Connect with us

Tech

So, You’ve Hit An Age Gate. What Now?

Published

on

from the getting-around-the-age-gate dept

EFF is against age gating and age verification mandates, and we hope we’ll win in getting existing ones overturned and new ones prevented. But mandates are already in effect, and every day many people are asked to verify their age across the web, despite prominent cases of sensitive data getting leaked in the process.

At some point, you may have been faced with the decision yourself: should I continue to use this service if I have to verify my age? And if so, how can I do that with the least risk to my personal information? This is our guide to navigating those decisions, with information on what questions to ask about the age verification options you’re presented with, and answers to those questions for some of the top most popular social media sites. Even though there’s no way to implement mandated age gates in a way that fully protects speech and privacy rights, our goal here is to help you minimize the infringement of your rights as you manage this awful situation.

Follow the Data

Since we know that leaks happen despite the best efforts of software engineers, we generally recommend submitting the absolute least amount of data possible. Unfortunately, that’s not going to be possible for everyone. Even facial age estimation solutions where pictures of your face never leave your device, offering some protection against data leakage, are not a good option for all users: facial age estimation works less well for people of colortrans and nonbinary people, and people with disabilities. There are some systems that use fancy cryptography so that a digital ID saved to your device won’t tell the website anything more than if you meet the age requirement, but access to that digital ID isn’t available to everyone or for all platforms. You may also not want to register for a digital ID and save it to your phone, if you don’t want to take the chance of all the information on it being exposed upon request of an over-zealous verifier, or you simply don’t want to be a part of a digital ID system

If you’re given the option of selecting a verification method and are deciding which to use, we recommend considering the following questions for each process allowed by each vendor:

Advertisement
  • Data: What info does each method require?
  • Access: Who can see the data during the course of the verification process?
  • Retention: Who will hold onto that data after the verification process, and for how long?
  • Audits: How sure are we that the stated claims will happen in practice? For example, are there external audits confirming that data is not accidentally leaked to another site along the way? Ideally these will be in-depth, security-focused audits by specialized auditors like NCC Group or Trail of Bits, instead of audits that merely certify adherence to standards. 
  • Visibility: Who will be aware that you’re attempting to verify your age, and will they know which platform you’re trying to verify for?

We attempt to provide answers to these questions below. To begin, there are two major factors to consider when answering these questions: the tools each platform uses, and the overall system those tools are part of.

In general, most platforms offer age estimation options like face scans as a first line of age assurance. These vary in intrusiveness, but their main problem is inaccuracy, particularly for marginalized users. Third-party age verification vendors Private ID and k-ID offer on-device facial age estimation, but another common vendor, Yoti, sends the image to their servers during age checks by some of the biggest platforms. This risks leaking the images themselves, and also the fact that you’re using that particular website, to the third party. 

Then, there’s the document-based verification services, which require you to submit a hard identifier like a government-issued ID. This method thus requires you to prove both your age and your identity. A platform can do this in-house through a designated dataflow, or by sending that data to a third party. We’ve already seen examples of how this can fail. For example, Discord routed users’ ID data through its general customer service workflow so that a third-party vendor could perform manual review of verification appeals. No one involved ever deleted users’ data, so when the system was breached, Discord had to apologize for the catastrophic disclosure of nearly 70,000 photos of users’ ID documents. Overly long retention periods expose documents to risk of breaches and historical data requests. Some document verifiers have retention periods that are needlessly long. This is the case with Incode, which provides ID verification for Tiktok. Incode holds onto images forever by default, though TikTok should automatically start the deletion process on your behalf.

Some platforms offer alternatives, like proving that you own a credit card, or asking for your email to check if it appears in databases associated with adulthood (like home mortgage databases). These tend to involve less risk when it comes to the sensitivity of the data itself, especially since credit cards can be replaced, but in general still undermine anonymity and pseudonymity and pose a risk of tracking your online activity. We’d prefer to see more assurances across the board about how information is handled.

Each site offers users a menu of age assurance options to choose from. We’ve chosen to present these options in the rough order that we expect most people to prefer. Jump directly to a platform to learn more about its age checks:

Advertisement

Meta – Facebook, Instagram, WhatsApp, Messenger, Threads

Inferred Age

If Meta can guess your age, you may never even see an age verification screen. Meta, which runs Facebook, Threads, Instagram, Messenger, and WhatsApp, first tries to use information you’ve posted to guess your age, like looking at “Happy birthday!” messages. It’s a creepy reminder that they already have quite a lot of information about you.

If Meta cannot guess your age, or if Meta infers you’re too young, it will next ask you to verify your age using either facial age estimation, or by uploading your photo ID. 

Face Scan

If you choose to use facial age estimation, you’ll be sent to Yoti, a third-party verification service. Your photo will be uploaded to their servers during this process. Yoti claims that “as soon as an age has been estimated, the facial image is immediately and permanently deleted.” Though it’s not as good as not having that data in the first place, Yoti’s security measures include a bug bounty program and annual penetration testing. Researchers from Mint Secure found that Yoti’s app and website are filled with trackers, so the fact that you’re verifying your age could be not only shared to Yoti, but leaked to third-party data brokers as well. 

You may not want to use this option if you’re worried about third parties potentially being able to know you’re trying to verify your age with Meta. You also might not want to use this if you’re worried about a current picture of your face accidentally leaking—for example, if elements in the background of your selfie might reveal your current location. On the other hand, if you consider a selfie to be less sensitive than a photograph of your ID, this option might be better. If you do choose (or are forced to) use the face check system, be sure to snap your selfie without anything you’d be concerned with identifying your location or embarrassing you in the background in case the image leaks.

