is something a little different, which is the explosion of code in areas where there is currently none. There’s a bazillion people out there that are code-adjacent. You work in accounting, you are a wizard at Excel, and you can import data if you’re given the ability now to have an agent say, “Okay, could you bring more data in?”
There is going to be this really weird world where there’s a lot of customized software for an audience of two, three people. We have thought of software historically as something that only exists if 10,000 people or a million people want it because it costs a lot of money to make it.
But if you can now start making it for next to nothing, you can start using it the way that we use Post-it notes. Put it all over the place. I need to jot this idea down. I’m going to make this happen. And maybe this software solves one problem for this afternoon and we never use it again. Software starts becoming almost disposable.
Tech
Orico HS500 MetaBox Pro 5 NAS review – Good hardware, badly let down by software
The Orico HS500 MetaBox Pro is a five-bay NAS with good hardware, but unless you like taking apart the hardware to install third-party software, there are better options for Apple owners.

Orico HS500 MetaBox Pro
Network-attached storage (NAS) is more than its hardware, and the number of bays it has. It’s simply not possible for anyone to just buy a NAS without having to check out what other features it can do beyond just storage.
With AI becoming a hot topic in tech, it’s also becoming part of more onboard features.
Continue Reading on AppleInsider | Discuss on our Forums
Tech
Our Favorite Budget Earbuds Are Literally $19
Looking for an inexpensive pair of earbuds to toss in your gym bag? You can snag our favorite budget wireless earbuds, the JLab Go Pop ANC, for a shockingly low $19 on Amazon, an $11 markdown from their usual price. Don’t let the cost fool you, these earbuds have surprised multiple WIRED writers with their clear sound, water resistance, and ANC performance.
These earbuds have all the features you’d expect from a pair five times the price. They sport IP55 water and dust resistance, perfect for a sweaty trip to the gym or a long run on the beach, and multipoint pairing in case you want to use them for a quick call on your laptop. The included app has an adjustable equalizer, something not even all expensive earbuds can claim, plus programmable controls in case you don’t like the default button layout. Battery life is even pretty decent for the category, with eight hours of juice in the buds and up to 32 hours total with the included charging case.
When you’ve got the tunes going, the JLab Go’s active noise-canceling is surprisingly effective, easily tuning out the hum of an HVAC system and other annoyances. Like other ANC-capable earbuds, they also come equipped with a transparency mode for letting in important sounds, and it works surprisingly well given how little these earbuds cost. You might want to consider something more serious for your next long-haul flight, but these work in a pinch for some yard work or a quick workout.
If you’re sold on a pair of these extra inexpensive earbuds, you can swing over to Amazon to grab the JLab Go Pop ANC in fuchsia for $19. While most of the other colors were listed for their full $30 price, which is still a steal by the way, you can also grab the transparent neon green or transparent teal for just $20, which may be worth the dollar depending on your aesthetic preferences. For more upgraded picks, check out our guide to the best wireless earbuds, with hand-tested picks by WIRED writers.
Tech
JAAQ raises $17M to embed clinically governed mental health content
The London-based platform, which already covers 1.5 million eligible lives across enterprise and healthcare deployments, is using the Series A to accelerate US market entry and deepen its clinical infrastructure, with a new CEO who sold his last company to Adobe.
JAAQ, the London-based digital health engagement platform, has raised $17 million in a Series A round. The investment comes from Meridian Health Ventures, Fuel Ventures, Bolt Angels, and Guinness Ventures, with the capital allocated to scaling enterprise partnerships, deepening clinical infrastructure, and expanding into the United States. Dr. Pooja Sikka, a partner at Meridian Health Ventures, has joined the company’s board as part of the deal.
The company was founded in 2021 with a direct-to-consumer model built around video-based mental health content. It has since pivoted to an enterprise and healthcare focus, embedding that content library, now more than 10,000 clinically reviewed videos, inside the digital products of insurers, employers, and healthcare organisations rather than distributing it to individual users.
The logic is structural: rather than asking people to seek out a mental health platform, JAAQ places its content inside the apps and services they are already using. It currently covers more than 1.5 million eligible lives through active enterprise deployments.
Alex Packham has joined as CEO to lead the company through its next phase. Packham is best known for ContentCal, a social media management SaaS platform he built and sold to Adobe in December 2021, after which he spent three years leading the product’s integration inside Adobe before departing.
The platform’s commercial proposition has two layers. Organisations can license content from JAAQ’s library and integrate it into their own product journeys, or they can licence a bespoke hosted JAAQ experience.
The company is also building infrastructure it describes as a “clinical engagement layer” for AI-native products, designed to let any digital product or team embed governed mental health content into user journeys without building the clinical governance apparatus themselves.
The pitch to enterprises is that this addresses two problems simultaneously: the mental health access gap, and low engagement with wellbeing benefits that organisations invest in but employees rarely use.
The clinical governance framing is central to how JAAQ differentiates itself from generic AI wellness tools. The platform’s content is produced within a defined clinical and creative framework, rather than generated on demand, and Johri’s appointment is intended to signal that the product is being built with clinical credibility embedded rather than bolted on.
Meridian Health Ventures, which focuses specifically on UK health tech with a pathway into the US market, is a natural fit for that positioning: the firm runs the first NHS-anchored venture fund and has a dedicated Innovations in Mental Health Fund.
The US expansion is the strategic priority the funding is designed to unlock. The UK market has provided validation, the company’s website references case studies including a UK bank that saved £896,000 in employee productivity and wellbeing improvements, and an insurer that deflected the equivalent of twelve full-time customer service roles through JAAQ-served content.
