Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google’s Gemini model to adapt its persistence across different devices.
In a report today, ESET researcher Lukas Stefanko explains how a new Android malware family named “PromptSpy” is abusing the Google Gemini AI model to help it achieve persistence on infected devices.
“In February 2026, we uncovered two versions of a previously unknown Android malware family,” explains ESET.
“The first version, which we named VNCSpy, appeared on VirusTotal on January 13th, 2026 and was represented by three samples uploaded from Hong Kong. On February 10th, 2026, four samples of more advanced malware based on VNCSpy were uploaded to VirusTotal from Argentina.”
First known Android malware to use generative AI
While machine learning models have previously been used by Android malware to analyze screenshots for ad fraud, ESET says that PromptSpy is the first known case of Android malware integrating generative AI directly into its execution.
Advertisement
On some Android devices, users can “lock” or “pin” an app in the Recent Apps list by long-pressing it and selecting a lock option. When an app is locked this way, Android is less likely to terminate it during memory cleanup or when the user taps “Clear all.”
For legitimate apps, this prevents background processes from being killed. For malware like PromptSpy, it can serve as a persistence mechanism.
However, the method used to lock or pin an app varies between manufacturers, making it hard for malware to script the right way to do so on every device. That is where AI comes into play.
PromptSpy sends Google’s Gemini model a chat prompt along with an XML dump of the current screen, including the visible UI elements, text labels, class types, and screen coordinates.
Advertisement
PromptSpy sending an LLM prompt to Google Gemini Source: ESET
Gemini then responds with JSON-formatted instructions describing the action to take on the device to pin the app.
The malware executes the action through Android’s Accessibility Service, retrieves the updated screen state, and sends it back to Gemini in a loop until the AI confirms that the app has been successfully locked in the recent apps list.
“Even though PromptSpy uses Gemini in just one of its features, it still demonstrates how incorporating these AI tools can make malware more dynamic, giving threat actors ways to automate actions that would normally be more difficult with traditional scripting,” explains ESET.
While the use of an AI LLM for run-time changes to behavior is novel, PromptSpy’s primary functionality is to act as spyware.
The malware includes a built-in VNC module that allows the threat actors to gain full remote access to devices with Accessibility permissions are granted.
Advertisement
Using this access, the threat actors can view and control the Android screen in real time.
According to ESET, the malware can:
Upload a list of installed apps
Intercept lockscreen PINs or passwords
Record the pattern unlock screen as a video
Capture screenshots on demand
Record screen activity and user gestures
Report the current foreground application and screen status
To make removal harder, when users attempt to uninstall the app or turn off Accessibility permissions, the malware overlays transparent, invisible rectangles over UI buttons that display strings like “stop,” “end,” “clear,” and “Uninstall.”
When a user taps the button to stop or uninstall the app, they will instead tap the invisible button, which blocks removal.
Unclear if its a proof-of-concept malware
Stefanko says that victims must reboot into Android Safe Mode so that third-party apps are disabled and cannot block the malware’s uninstall.
Advertisement
ESET told BleepingComputer that it has not yet observed PromptSpy or its dropper in its telemetry, so it is unclear whether the malware is a proof-of-concept.
“We haven’t seen any signs of the PromptSpy dropper or its payload in our telemetry so far, which could mean they’re only proofs of concept,” Stefanko told BleepingComputer.
However, as VirusTotal indicates that several samples were previously distributed via the dedicated domain mgardownload[.]com and used a web page on m-mgarg[.]com to impersonate JPMorgan Chase Bank, it may have been used in actual attacks.
“Still, because there appears to be a dedicated domain that was used to distribute them, and fake bank website, we can’t rule out the possibility that both the dropper and PromptSpy are or were in the wild,” Štefanko added.
Advertisement
While the distribution of this malware appears very limited, it demonstrates how threat actors are using generative AI to not only create attacks and phishing sites, but also to modify malware behavior in real time.
Earlier this month, Google Threat Intelligence reported that state-sponsored hackers are also using Google’s Gemini AI model to support all stages of their attacks, from reconnaissance to post-compromise actions.
Modern IT infrastructure moves faster than manual workflows can handle.