Advertisement

Upload ID

If Yoti’s age estimation decides your face looks too young, or if you opt out of facial age estimation, your next recourse is to send Meta a photo of your ID. Meta sends that photo to Yoti to verify the ID. Meta says it will hold onto that ID image for 30 days, then delete it. Meanwhile, Yoti claims it will delete the image immediately after verification. Of course, bugs and process oversights exist, such as accidentally replicating information in logs or support queues, but at least they have stated processes. Your ID contains sensitive information such as your full legal name and home address. Using this option not only runs the (hopefully small, but never nonexistent) risk of that data getting leaked through errors or hacking, but it also lets Meta see the information needed to tie your profile to your identity—which you may not want. If you don’t want Meta to know your name and where you live, or rely on both Meta and Yoti to keep to their deletion promises, this option may not be right for you.

Google – Gmail, YouTube 

Inferred Age

If Google can guess your age, you may never even see an age verification screen. Your Google account is typically connected to your YouTube account, so if (like mine) your YouTube account is old enough to vote, you may not need to verify your Google account at all. Google first uses information it already knows to try to guess your age, like how long you’ve had the account and your YouTube viewing habits. It’s yet another creepy reminder of how much information these corporations have on you, but at least in this case they aren’t likely to ask for even more identifying data.

If Google cannot guess your age, or decides you’re too young, Google will next ask you to verify your age. You’ll be given a variety of options for how to do so, with availability that will depend on your location and your age.

Google’s methods to assure your age include ID verification, facial age estimation, verification by proxy, and digital ID. To prove you’re over 18, you may be able to use facial age estimation, give Google your credit card information, or tell a third-party provider your email address.

Advertisement

Face Scan

If you choose to use facial age estimation, you’ll be sent to a website run by Private ID, a third-party verification service. The website will load Private ID’s verifier within the page—this means that your selfie will be checked without any images leaving your device. If the system decides you’re over 18, it will let Google know that, and only that. Of course, no technology is perfect—should Private ID be mandated to target you specifically, there’s nothing to stop it from sending down code that does in fact upload your image, and you probably won’t notice. But unless your threat model includes being specifically targeted by a state actor or Private ID, that’s unlikely to be something you need to worry about. For most people, no one else will see your image during this process. Private ID will, however, be told that your device is trying to verify your age with Google and Google will still find out if Private ID thinks that you’re under 18.

If Private ID’s age estimation decides your face looks too young, you may next be able to decide if you’d rather let Google verify your age by giving it your credit card information, photo ID, or digital ID, or by letting Google send your email address to a third-party verifier.

Email Usage

If you choose to provide your email address, Google sends it on to a company called VerifyMy. VerifyMy will use your email address to see if you’ve done things like get a mortgage or paid for utilities using that email address. If you use Gmail as your email provider, this may be a privacy-protective option with respect to Google, as Google will then already know the email address associated with the account. But it does tell VerifyMy and its third-party partners that the person behind this email address is looking to verify their age, which you may not want them to know. VerifyMy uses “proprietary algorithms and external data sources” that involve sending your email address to “trusted third parties, such as data aggregators.” It claims to “ensure that such third parties are contractually bound to meet these requirements,” but you’ll have to trust it on that one—we haven’t seen any mention of who those parties are, so you’ll have no way to check up on their practices and security. On the bright side, VerifyMy and its partners do claim to delete your information as soon as the check is completed.

Credit Card Verification

If you choose to let Google use your credit card information, you’ll be asked to set up a Google Payments account. Note that debit cards won’t be accepted, since it’s much easier for many debit cards to be issued to people under 18. Google will then charge a small amount to the card, and refund it once it goes through. If you choose this method, you’ll have to tell Google your credit card info, but the fact that it’s done through Google Payments (their regular card-processing system) means that at least your credit card information won’t be sitting around in some unsecured system. Even if your credit card information happens to accidentally be leaked, this is a relatively low-risk option, since credit cards come with solid fraud protection. If your credit card info gets leaked, you should easily be able to dispute fraudulent charges and replace the card.

Advertisement

Digital ID

If the option is available to you, you may be able to use your digital ID to verify your age with Google. In some regions, you’ll be given the option to use your digital ID. In some cases, it’s possible to only reveal your age information when you use a digital ID. If you’re given that choice, it can be a good privacy-preserving option. Depending on the implementation, there’s a chance that the verification step will “phone home” to the ID provider (usually a government) to let them know the service asked for your age. It’s a complicated and varied topic that you can learn more about by visiting EFF’s page on digital identity.

Upload ID

Should none of these options work for you, your final recourse is to send Google a photo of your ID. Here, you’ll be asked to take a photo of an acceptable ID and send it to Google. Though the help page only states that your ID “will be stored securely,” the verification process page says ID “will be deleted after your date of birth is successfully verified.” Acceptable IDs vary by country, but are generally government-issued photo IDs. We like that it’s deleted immediately, though we have questions about what Google means when it says your ID will be used to “improve [its] verification services for Google products and protect against fraud and abuse.” No system is perfect, and we can only hope that Google schedules outside audits regularly.

TikTok

Inferred Age

If TikTok can guess your age, you may never even see an age verification notification. TikTok first tries to use information you’ve posted to estimate your age, looking through your videos and photos to analyze your face and listen to your voice. By uploading any videos, TikTok believes you’ve given it consent to try to guess how old you look and sound.

If TikTok decides you’re too young, appeal to revoke their age decision before the deadline passes. If TikTok cannot guess your age, or decides you’re too young, it will automatically revoke your access based on age—including either restricting features or deleting your account. To get your access and account back, you’ll have a limited amount of time to verify your age. As soon as you see the notification that your account is restricted, you’ll want to act fast because in some places you’ll have as little as 23 days before the deadline passes.

Advertisement

When you get that notification, you’re given various options to verify your age based on your location.

Face Scan

If you’re given the option to use facial age estimation, you’ll be sent to Yoti, a third-party verification service. Your photo will be uploaded to their servers during this process. Yoti claims that “as soon as an age has been estimated, the facial image is immediately and permanently deleted.” Though it’s not as good as not having that data in the first place, Yoti’s security measures include a bug bounty program and annual penetration testing. However, researchers from Mint Secure found that Yoti’s app and website are filled with trackers, so the fact that you’re verifying your age could be leaked not only to Yoti, but to third-party data brokers as well.