Translating that model into the US employer and health insurer market, where mental health benefits are increasingly a board-level priority but engagement remains a persistent problem, is the next test.
Tech
Grab to enter Taiwan after US$600M foodpanda acquisition
Tech
Heat Beneath the Surface: Thermal Metrology for Advanced Semiconductor Materials and Architectures
More Information
As semiconductor architectures evolve beyond classical transistor scaling into heterogeneous integration, chiplet-based design, and true 3D stacking, heat management has shifted from a secondary design consideration to a defining constraint on system performance.
At the same time, power densities continue to rise while materials and device layers become thinner, creating thermal pathways that are increasingly confined and interface-dominated. In these regimes, heat transport depends strongly on thin films, bonded interfaces, and buried layers that control vertical heat flow inside modern electronic systems.
This guide examines how semiconductor scaling, advanced packaging, and emerging materials are reshaping thermal behavior across modern devices. It explores how these architectural changes amplify the importance of thermal conductivity, thermal boundary resistance, and spatial variability, and why accurate thermal measurement is becoming essential for validating models, guiding design decisions, and ensuring reliable system operation.
Tech
The US bans all new foreign-made network routers
The Federal Communications Commission has released a notice today designating any consumer routers manufactured outside the US as a security risk. The rule states that new foreign-made product models for network routers will land on the Covered List, a set of communications equipment seen as having an unacceptable risk to national security. Previously purchased routers can still be used and retailers can still sell models that were approved by the prior FCC policies. In an exception to the usual rule, routers included on the Covered List can continue to receive updates at least through March 1, 2027, although the date could potentially be extended.
The move stems from a goal in the White House’s 2025 national security strategy that reads: “the United States must never be dependent on any outside power for core components—from raw materials to parts to finished products—necessary to the nation’s defense or economy.” The notice from the FCC states that companies can apply for conditional approval for new products from the Department of War or the Department of Homeland Security. However, that requires the businesses to provide a plan for shifting at least some of their manufacturing to the US in order to receive that conditional approval.
Few, if any, brands known for consumer-grade routers currently build products stateside. It seems likely this sweeping provision could face legal challenges from and cause confusion for the many companies that have production facilities overseas. In addition to Chinese tech giants like TP-Link, US companies will also be affected. NetGear, Eero and Google Nest are all headquartered domestically but have manufacturing in Asia. At least some of that manufacturing activity happens in regions like Taiwan that have historically been on good terms with the US. Until the sector sorts out this new restriction, don’t expect to see any new router models on store shelves.
Tech
How BYD engineered breakthrough five-minute EV charging
![]()
Earlier this month, BYD revealed that its latest Flash Chargers can deliver up to 1,500 kilowatts – roughly four times the power of the “hyper-fast” 350-kW systems common in the US. In tests, select BYD batteries charged from 10% to 70% in about five minutes and from 10% to 97%…
Read Entire Article
Source link
-
Crypto World3 days ago
NIO (NIO) Stock Plunges 6.5% as Shelf Registration Sparks Dilution Worries
-
Fashion3 days agoWeekend Open Thread: Adidas – Corporette.com
-
Politics3 days agoJenni Murray, Long-Serving Woman’s Hour Presenter, Dies Aged 75
-
Tech6 days agoAre Split Spacebars the Next Big Gaming Keyboard Trend?
-
Crypto World2 days agoBest Crypto to Buy Now: Strategy Just Spent $1.57 Billion on Bitcoin During Fear While Early Investors Quietly Enter Pepeto for 150x Potential
-
News Videos5 days agoRBA board divided on rate cut, unusually buoyant share market | Finance Report | ABC NEWS
-
Crypto World2 days agoBitcoin Price News: Bhutan Sells $72 Million in BTC Under Fiscal Pressure, but the Smart Money Entering Pepeto Sees What the Market Does Not
-
Politics6 days agoThe House | The new register to protect children from their abusers shows Parliament at its best
-
Tech4 days agoinKONBINI Lets You Spend Summer Days Behind the Register
-
Politics6 days agoReal-time pollution monitoring calls after boy nearly dies
-
Crypto World5 days agoCanada’s FINTRAC revokes registrations of 23 crypto MSBs in AML crackdown
-
Sports14 hours agoRemo Stars and Kano Pillars Strengthen Survival Hopes in NPFL
-
NewsBeat5 days agoResidents in North Lanarkshire reminded to register to vote in Scottish Parliament Election
-
News Videos5 days agoPARLIAMENT OF MALAWI – PAC MEETING WITH REGISTRAR OF FINANCIAL ON AMARYLLIS HOTEL – INQUIRY LIVE
-
Business1 day agoNo Winner in March 21 Drawing as Prize Rolls to $133 Million for Next
-
Politics4 days agoGender equality discussions at UN face pushbacks and US resistance
-
Business5 days agoWho Was Alex Pretti? 5 Key Facts About the ICU Nurse Killed by Federal Agents in Minneapolis
-
Sports13 hours agoGary Kirsten Accuses Pakistan Cricket Board Of ‘Interference’, Mohsin Naqvi Responds
-
Tech1 day agoGive Your Phone a Huge (and Free) Upgrade by Switching to Another Keyboard
-
Sports3 days ago2026 Kentucky Derby horses, odds, futures, preview, date: Expert who nailed 12 Derby-Oaks Doubles enters picks



You must be logged in to post a comment Login