In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
According to well-known leaker HXL, Zen 6 will span four single-CCD processor variants alongside three higher-end dual-CCD designs. While the exact Ryzen branding for each chip hasn’t been disclosed, the rumored Ryzen 10000 series lineup appears to back earlier whispers that AMD’s next flagship desktop CPU will push core counts… Read Entire Article Source link
Niche brands stand out by building digital systems that reflect a clear point of view—and by iterating faster than generalized competitors. In 2026, the advantage comes from a purpose-built stack: composable architecture, tight data feedback loops, and trust controls that reduce friction without reducing safety.
1. Focused market design (your unfair advantage)
Niche brands win when they design for a single “job to be done,” not a broad demographic. The practical goal is to remove decision fatigue: fewer choices, clearer comparisons, and a site structure that mirrors how the niche actually shops (use cases, compatibility, constraints, and rituals).
Implementation checklist
Advertisement
Build navigation around the customer’s vocabulary (problems, surfaces, ingredients, fit, size, legality), not internal product categories.
Treat “collection pages” as decision pages: add a short buying guide, comparison hooks, and clear boundaries (“Not for X,” “Works best for Y”).
Summary: Focus beats scale because it lets you simplify choices and increase conversion without needing more traffic.
2. Technology as brand infrastructure (composable by default)
Composable commerce is no longer experimental; it’s broadly positioned as a proven strategy with a mature ecosystem of packaged components (CMS, search, PIM, OMS, CDP/engagement) that integrate into a modular architecture. Headless frontends are frequently described as “the norm,” enabling brands to optimize UX without being blocked by back-end constraints.
A practical stack map (lean, modern)
Experience layer: headless storefront + CMS (for fast merchandising and content reuse).
Data: event collection → customer profile → segmentation (keep it minimal and consent-aware).
Ops: OMS/3PL, returns, support tooling, email/SMS, review/UGC.
When not to go headless: if you’re pre–product-market fit, a heavy composable build can slow you down—use a simpler theme-based stack until you’ve validated merchandising, margins, and repeat demand.
Summary: Your stack is your brand’s execution engine; composable patterns let you upgrade parts without rewriting the whole business.
3. Personalization without enterprise complexity (minimum viable data)
Niche personalization works best when it’s narrow and explainable: “show the right products sooner” rather than “build a surveillance machine.” You get most of the upside with a small set of events: viewed category, viewed product attributes, add-to-cart, purchase, return reason, and support contact.
Advertisement
Brands like Stoned Genie leverage this approach by aligning product presentation and digital experience with a distinct cultural identity, creating resonance without relying on mass appeal. Instead of layering on complex automation, they prioritize clarity in positioning and relevance in merchandising—keeping personalization focused and defensible.
What to implement first
Intent-based routing: “Shop by use case” quizzes or guided filters that write back a first-party preference (not 30 attributes).
Merchandising rules that you can audit: hide out-of-stock substitutes, boost high-margin bundles, suppress high-return variants for new customers.
Pitfalls
Personalization that changes prices or claims without transparency can destroy trust faster than it lifts conversion.
Overfitting to short-term conversion can reduce LTV (e.g., discount addiction); treat LTV as the guardrail metric.
Summary: The best niche personalization is small, controlled, and measurable—built on signals you can defend.
4. Content as a conversion mechanism (and a search-quality moat)
For niche brands, content isn’t “blogging”—it’s the product’s proof, the buyer’s guide, and the support team, all embedded into the storefront. Google’s guidance emphasizes E‑E‑A‑T (including “experience,” such as first-hand use of a product) and original, helpful, people-first content.
High-converting content modules (put these on money pages)
Advertisement
“Choose the right X” blocks on collection pages (3–5 criteria, plus who each option is for).
Proof blocks on PDPs: test notes, materials, sourcing, safety notes, compatibility tables, and “what’s in the box.”
Post-purchase success paths: setup guides, care instructions, refill/repurchase timing, troubleshooting.
Quality guardrails (2026 search reality)
Avoid filler and generic intros: raters are explicitly instructed to downrate pages where the main content is copied/paraphrased/auto-generated with little added value.
If you use AI for drafts, treat it as editing acceleration; the final page must show real expertise, real product knowledge, and unique contribution.
Summary: Content that demonstrates real experience becomes both a conversion tool and a defensible quality signal.