You may not want to use this option if you’re worried about third parties potentially being able to know you’re trying to verify your age with TikTok. You also might not want to use this if you’re worried about a current picture of your face accidentally leaking—for example, if elements in the background of your selfie might reveal your current location. On the other hand, if you consider a selfie to be less sensitive than a photograph of your ID or your credit card information, this option might be better. If you do choose (or are forced to) use the face check system, be sure to snap your selfie without anything you’d be concerned with identifying your location or embarrassing you in the background in case the image leaks.

Credit Card Verification

If you have a credit card in your name, TikTok will accept that as proof that you’re over 18. Note that debit cards won’t be accepted, since it’s much easier for many debit cards to be issued to people under 18. TikTok will charge a small amount to the credit card, and refund it once it goes through. It’s unclear if this goes through their regular payment process, or if your credit card information will be sent through and stored in a separate, less secure system. Luckily, these days credit cards come with solid fraud protection, so if your credit card gets leaked, you should easily be able to dispute fraudulent charges and replace the card. That said, we’d rather TikTok provide assurances that the information will be processed securely.

Advertisement

Credit Card Verification of a Parent or Guardian

Sometimes, if you’re between 13 and 17, you’ll be given the option to let your parent or guardian confirm your age. You’ll tell TikTok their email address, and TikTok will send your parent or guardian an email asking them (a) to confirm your date of birth, and (b) to verify their own age by proving that they own a valid credit card. This option doesn’t always seem to be offered, and in the one case we could find, it’s possible that TikTok never followed up with the parent. So it’s unclear how or if TikTok verifies that the adult whose email you provide is your parent or guardian. If you want to use credit card verification but you’re not old enough to have a credit card, and you’re ok with letting an adult know you use TikTok, this option may be reasonable to try.

Photo with a Random Adult?

Bizarrely, if you’re between 13 and 17, TikTok claims to offer the option to take a photo with literally any random adult to confirm your age. Its help page says that any trusted adult over 25 can be chosen, as long as they’re holding a piece of paper with the code on it that TikTok provides. It also mentions that a third-party provider is used here, but doesn’t say which one. We haven’t found any evidence of this verification method being offered. Please do let us know if you’ve used this method to verify your age on TikTok!

Photo ID and Face Comparison

If you aren’t offered or have failed the other options, you’ll have to verify your age by submitting a copy of your ID and matching photo of your face. You’ll be sent to Incode, a third-party verification service. In a disappointing failure to meet the industry standard, Incode itself doesn’t automatically delete the data you give it once the process is complete, but TikTok does claim to “start the process to delete the information you submitted,” which should include telling Incode to delete your data once the process is done. If you want to be sure, you can ask Incode to delete that data yourself. Incode tells TikTok that you met the age threshold without providing your exact date of birth, but then TikTok wants to know the exact date anyway, so it’ll ask for your date of birth even after your age has been verified.

TikTok itself might not see your actual ID depending on its implementation choices, but Incode will. Your ID contains sensitive information such as your full legal name and home address. Using this option not only runs the (hopefully small, but never nonexistent) risk of that data getting accidentally leaked through errors or hacking. If you don’t want TikTok or Incode to know your name, what you look like, and where you live—or if you don’t want to rely on both TikTok and Incode to keep to their deletion promises—then this option may not be right for you.

Advertisement

Everywhere Else

We’ve covered the major providers here, but age verification is unfortunately being required of many other services that you might use as well. While the providers and processes may vary, the same general principles will apply. If you’re trying to choose what information to provide to continue to use a service, consider the “follow the data” questions mentioned above, and try to find out how the company will store and process the data you give it. The less sensitive information, the fewer people have access to it, and the more quickly it will be deleted, the better. You may even come to recognize popular names in the age verification industry: Spotify and OnlyFans use Yoti (just like Meta and Tiktok), Quora and Discord use k-ID, and so on. 

Unfortunately, it should be clear by now that none of the age verification options are perfect in terms of protecting information, providing access to everyone, and safely handling sensitive data. That’s just one of the reasons that EFF is against age-gating mandates, and is working to stop and overturn them across the United States and around the world.

Republished from the EFF’s Deeplinks blog.

Filed Under: age gating, age verification, credit cards, face scans, id, privacy

Companies: facebook, google, instagram, meta, tiktok, whatsapp, youtube

Advertisement

Source link

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Is the MacBook Neo the one?

Published

on

It’s been a wild week for Apple. After announcing a slew of new hardware, the company capped things off with its cheapest laptop ever: the $599 MacBook Neo. It’s low on specs, but high on character and value. In this episode, Devindra and Engadget Deputy Editor Nathan Ingraham dive into the MacBook Neo, as well as the refreshed MacBook Air M5, MacBook Pro M5 Pro/Max, iPad Air M4 and iPhone 17e.

Also, Devindra chats with Spencer Ackerman, author of Forever Wars and recent Iron Man comics, about the ongoing battle between Anthropic and the Department of Defense. It turns out the DOD still used Claude for attacks on Iran, after banning Anthropic’/s AI last week. And really, what do these AI companies expect to happen when they jump at military contracts?

Subscribe!

Topic

  • Apple announces a the MacBook Neo priced at $599 and it’s shockingly great – 0:53

  • MacBook Air got the M5, MacBook Pro got the M5 Pro and M5 Max, and who needs the new iPad Air now? – 22:31

  • Anthropic vs. DoD with Spencer Ackerman, author of The Forever Wars – 30:34

  • Gemini encouraged a man to end his own life to be with his ‘AI wife’ – 58:53

  • Polymarket nixes bets on nuclear detonation after public outcry – 1:01:55

  • No Yōtei on PC: Sony closes down first party titles outside of PS5 – 1:03:56

  • Wildlight Studios’ Highguard shuts down after 46 days live – 1:08:23

  • Working on: Dell’s XPS 14 will be great when the keyboard fix comes through – 1:15:09

  • Pop culture picks – 1:15:58

Credits

Hosts: Devindra Hardawar and Nathan Ingraham
Guest: Spencer Ackerman
Producer: Ben Ellman
Music: Dale North and Terrence O’Brien

Source link

Advertisement
Continue Reading

Tech

Building A Heading Sensor Resistant To Magnetic Disturbances

Published

on

Light aircraft often use a heading indicator as a way to know where they’re going. Retired instrumentation engineer [Don Welch] recreated a heading indicator of his own, using cheap off-the-shelf hardware to get the job done.