5. Operational efficiency through automation (without breaking the brand)
Automation should protect the brand promise: fewer errors, faster shipping, clearer support—not “more spam.” Prioritize workflows that reduce customer-facing failures: inventory sync, order routing, fraud checks, returns triage, and lifecycle messaging.
What to automate first
Inventory and ETA truth: real-time stock, backorder rules, and proactive delay notifications.
Support triage: route by issue type (delivery, usage, defects), auto-suggest relevant help content, escalate high-risk tickets.
Guardrails
Don’t automate refunds/returns blindly; combine rules with human review for high-value or high-fraud patterns.
Measure “contacts per 100 orders” and “return rate by SKU” to avoid scaling hidden problems.
Summary: Automation is a margin lever and a trust lever—if it reduces mistakes customers actually feel.
6. Trust and compliance as conversion design
In sensitive or regulated niches, trust is a feature you ship. Stripe’s secure payment system overview highlights core security components, including encryption, tokenization, multifactor authentication (MFA), fraud detection systems, and PCI DSS compliance, as part of a robust payment environment.
How to turn compliance into UX
Advertisement
Make policies legible: shipping, returns, warranty, and data handling should be scannable and consistent.
Summary: Security and compliance aren’t just risk controls—they’re user-experience signals that reduce checkout hesitation.
7. Community-driven growth and iteration (your compounding advantage)
Community works when it’s embedded into the product narrative: reviews with context, UGC that demonstrates outcomes, and referral loops that reward advocacy. The compounding strategy is iteration: small reversible experiments across bundles, PDP structure, onboarding flows, and post-purchase education.
Iteration cadence (practical)
Weekly: test one merchandising change + one content module improvement.
Monthly: audit returns, support drivers, and cohort retention; ship fixes to the top two friction points.
Quarterly: revisit your stack—swap components only when the bottleneck is proven.
Summary: Niche brands out-iterate because their systems are smaller, clearer, and closer to the customer.
The FBI warned that Americans lost more than $20 million last year amid a massive surge in ATM “jackpotting” attacks, in which criminals use malware to force cash machines to dispense money.
According to a Thursday FBI flash alert, more than 700 ATM jackpotting incidents were reported last year alone in a significant spike compared to the roughly 1,900 total incidents reported across the United States since 2020.
These attacks can be carried out in minutes and target the software layer controlling an ATM’s physical hardware, using malicious tools such as the Ploutus malware. Most often, they go undetected by financial institutions and ATM operators until the cash is already gone.
As the FBI explained, cash machines are designed to verify transactions through their bank before dispensing cash. However, Ploutus bypasses this process entirely, allowing the criminals to issue commands directly to the ATM and trigger withdrawals on demand without a bank card, a customer account, or the bank’s approval.
“Ploutus malware exploits the eXtensions for Financial Services (XFS), the layer of software that instructs an ATM what to physically do. When a legitimate transaction occurs, the ATM application sends instructions through XFS for bank authorization,” the FBI said. “If a threat actor can issue their own commands to XFS, they can bypass bank authorization entirely and instruct the ATM to dispense cash on demand.”
Advertisement
To install the malware, the attackers usually gain physical access to the targeted ATM using widely available generic keys. Once inside, they remove the machine’s hard drive, copy malware onto it and reinstall it, or even swap the original drive out entirely for another one preloaded with the malicious software.
To defend against these attacks, the FBI encouraged financial institutions to audit their ATM systems for signs of unauthorized removable storage use and unauthorized processes.
“When combined with gold image integrity validation, this approach enables early identification of physical intrusion and malware staging events that would otherwise evade network-based monitoring,” the law enforcement agency added.
FBI’s warning comes after a wave of arrests targeting members of the Tren de Aragua (TdA) gang, all linked to a massive ATM jackpotting scheme that used Ploutus malware to steal millions in cash from bank ATMs across the United States.
Advertisement
In total, the U.S. Department of Justice has charged 87 Tren de Aragua members over the past six months, who are now facing maximum prison terms ranging from 20 to 335 years each.
Modern IT infrastructure moves faster than manual workflows can handle.
In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.