The heart of the build is a Teensy 4.0 microcontroller. It’s paired with a BNO085 inertial measurement unit (IMU), which combines a 3-axis gyro, 3-axis accelerometer, and 3-axis magnetometer into a single package. [Don] wanted to build a heading indicator that was immune to magnetic disturbances, so ignored the magnetometer readings entirely, using the rest of the IMU data instead.

Upon startup, the Teensy 4.0 initializes a small round TFT display, and draws the usual compass rose with North at the top of the display. Any motion after this will update the heading display accordingly, with [Don] noting the IMU has a fast update rate of 200 Hz for excellent motion tracking. The device does not self-calibrate to magnetic North; instead, an encoder can be used to calibrate the device to match a magnetic compass you have on hand. Or, you can just ensure it’s already facing North when you turn it on.

Advertisement

Thanks to the power of the Teensy 4.0 and the rapid updates of the BNO085, the display updates are nicely smooth and responsive. However, [Don] notes that it’s probably not quite an aircraft-spec build. We’ve featured some interesting investigations of just how much you can expect out of MEMS-based sensors like these before, too.

Advertisement

Source link

Continue Reading

Tech

Xbox surprise: Microsoft reveals ‘Project Helix’ as the codename of its next console

Published

on

(Xbox Image)

In the days leading up to one of the games industry’s bigger trade conferences, Microsoft has quietly unveiled the code name for its next-generation Xbox console: Project Helix.

The name appeared without initial fanfare in a post on X on Thursday morning.

Xbox CEO Asha Sharma, who just replaced longtime leader Phil Spencer, followed up in a post on her own account, in which she briefly discussed her team’s “commitment to the return of Xbox.” Sharma also noted that Project Helix will “lead in performance” and “play your Xbox and PC games.”

Next week marks the annual Game Developers’ Conference in San Francisco, which has gained some prominence for news and announcements in recent years. It’s possible that some new information about this next-gen Xbox will come out of this year’s GDC, which is both Sharma’s first time at the show and her first time attending as the head of Xbox. Sharma reportedly has plans to meet with both partners and studios while at GDC.

That marks the end of the information about Project Helix that’s currently publicly available. The most remarkable fact about it for now may simply be that it exists, in the face of persistent rumors that Microsoft’s executives would like to sunset Xbox entirely and an ongoing memory shortage caused by the rise of AI data centers.

Advertisement

Despite industry expectations, it looks like Microsoft’s games division plans to stick it out for at least one more console generation. The start of that generation may be pushed off a couple of years from its initially rumored late-2027 starting point, as RAM is currently getting scarcer on the market, but whenever it begins, it looks like Xbox will still be there.

Source link

Advertisement
Continue Reading

Tech

Linux Hotplug Events Explained | Hackaday

Published

on

There was a time when Linux was much simpler. You’d load a driver, it would find your device at boot up, or it wouldn’t. That was it. Now, though, people plug and unplug USB devices all the time and expect the system to react appropriately. [Arcanenibble] explains all “the gory details” about what really happens when you plug or unplug a device.

You might think, “Oh, libusb handles that.” But, of course, it doesn’t do the actual work. In fact, there are two possible backends: netlink or udev. However, the libusb developers strongly recommend udev. Turns out, udev also depends on netlink underneath, so if you use udev, you are sort of using netlink anyway.

If netlink sounds familiar, it is a generic BSD-socket-like API the kernel can use to send notifications to userspace. The post shows example code for listening to kernel event messages via netlink, just like udev does.

When udev sees a device add message from netlink, it resends a related udev message using… netlink! Turns out, netlink can send messages between two userspace programs, not just between the kernel and userspace. That means that the code to read udev events isn’t much different from the netlink example.

Advertisement

The next hoop is the udev event format. It uses a version number, but it seems stable at version 0xfeedcafe. Part of the structure contains a hash code that allows a bloom filter to quickly weed out uninteresting events, at least most of the time.

The post documents much of the obscure inner workings of USB hotplug events. However, there are some security nuances that aren’t clear. If you can explain them, we bet [Arcanenibble] would like to hear from you.

If you like digging into the Linux kernel and its friends, you might want to try creating kernel modules. If you get overwhelmed trying to read the kernel source, maybe go back a few versions.

Advertisement

Source link

Continue Reading

Tech

Silicon Valley tech vet: ‘No better time to start companies than now’

Published

on

Pablo Casilimas (left), founding partner at OneSixOne Ventures, with Sudheesh Nair, co-founder and CEO of TinyFish. (GeekWire Photo / Taylor Soper)

The AI moment is not just another tech cycle — it’s one of the best openings founders have seen in years.

That was the message from Sudheesh Nair, a longtime Bay Area tech leader and co-founder of enterprise web agent startup TinyFish, speaking Thursday at a Seattle Enterprise AI Summit event hosted by OneSixOne.

“There is no better time to start companies than now,” he said. “It’s just magical.”

He believes the AI boom could produce the same kind of lasting infrastructure and category-defining companies that came out of earlier economic and technology shifts. Nair said this wave may be as significant as the internet, and possibly even bigger, because “for the first time, reasoning can be on tap.”

He added: “The way I think of it is, completely be constrained by your imagination — but nothing else.”

Advertisement

Nair previously helped scale Nutanix and ThoughtSpot. In 2024 he launched TinyFish, which raised $47 million last year to build infrastructure for AI agents to operate across the web. “I couldn’t stand on the sidelines,” he said.

He likened today’s moment to a gold rush, noting that most of the enduring outcomes from 1849 were second‑order products and infrastructure: durable jeans, safer elevators, modern banking systems. He said these were built not for the gold rush, but because of the gold rush.

Nair pushed back on the instinct to wait for clarity in a fast‑moving market where even frontier AI labs are still figuring out how their models behave. “No one who knows what the heck is happening,” he said.

But Nair also was careful not to romanticize startups. He said company-building is not for everyone, and noted that some people are better suited to join startups or build inside larger organizations. His broader point was that the tools, the pace of change, and the raw opportunity around AI have created a rare moment for people willing make the startup leap.

Advertisement

“If you just happen to have a pickaxe and shovel, the best thing might be to just jump in,” Nair said.

Source link

Continue Reading

Tech

Fewer weddings, falling sales force The Chinese Wedding Shop to adapt

Published

on

Fewer couples are getting married, and it has impacted The Chinese Wedding Shop’s sales

Marriage has long been seen as an important union between two families across cultures. But in Singapore, fewer couples are choosing to tie the knot.

Recently released figures show that marriages in Singapore fell by about 6.2%, from 26,328 in 2024 to 24,687 in 2025. This decline follows a broader drop after the country hit a record peak of 29,389 marriages in 2022.

total number of marriages in singapore from 2020 and 2025total number of marriages in singapore from 2020 and 2025
After a 30% increase from 2020 to 2022, there has been an almost 16% drop in the total number of marriages in Singapore since 2022./ Data from the Singapore Department of Statistics

But this trend doesn’t just reflect shifting social priorities in the city-state—it’s forcing Singapore’s wedding industry, from banquet services to bridal studios, to rethink their strategies. And for niche retailers like The Chinese Wedding Shop, they need to find a way to balance tradition and staying relevant in a market where fewer people are saying “I do.”

Vulcan Post speaks to co-founder Michelle Neo on how The Chinese Wedding Shop, a specialist in traditional Chinese wedding products, is navigating a wedding recession.

The Chinese Wedding Shop has been around for almost 20 years

Michelle first established The Chinese Wedding Shop with her husband in 2009, investing S$400,000 of their savings to open their first store at Ang Mo Kio. From the start, they positioned the shop as a one-stop destination for couples seeking items for traditional Chinese wedding customs.

Advertisement

One example is the Guo Da Li (过大礼), a ceremony where the groom’s family presents wedding gifts to the bride’s family as a sign of respect as sincerity.

The Chinese Wedding Shop’s Guo Da Li package./ Image Credit: The Chinese Wedding Shop

Back then, the co-founder shared that there was strong demand for such products.

“At that time, many of our friends who were getting married were extremely stressed trying to source traditional Guo Da Li items,” said Michelle. “They had to run from shop to shop, often with little guidance, and were worried about ‘doing it wrong’ in front of the elders.”

Beyond retail, the business also guides couples through traditional wedding customs. Each visit starts with a conversation to understand the couple’s background, which includes details like:

  1. Dialect group
  2. Family expectations
  3. Wedding timeline
  4. How traditional or modern they wish the ceremony to be

After consolidating this information, the team guides customers step-by-step through the customary sequence, explaining the essentials and optional items, and how certain practices can be simplified or adapted.

“Our focus is to ensure couples feel confident and reassured, rather than overwhelmed,” emphasised Michelle. These consultations helped the business build credibility and eventually expand to five locations across Singapore.

Advertisement

Adapting to a shrinking market

The Chinese Wedding Shop’s store at Ang Mo Kio./ Image Credit: Rong Yi Lim, Amy Yanling Charles via Google Images

But shifting wedding trends over the past few years have forced the business to adapt.

Aside from the declining number of marriages, it has also become more expensive to hold weddings in Singapore. Banquet prices, for instance, increased as much as 10% in 2022 amid inflation, prompting many couples to opt for smaller, more intimate ceremonies.

While she did not disclose figures, Michelle shared that these trends have gradually reduced overall sales volumes. Customers have also become more intentional with their spending, carefully weighing what’s essential and what’s not.

“Previously, couples were more worried about following traditions strictly. Today, they are more focused on why certain customs exist and how they can adapt them meaningfully without it being unnecessarily complex,” said Michelle.

The Chinese Wedding ShopThe Chinese Wedding Shop
Image Credit: The Chinese Wedding Shop/ Junhong Khang via Google Images

To combat the decline, the shop has gradually introduced new strategies: diversifying its curated traditional wedding sets, offering rentals of individual items like wedding baskets, and creating more flexible packages that let couples personalise dowry sets and other ceremonial essentials.

As more consumers shift their shopping habits online and value convenience in acquiring products, particularly after the COVID-19 pandemic, the business also started selling its products online in 2020, both through its own website and e-commerce platforms like Shopee and Lazada.

Advertisement

“These new streams helped offset the drop in traditional transactions,” said Michelle, adding that the shift has pushed the business to “innovate faster” and “serve couples better” rather than relying on tradition alone.

Beyond these initiatives, the shop has embraced a one-stop wedding approach, aiming to position itself as a go-to destination where couples can source more than just traditional items.

For instance, the company also facilitates wedding cake and pastry orders by partnering with local bakeries such as Baker’s Brew, Tong Heng, and Thye Moh Chan.

Another way the shop is positioning itself as a one-stop wedding destination is by expanding beyond retail into an advisory and educational platform. Social media has become a key channel for the business to educate younger couples about traditional wedding customs.

Advertisement
In this video, Michelle breaks down what is needed for a Teochew family to prepare for their Guo Da Li ceremony.

“The goal is to reduce stress for couples while keeping traditions meaningful, not burdensome,” she added.

Diversification is key to survival, but weddings remain their bread and butter

the Chinese wedding shop event the Chinese wedding shop event
Michelle speaking at a wedding fair as a vendor./ Image Credit: The Chinese Wedding Shop

Since renewing its offerings post-pandemic, Michelle shared that they have been well received by both couples and parents alike, though she did not elaborate further.

Even so, the shrinking number of marriages means the overall market is likely to continue contracting, raising the question of whether the company should diversify beyond weddings.