If you’ve recently travelled abroad, you know the huge checklist of things that need to be done before getting to relax on a quiet beach. And if you’re anything like me, there’s almost something on the list that’s forgotten, which then comes back to haunt you at the wrong time. One such thing is connectivity, as no one in the history of travel has ever liked the long queues at airports to get a new SIM card. Over the past few years, though, there’s been a solution, and that’s eSIM. These non-physical SIMs are installed on your phone and help you connect to the network in any desired country. No need to spend outrageous prices at the airport anymore. Two major players in the eSIM space are Holafly and Airalo. While both provide connectivity across different countries, their approaches are super different. I tested them both on a recent trip to Vietnam, and here’s how both operators compare.
Holafly vs Airalo: Quick Comparison
Feature
Holafly eSIM
Airalo eSIM
Data Plans
Mostly unlimited data plans (daily/weekly/monthly) — great for heavy users.
Fixed data plans (e.g., 1 GB, 5 GB, 20 GB) you buy as needed
Pricing
Generally more expensive due to unlimited data focus
Cheaper with smaller, tailored data packages
Coverage
~200+ destinations globally
~200+ destinations globally
Unlimited Data
Yes (main selling point) — though may throttle after heavy use.
Mostly no unlimited data (except limited specific plans)
Voice/SMS Support
Data-only (calls via apps like WhatsApp.
Offers some plans (Discover+) with voice/SMS in certain regions
Hotspot/Tethering
Yes
Yes, generally allowed with your data allowance
App & Activation
QR code or app install — easy setup
QR code or app install — easy setup
Best For
Long trips & heavy data usage (streaming, hotspot)
Short trips & light to moderate data usage
Different Options, Different Pay
The biggest differentiator between Holafly and Airalo is the available package options. For context, Airalo offers plans without unlimited data, meaning you can configure how much you really need. Passing through France on a road trip to Spain? You can get a 1GB data plan (valid for three days) for $4 to continue using navigation, and you’re good to go. This significantly reduces the end user’s cost and provides more flexibility. However, there’s a problem. Airalo’s plans, while cheaper, start with 1GB or 3GB for the duration of the day you select. But given that the average American family uses 650-700 GB of data per month, 3GB isn’t actually a lot. You can get through that much data within just an hour of watching YouTube in Full HD. So, for any trip longer than a day, you’ll have to spend more on higher capacity plans, which can quickly add up.
On the other hand, Holafly’s approach is a whole lot different. Their plans are always unlimited, meaning you don’t have to worry about finishing up your quota and can watch movies, shows, and play games without worry. As you might expect, Holafly’s plans are more expensive, generally starting from $4 per day for unlimited data. While the exact pricing would depend on your specific country, I’m generally more on board with unlimited data, since even a short WhatsApp call can use several hundred megabytes. And you can also get 5% off using my coupon FOSSBYTES.
Global eSIM
Both Holafly and Airalo offer global eSIM plans for frequent travellers and business people who regularly travel to different countries. Like with the regular eSIM, the pricing and data strategy are very different on both. Airalo offers a 7-day 1GB global plan for $13, which goes all the way up to $34 for just 3GB for 30 days. Any additional data requirement will cost more. Holafly’s package, while expensive, at $62 for 7 days, offers unlimited data in 110+ countries. Honestly, if you plan to get a global SIM, that means you travel a lot, and in that case, Holafly’s unlimited plan is a really good deal.
Advertisement
Holafly also offers a global subscription plan with coverage in 160+ destinations, and you can cancel it at any time, so it’s a good option even if you are planning a trip for just 30 days. They have a Light Plan with 25GB of data for $49.90, an Unlimited Plan for $64.90 monthly, and you can also hotspot with no limits. And if you use my code FOSSBYTES, you get 10% off for 12 months on your subscription.
Length
Holafly
Airalo
7 days
Unlimited data for $62.00
1 GB for $13.00
15 days
Unlimited data for $134.00
2 GB for $24.00
30 days
Unlimited data for $224.00
3 GB for $34.00
Support & App Experience
Holafly and Airalo offer plenty of installation options for both Android and iOS users. You can either set up using the QR code, do it manually, or even through their respective apps. It’s the support infrastructure, though, where Holafly edges ahead. On Trustpilot, Holafly has a rating of 4.6, with multiple reviews highlighting the company’s 24/7 multilingual support, which has proven very helpful during times of worry. People have also mentioned Holafly’s excellent refund policy, which works for up to 6 months after purchase. Their app, however, isn’t the best. It was buggy when reporting total data usage, and I also ran into the infamous “this content isn’t available at your location” problem on Netflix a couple of times.