Michelle and her team have explored this potential, considering expansions into other Chinese traditions—such as selling festive banners and red packets for Chinese New Year—but plans aren’t concrete yet, and any move into new areas would need the same level of cultural sensitivity, knowledge, and relevance.

Weddings continue to be the business’s bread and butter as of now, as the credibility they have gained over the years allowed them to establish a niche in Singapore’s crowded wedding scene.

Advertisement

“For now, our priority is to deepen our wedding-related offerings, such as rental sets for specific uses and modernised solutions, before extending into other areas.”

  • Learn more about The Chinese Wedding Shop here.
  • Read more stories we’ve wrote on Singaporean businesses here.

Featured Image Credit: The Chinese Wedding Shop

Source link

Advertisement
Continue Reading

Tech

HiFiMAN Arya & HE1000 WiFi Debut at CanJam NYC 2026 Bringing Planar Magnetic Headphones Into the Wireless Era

Published

on

The market for high end wireless headphones has expanded rapidly over the past few years. What was once dominated by mainstream Bluetooth models has evolved into a category that now includes serious audiophile contenders from brands such as Focal, Bowers & Wilkins, DALI, Mark Levinson, and Sennheiser. These companies have demonstrated that wireless headphones can deliver a level of performance that appeals to listeners who once insisted on wired designs and dedicated headphone amplifiers.

HiFiMAN is now pushing deeper into that space with the introduction of the HE1000 WiFi and Arya WiFi, two open back planar magnetic headphones that rely on Wi-Fi rather than Bluetooth as their primary wireless connection. The company has experimented with wireless concepts before, but these new models represent a more ambitious attempt to bring high bandwidth wireless audio to planar magnetic designs.

hifiman-he1000-wifi-headphones-lifestyle
HiFiMAN HE1000 WiFi

HiFiMAN has not announced pricing yet, but the company has indicated that both models will sit closer to the HE1000 Unveiled and Arya Unveiled in its lineup rather than its flagship tier. Both headphones are scheduled to begin shipping next month and will be demonstrated publicly at CanJam NYC 2026 this weekend, where we will have an opportunity to spend time listening to both models.

According to HiFiMAN, the key difference between these headphones and typical wireless designs is the use of Wi-Fi for audio transmission. Bluetooth’s limited bandwidth has long constrained wireless audio quality, while the Wi-Fi connection used here is designed to support full resolution lossless audio streams without compression.

Advertisement

Both headphones incorporate HiFiMAN’s proprietary Hymalaya R2R DAC, integrated amplification inside the earcups, and planar magnetic drivers based on the company’s established technologies.

hifiman-arya-wifi-headphones-lifestyle-woman
HiFiMAN Arya WiFi

Hymalaya What?

The Hymalaya DAC is HiFiMAN’s proprietary digital to analog converter built around a classic R2R ladder architecture, a design approach favored in many high end audio systems for its natural timing and accurate signal conversion. Unlike the delta sigma DAC chips used in most modern headphones and wireless devices, an R2R DAC converts digital audio using a network of precision resistors that translate binary data directly into analog voltage. This approach can deliver excellent transient response and tonal accuracy, but it is traditionally more complex and power hungry than conventional DAC designs.

HiFiMAN developed the Hymalaya DAC to overcome those limitations by combining the R2R ladder with an FPGA controlled architecture and extremely low power consumption. The result is a compact DAC capable of supporting high resolution audio formats, including PCM up to 768 kHz and native DSD, while drawing far less power than traditional ladder DACs. That efficiency allows HiFiMAN to integrate the technology into portable gear and wireless headphones.

In products such as the HE1000 WiFi and Arya WiFi, the Hymalaya DAC works alongside a built in amplifier to convert digital audio directly inside the headphone. This self contained signal chain allows the headphones to operate more like a complete playback system, handling the digital conversion and amplification internally rather than relying on the DAC and amplifier inside a phone or computer.

Advertisement

HiFiMAN HE1000 WiFi

hifiman-he1000-wifi-headphones-angle-left

The HE1000 WiFi is an open back planar magnetic headphone that combines HiFiMAN’s familiar driver architecture with onboard digital processing and wireless connectivity. The design incorporates the company’s Nano Diaphragm driver paired with its Stealth Magnet system, a magnet structure intended to reduce wave diffraction and maintain a more consistent sound wave path.

Inside the earcups is a custom Class A/B balanced amplifier working alongside HiFiMAN’s Hymalaya R2R DAC, which converts incoming digital audio streams directly within the headphone. This approach allows the headphone to function more like a self contained playback system rather than relying on the amplification stage of an external device.

hifiman-he1000-wifi-headphones-back

The HE1000 WiFi connects through a dedicated Wi-Fi network created by the headphone itself. Users simply select the headphone from the WiFi menu on a smartphone or tablet and stream audio directly to the headphone. This wireless link supports full resolution audio transmission and is capable of handling high bandwidth formats including PCM up to 768 kHz and native DSD up to DSD512.

Advertisement. Scroll to continue reading.

HiFiMAN lists a frequency response of 8 Hz to 65 kHz with THD + N rated at 0.009 percent at 32 ohms when the DAC and amplifier are operating together. Channel separation is specified at 105 dB at 1 kHz, and the headphone weighs 452 grams. The HE1000 WiFi can operate in Wi-Fi, USB audio, or Bluetooth modes and charges via USB Type-C with a typical charging time of three to four hours. Standby time is rated at more than 30 days.

HiFiMAN Arya WiFi

hifiman-arya-wifi-headphones-angle

The Arya WiFi uses a similar architecture but incorporates HiFiMAN’s Super Nano diaphragm driver, a thinner variation of the company’s planar driver design intended to improve transient response and overall efficiency. As with the HE1000 WiFi, the Arya WiFi also uses Stealth Magnet technology, integrated amplification, and the Hymalaya R2R DAC.

Like its sibling, the Arya WiFi connects directly to smartphones and tablets through a Wi-Fi network created by the headphone. Once connected, audio streams are transmitted at full resolution without relying on Bluetooth compression. Support for high resolution audio formats is extensive, with PCM playback up to 768 kHz and native DSD up to DSD512.