On the other hand, Airalo has a rating of 3.9. While it’s by no means bad, there have been some complaints about the network coverage and unhelpful support staff. That being said, the Airalo app is really stable. It was easy to use and free of bugs that could hinder the user experience, and included helpful tutorials that made the setup straightforward.
Both Holafly and Airalo have loyalty programs that grant users special discounts and cashback. Airalo’s loyalty program offers up to 10% cashback on every purchase, compared to Holafly’s 7%.
Personal Experience
As mentioned, I decided to put both services head-to-head during my recent trip to Vietnam. For some context, I set up both before my flight, and the experience was excellent on both. I bought the unlimited week plan with Holafly for $27, while the 10GB 7-day plan cost me $16. Both plans were instantly connected to service after I landed, and, being a tech reviewer, I started my usual testing, which included speed testing, downloading content, and calling my family back home.
Call quality with WhatsApp was really good with both, and my family didn’t have any problems hearing my voice. Similarly, navigation and translation between Vietnamese and English were handled very well on both. Network speeds were also comparable in both Saigon and the quiet beach town of Tuy Hoa, hovering around 50 Mbps download and 15 Mbps upload. However, the 10GB network limit didn’t last very long. After only a few days, I ran through all my data while on a train journey without Wi-Fi. This was a big worry. But fortunately, Holafly was there to the rescue with the unlimited data. Personally, I’d choose Holafly over Airalo because data can run out quickly, and you could end up stuck in an unfamiliar place.
Advertisement
Verdict
In the end, the choice would depend on your specific needs. If you’re like me and can’t stop worrying about finishing your data mid-trip, or if you frequently have to be on video calls, then Holafly is the best bet. The only downside is the app glitches, which can sometimes interfere with sessions. However, if you’re transiting through a country for a short time or taking a short trip, Airalo’s cost savings are the way to go. Don’t forget to use my code FOSSBYTES at Holafly if you want to get a discount on your eSIM.
A new partnership with EverPass will put Apple TV’s growing slate of live sports on screens in bars, restaurants, and other commercial spaces.
Apple TV sports reach expands with EverPass deal
EverPass Media, a company that provides live sports content to commercial establishments, has announced a new partnership with Apple TV. The partnership will bring Formula 1, Major League Soccer, and Major League Baseball to EverPass Core customers at no additional cost. “We are excited to partner with Apple and bring its premier content to EverPass, enhancing our ability to deliver must-have live sports to commercial audiences. Alex Kaplan, CEO of EverPass Media, said in a press release. “From the continued growth of MLS and the enduring pull of MLB to Formula 1’s rapidly expanding global fanbase, Apple’s content strengthens and diversifies our library of premium offerings.” Continue Reading on AppleInsider | Discuss on our Forums
NASA’s Space Launch System rocket stands on its Florida launch pad. (NASA Photo / Aubrey Gemignani)
NASA counted down to T-minus 29 seconds tonight during a rehearsal for a historic launch that could send astronauts around the moon for the first time in more than half a century.
The run-through at Launch Complex 39B, at Kennedy Space Center in Florida, was known as a wet dress rehearsal because it involved filling up the propellant tanks on NASA’s Space Launch System — a 322-foot-tall rocket that made its debut during 2022’s uncrewed Artemis 1 mission.
The only major component that was missing at the launch pad was the crew. NASA astronaut Reid Wiseman, the commander for the Artemis 2 mission, said in a posting to X that he was watching the proceedings from Launch Control.
Once NASA reviews the results of the two-day rehearsal, mission managers will decide whether to green-light the Artemis 2 crew’s 10-day trip around the moon and back. NASA says liftoff could come as early as March 6.
This week’s simulated countdown provides an opportunity for NASA to check out the Space Launch System rocket, the Orion crew capsule and ground support systems in advance of the actual launch.
Advertisement
An initial rehearsal on Feb. 2 was stopped at roughly T-minus 5 minutes due to a liquid hydrogen leak. Engineers made repairs at the pad to clear the way for a replay of the rehearsal.
NASA had to pause this evening’s first countdown in its final minutes to deal with what it called a “booster avionics system voltage anomaly,” but the count resumed and proceeded as planned to T-minus 33 seconds. At that point the countdown was automatically paused and recycled to T-minus 10 minutes.
It took more than an hour to reconfigure the rocket’s fueling system for another terminal count. Then NASA’s launch team went through an even smoother second countdown, reached a scheduled stopping point at T-minus 29 seconds, and then concluded the rehearsal. A news briefing about the test is set for 11 a.m. ET (8 a.m. PT) on Friday.
The four crew members for Artemis 2 are expected to go into quarantine as soon as this week after almost three years of training. In addition to Wiseman, the crew includes NASA astronauts Christina Koch and Victor Glover, plus Canadian astronaut Jeremy Hansen.
Advertisement
Artemis 2’s flight plan calls for sending the astronauts on a figure-8 route around the moon and back. The trip will take them as far as 4,600 miles beyond the far side of the moon — farther out than any human has gone before.
Although Artemis 2 will be historic in its own right, the mission’s main purpose is to prepare the way for Artemis 3, which aims to land humans on the lunar surface for the first time since Apollo 17 in 1972. That mission is officially set for no earlier than mid-2027, but industry experts expect the schedule to slip.
Several companies headquartered in the Seattle area have a significant interest in the Artemis moon program. A facility in Redmond operated by L3Harris (previously known as Aerojet Rocketdyne) builds thrusters for the Orion spacecraft — and Jeff Bezos’ Blue Origin space venture, based in Kent, is developing a Blue Moon lander that’s meant to put Artemis crews on the lunar surface starting in 2030. Blue Origin’s New Glenn rocket is expected to send an uncrewed cargo version of its lander to the moon sometime in the next few months.
United States prosecutors and federal law enforcement spent over a year examining ties between Jeffrey Epstein and Customs and Border Protection officers stationed in the US Virgin Islands (USVI), according to documents recently released by the Department of Justice.
As The Guardian and New York Times have reported, emails, text messages, and investigative records show that Epstein cultivated friendships with several officers, entertaining them on his island and offering to take them for whale-watching trips in his helicopter. He even brought one cannolis for Christmas Eve. In turn, Epstein would bring certain officers his complaints about his treatment at the hands of other CBP and federal agents. Most of the interactions described in the records occurred years after Epstein pleaded guilty to charges of sex crimes in Florida in 2008.
The CBP officers were never charged for any crimes related to Epstein, and at least one later retired from the agency with a pension, suggesting that the government ultimately didn’t find any wrongdoing. The documents do, though, describe patterns of behavior—two of the officers referred to Epstein as a “friend”—that one government ethics expert described as inappropriate and possible violations of federal guidance. They also contain grand jury subpoenas that specifically name the officers and compel the recipients, which were largely financial services firms, to aid federal prosecutors who were looking into allegations of a conspiracy to defraud the US government.
CBP and the Southern District of New York US Attorney’s Office, which led the investigation into Epstein, did not respond to requests for comment.
Advertisement
For years, Epstein allegedly brought countless women and girls as young as 12 to his private island, Little Saint James, according to a 2020 complaint filed by the former USVI attorney general. Epstein would often fly in and out of USVI on his private jet.
In order to depart from USVI to other parts of the US, Epstein’s plane had to be cleared by CBP, according to a November 2020 FBI interview report with Epstein’s personal pilot, Larry Visoski.
Visoski told the FBI that some passengers were college students with letters from their schools explaining why they were traveling. Other times, according to the report on Visoski’s interview, Epstein traveled with a woman who had a foreign passport. If CBP officers started questioning these passengers, Visoski said, Epstein would intervene and start arguing with the officers.
Visoski, though, told the FBI that Epstein made an effort to be friendly with CBP officers, at times instructing Visoski to collect agents’ contact information. (In an email to one CBP officer, Epstein wrote, “as you know Im very respectful of people just doing their job.”) Over the years, emails and text messages show, various CBP officers would try to reach out to Epstein, either directly or through Visoski or other associates. Sometimes, Epstein would have the officers out to Little Saint James.