Advertisement

HiFiMAN specifies a frequency response of 8 Hz to 55 kHz with THD + N rated at 0.009 percent at 32 ohms when the DAC and amplifier are operating together. Channel separation is listed at 105 dB at 1 kHz and the headphone weighs 452 grams.

The Arya WiFi supports Wi-Fi streaming, Bluetooth 5.1 connectivity with SBC, AAC, aptX, aptX HD, and LDAC codecs, and USB-C wired playback. Battery life is rated at approximately 6.5 to 7.5 hours when operating in Wi-Fi mode and up to 23 hours when using Bluetooth. Charging takes roughly three to four hours, and standby time is listed at more than 30 days.

hifiman-arya-wifi-headphones-back

Comparison

Arya Unveiled Arya WiFi HE1000 Unveiled  HE1000 WiFi
Product Type Headphones Headphones Headphones Headphones
Price $1,449 ? $2,299 ?
Design Open-back Open-back Open-back Open-back
Driver Type Planar Magnetic with Stealth Magnets Planar Magnetic with Stealth Magnets. Planar Magnetic with Stealth Magnets Planar Magnetic with Stealth Magnets
Frequency Response 8Hz – 65kHz 8Hz – 55kHz 8Hz – 65kHz 8Hz – 65kHz
Impedance 27 Ohms Not indicated 28 Ohms Not indicated
Sensitivity 94dB Not Indicated 95dB Not indicated
Diaphragm Nanometer thickness Nanometer thickness Nanometer thickness Nanometer thickness
THD+N N/A DAC: 0.0055%@-9dB, 1kHz
DAC + Amp: 0.009% @32 ohms, 1kHz
N/A DAC: 0.0055%@-9dB, 1kHz
DAC + Amp: 0.009% @32 ohms, 1kHz
Channel Separation N/A 105dB @1kHz N/A 105dB @1kHz
Connection Modes Wired only WiFi, USB Audio, Bluetooth Wired only WiFi, USB Audio, Bluetooth
Battery Life (WiFi) N/A 6.5-7.5 hours N/A 6.5-7.5 hours
Battery Life (BT) N/A 23 hours N/A 23 hours
Charging Time N/A 3-4 hours N/A 3-4 hours
Standby Time N/A 30+ days N/A 30+ days
Audio Formats N/A PCM 44.1kHz-768kHz, 32/24/16Bit, DSD native 64-512 N/A PCM 44.1kHz-768kHz 32/24/16Bit, DSD native 64-512
Bluetooth Codecs N/A SBC, AAC, aptX, atpX HD, LDAC N/A SBC, AAC, aptX, atpX HD, LDAC
Weight 413g 452g 450g 452g

The Bottom Line

The HE1000 WiFi and Arya WiFi take a different approach to wireless headphone design by focusing on bandwidth and signal integrity rather than convenience features. By combining planar magnetic drivers with a built-in Class A/B amplifier, HiFiMAN’s Hymalaya R2R DAC, and a Wi-Fi based audio connection, these headphones are designed to handle high resolution audio without relying solely on Bluetooth compression.

That said, these are clearly not lifestyle wireless headphones. Both models use open-back earcups, which means they leak sound and provide no isolation from the outside world. They are better suited for listening at home, where wireless freedom can be useful without the compromises that normally come with portable wireless designs.

HiFiMAN has not revealed pricing yet, but both models appear positioned for listeners who want something closer to a traditional audiophile headphone system that happens to operate wirelessly. We expect to learn more once we have the opportunity to spend time with both models at CanJam NYC 2026 this weekend.

Advertisement

Source link

Continue Reading

Tech

7 Laptop Docking Stations to Unlock the Full Desktop Experience (2026)

Published

on

Other Laptop Docking Stations to Consider

We test a lot of laptop docking stations and, quite frankly, most of them are … fine. They’re fine! We get into the nitty-gritty for specific use cases to find the best, but that leaves a bunch of devices that are great options even if they don’t make our top picks. Here’s a selection of some of our favorites, past favorites, or just alternatives to our picks above.

Front and back view of black rectangular device with multiple ports

Satechi Triple 4K Docking Station

Photograph: Eric Ravenscraft

Satechi Triple 4K Docking Station for $300: Satechi’s Triple 4K Docking Station supports three monitors, and while the first display output is HDMI-only, the two others can be connected via either HDMI or DisplayPort. Each display supports up to a maximum of 4K resolution at 60 Hz, which is more than enough for most office or media work, though don’t expect it to support the high frame rates you might want for gaming. —Eric Ravenscraft

Plugable USB-C Dual HDMI Display Dock for $120: Sometimes, all you need is a quick and easy way to plug your laptop into a couple of monitors—preferably without spending hundreds of dollars. It supports two monitors via HDMI and includes a healthy array of ports to connect the rest of your accessories. So, while there are certainly more up-to-date options out there, this is an affordable way to get some basic connectivity.

Advertisement

Kensington Triple Video Mobile Dock for $83: A mobile docking station might sound like a contradiction, but in the case of the tiny Kensington Triple Video Mobile Dock, it makes a lot of sense. Using the included two HDMI ports and the DisplayPort, this little device can power three 1080p displays or two 4K displays—all at 60 Hz. It also has a USB-C port with 85 watts of pass-through charging, which is enough to charge most laptops. The downside is that it only supports a single 4K monitor on MacBooks, as the dual 4K support is only for Windows devices.

Image may contain Electronics Hardware Modem Router Computer Laptop and Pc

Sonnet Echo 13 Thunderbolt 5 Dock

Courtesy of Luke Larsen

Sonnet Echo 13 Thunderbolt 5 Dock for $440: Sonnettech’s Echo 13 was one of the first Thunderbolt 5 docks out on the market. As it turns out, it’s also one of the most unique offerings out there, including just about every port imaginable as well as an integrated M.2 storage slot with a Kingston SSD inside. While handy, I don’t like that the drive isn’t user accessible. The cheap plastic chassis is disappointing for the price, too.