Advertisement
In May 2014, for example, Visoski emailed Epstein, “While going through customs in STT, our nice person gave me his cell contact.” The pilot added that the “nice person” would be available to visit Little Saint James that week. Visoski also attached the person’s contact information. The next day, Epstein’s island estate manager emailed Epstein to let him know the person, a CBP officer, would be picked up on Wednesday for lunch. (It’s unclear whether this lunch ever happened.)
Emails in 2015 and 2016 show that Epstein would have another officer, Glen Samuel, come to Little Saint James to perform on steel pan drums—a side gig Samuel informally advertised at one point on his Facebook page. In a January 2015 email thread, Epstein asked an associate to clarify Samuel’s rate. The associate replied, “Mr. Samuel says he does not intend to charge you. He considers you a friend and was doing this for you. If you wish to give him something, he is appreciative, but there is no fee.” Samuel did not respond to a request for comment.
Editor’s Note: The following article has been updated to reflect the latest statement from Sentosa Development Corporation (SDC).
Tipsy Bird is owned by local hospitality group Tipsy Collective, which has faced years of legal disputes
Sentosa beach club Tipsy Unicorn has ceased operations after its operator was ordered into compulsory liquidation by the Singapore High Court.
According to a report by The Straits Times, the venue’s operator, Tipsy Bird, was wound up on Jan 23 this year after United Overseas Bank (UOB) filed a winding-up application. Court documents seen by the publication showed that the bank is seeking to recover more than S$96,000 in debt and interest.
However, liquidators shared that this may not represent the company’s full liabilities. Without the firm’s Statement of Affairs, they are unable to determine the total amount owed or how many creditors are affected.
Advertisement
As of Feb 16, the company’s directors have yet to come forward to brief the liquidators on the firm’s financial affairs.
The liquidators also noted that Tipsy Bird operated Tipsy Unicorn Beach Club at 36 Siloso Beach Walk. Following the winding-up order, the landlord of the premises, Sentosa Development Corporation (SDC), exercised its right to repossess the property.
Responding to a Vulcan Post media enquiry, SDC confirmed that the beach club ceased operations on Jan 30, adding that they are currently in discussions with potential operators.
“Guests can continue to look forward to a vibrant beach scene on Sentosa, with new concepts and enhancements planned as part of our ongoing destination rejuvenation efforts,” said a SDC spokesperson.
Advertisement
Currently, users are unable to make reservations on the Tipsy Unicorn website (top), and Tipsy Unicorn’s Instagram page is listed as “temporarily closed” (bottom)./ Screenshot by Vulcan Post
When the publication visited the venue on Feb 18, the outlet was shuttered, with a notice at the entrance stating it had stopped operations from Jan 30. Its Instagram page was also marked as “temporarily closed,” and checks by Vulcan Post on Feb 20 showed that reservations were no longer available on its website.
Closure follows years of legal disputes
Corporate records show Tipsy Bird is wholly owned by local hospitality group Tipsy Collective, which remains an active entity as of Feb 19.
According to a Facebook post by the group, Tipsy Unicorn opened at Sentosa on Sept 1, 2023, and had been operating for about three years before its closure.
David Gan, co-founder of Tipsy Collective./Image Credit: Tipsy Collective via LinkedIn
While the other co-founder, David Gan, remained involved in the business, concerns over financial mismanagement and a lack of transparency led shareholders to clash with him, including objections to the development of the Sentosa beach club.
The budget for this project reportedly doubled from S$3 million to S$6 million. Additional concerns included debts amounting to S$5.2 million owed to suppliers, contractors and creditors. Tipsy Collective also allegedly owed about S$1 million to SDC.
Advertisement
Following the dispute, Gan was dismissed on Nov 6, 2024. But trouble did not stop brewing.
Remember how Donald Trump was going to “drain the swamp” as president? The idea, spilling out from his first campaign for president, was that Washington was horribly corrupt, that politicians and unelected government stooges were making money from their positions of power, and that even politician’s families were in on the grift. The only reason I am aware of a name like Burisma is because Trump and his sycophants screamed about it as an example of how Biden’s family was corruptly making money by utilizing Joe Biden’s time as vice president for influence.
But, if there was a grift going on there, at least the Biden’s had enough shame to try to hide it. The same people who were up in arms over Burisma and other such claims have been remarkably silent on the far more obvious and in your face grifting that Trump is doing. Our president appears to look at the tax coffers as his own personal piggy bank, constantly dreaming up reasons why your tax money should find its way into his pockets. He wanted $10 billion in taxpayer money because his tax returns leaked. He wants $230 million because he was tried for his criminal behavior. He guided billions in taxpayer money to his pet supporter Elon Musk. And, because the corruption must be as naked as possible, agencies under his executive umbrella would be the ones approving all of this redistribution of taxpayer wealth into his own personal bank accounts.
It hasn’t stopped and the latest attempted grift is absolute stunning in how brazen it is. You may have heard that Trump is attempting to strong-arm several local governments into renaming an airport after him. It started with Dulles International Airport outside of Washington DC, with Trump reportedly holding millions in approved federal infrastructure funds hostage if he didn’t get his way. He has no authority to do this with congressionally approved funds, of course, but that isn’t stopping him. The state government in Florida raced to be first in line to lick Trump’s boots, unsurprisingly, with the state House voting to change the Palm Beach International Airport’s name to the President Donald J. Trump International Airport instead. That measure will now go before the state Senate, where it is likely to pass.
And while all of this was going on, an interesting thing happened: a private company that manages Trump’s intellectual property licensing filed for trademarks on the potential names for these airports.
Advertisement
The applications, submitted by DTTM Operations LLC on February 13 and 14, seek federal protection for the names:
All three applications were filed with the United States Patent and Trademark Office on what is known as an “intent to use” basis. This is a filing strategy that allows applicants to stake a claim to a name before it is used in commerce.
As Josh Gerben notes in his post, this has simply never happened before. We’ve never witnessed an American president, while in office, have his private company proactively trademark the very names of a piece of government infrastructure that that same president was attempting to bring about. It’s an incredibly naked grift, in which an American president is clearly, unabashedly seeking to make money on the backs of taxpayers while purporting to do the people’s business.
I should be very clear: these are trademark filings that are completely unprecedented. Airport names almost always originate from the governmental body that owns or manages the facility. They are not owned or licensed by privately held entities.
Here, the filings were made by DTTM Operations LLC, the same entity that protects the Trump brand across hotels, consumer goods, and licensing ventures. That fact alone signals that this is not merely about honorary naming. It is about brand control.
The broader goods listed in the applications, such as clothing, luggage, and watches, are equally telling. Those categories are classic merchandise plays. If an airport were renamed, the trademark filings would allow DTTM Operations to control and monetize branded merchandise associated with the location.
The intent is obvious: create a licensing structure such that the American government will need to pay licensing fees to Trump’s business in perpetuity. There is no other reasonable explanation for this sequence of events. And it appears to be going on without any serious comment from the very same people who whined about what a swamp Washington had become.
Advertisement
Your money is not Trump’s personal piggy bank. Or, rather, it shouldn’t be. Unfortunately, those who ought to be clapping back on all of this are either in on the grift, or perfectly willing to allow it to occur.
The RF section of the ESP32-C6 die. (Credit: electronupdate, YouTube)
With the ESP32-P4 not having any wireless functionality and instead focusing on being a small SoC, it makes sense to combine it with a second chip that handles features like WiFi and Bluetooth. This makes the Guition ESP32-P4-M3 module both a pretty good example of how the P4 will be used, and an excellent opportunity to tear into, decap and shoot photos of the dies of both the P4 and the ESP32-C6 in this particular module, courtesy of [electronupdate]. There also the blog post for those who just want to ogle the shinies.
After popping the metal shield on the module, you can see the contents as in the above photo. The P4 inside is a variant with 32 MB of PSRAM integrated along with the SoC die. This results in a die shot both of this PSRAM and the P4 die, though enough of the top metal seems to remain to clearly see the latter.
The Boya brand Flash chip is quite standard inside, and along with a glance at the inside of one of the crystal oscillators we get to glance at the inside of the C6 MCU. This is a much more simple chip than the P4, with the RF section quite obvious. The total die sizes are 2.7 x 2.7 mm for the C6 and 4.29 x 3.66 mm for the P4.