Advertisement

Ivanky FusionDock Max 1 Thunderbolt 4 Docking Station for $380: It’s hard to overstate how excessively luxurious this dock is. It’s specifically for MacBook Pro users and can tackle up to four 6K screens, something only recent MacBook Pros support. The Ivanky FusionDock Max 1 accomplishes this via four USB-C Thunderbolt 4 ports, each capable of 40 Gbps data transfer speeds. If you’re building the beefiest media workstation you can for the most powerful MacBook Pros on the market, this is it. Just put it all on the company card, because it’s expensive. —Eric Ravenscraft

Ugreen Revodok Max 213 Thunderbolt 4 for $228: Few people need an 8K display—or multiple 4K displays—but those who do know how difficult it can be to find gear that supports their needs. Fortunately, the Revodok Max 213 from Ugreen fits that bill. The DisplayPort 1.4 port can handle up to an 8K display at 30 Hz. It also comes with a Thunderbolt 4 upstream port that runs to your laptop, and, more importantly, a pair of downstream Thunderbolt 4 ports, which is another rarity among the docks I’ve tested. If you need to transfer a ton of media from various sources into one machine, connected to seriously high-res displays, this is the dock that can handle it all. —Eric Ravenscraft

Advertisement

Do You Need a Docking Station or a USB Hub?

This is the big question you’ll want to answer before moving forward. Chances are you know if you need a full-on docking station rather than just a USB hub, but I’ll explain the differences in case you’re on the fence. A simple USB hub will handle most people’s needs, as the device will expand the potentially very limited ports of your laptop. If you own a MacBook Air, for example, a USB hub functions as a multiport adapter to get you HDMI, USB-A, and more. They’re intended to be portable and many of these hubs even include HDMI to connect an external display.

A laptop docking station will do quite a lot more. These devices are meant to be stationary on a desk, enabling you to access your entire workstation setup with just a single USB-C cable. The docking station is meant to stay put and have all your monitors and accessories plugged into it. Because of that, they require significantly more power and are often bundled with a large power brick. They are often quite expensive. So, while both accessories connect your laptop to more ports, they serve two different functions.

There are now lots of docks and hubs that blur the lines, offering multi-monitor support in a very small package. These can be useful, but a full docking station will still give you the fastest transfer speeds, the most ports, and better external display support all through a single cable.

Advertisement

What Ports Should Your Docking Station Have?

Figuring out the right connections you need for your setup can be daunting, and the confusing, arcane USB terminology only makes it worse. You can check out our explainer on parsing USB terms here. For the short version, here are the basics you should keep in mind:

Check your ports’ speeds, and don’t rely on version numbers. For a lot of confusing reasons, ports labeled as USB 3.0, 3.1, and 3.2 can all have the same speed or wildly different speeds. For this reason, docking station manufacturers have recently started opting to add speeds (usually written like “5 Gbps”) directly onto individual ports. Use the faster ports for transferring data, and slower ports for things like your keyboard and mouse.

Thunderbolt is best for lightning-fast data transfers, or high-res displays. Thunderbolt is like a supercharged version of USB, and it even uses USB-C ports. However, Thunderbolt ports are capable of transferring massive amounts of data. This makes it ideal for things like moving uncompressed video files around, as well as things like 4K (or even 8K) displays or lower-resolution monitors with extra high refresh rates.

Advertisement

Keep in mind your power needs. Most laptop docking stations will have some form of power connector and USB Power Delivery (or USB-PD) that can send power through to your laptop. You’ll also sometimes see this referred to as “pass-through charging.” Most devices you connect will require their own power as well, especially if you want to connect monitors or charge your phone and tablet. If you plan to connect a lot of power-hungry devices, make sure your docking station can handle your needs.

Upstream and downstream ports. You’ll often see USB ports labeled either as upstream or downstream. The data either flows up to the source (your PC or docking station) or down from the source. An upstream USB port means it’s meant for transferring data from a peripheral (like an external drive) to your PC, whereas a downstream USB port only works in the opposite direction.

All the docks in our recommendations are compatible with both Mac and Windows, unless otherwise noted. But there are lots of hubs and docks out there that have certain limitations on Mac, such only supporting mirroring mode in dual monitors. That’s not a problem on Windows.

On lower-end Macs there is a limitation on the number of screens. There is a way aroudn this if you use a dock that supports DisplayLink. Software can create a “virtual GPU” that tricks the system into allowing for additional displays so you can drive more displays than is typically allowed on a MacBook Air, for example. In my experience, however, the performance can be shoddy, and you may run into issues with latency.

Advertisement

Is Thunderbolt 5 Worth It?

The first Thunderbolt 5-capable PCs, docks, and accessories came out in 2024. Thunderbolt 5 can now handle three 4K displays at 144 Hz (or two 4K displays at 240 Hz) and can deliver up to 240 watts of power. That’s dramatic, up from the 100 watts of Thunderbolt 4. Thunderbolt 5 allows you to fully juice up more powerful devices, such as gaming laptops or the 16-inch M4 Max MacBook Pro.

Thunderbolt 5 docks are all backward compatible, so there’s no worry about outdoing the peripherals you currently own. As is true in many scenarios, buying the latest specs are often worth it to avoid having to upgrade later. However, the adoption of Thunderbolt 5 has been slower than I’d hoped for. And if you don’t have a Thunderbolt 5 laptop to connect to, you won’t get the full benefit that Thunderbolt 5 offers.

While there’s a breadth of Thunderbolt 5 docs out in the world (many of which you’ll see on this list), the biggest disappointment has been in the lack of Thunderbolt 5 accessories to come out over the past year. It’s still very difficult, for example, to find a Thunderbolt 5 SSD, to achieve those faster speeds. Thunderbolt 5 docks are sometimes only marginally more expensive than previous-generation options, so they’re often worth buying for the improved display support or higher power delivery. For example, CalDigit’s TS5 is only $20 more than the TS4.

Advertisement

Power up with unlimited access to WIRED. Get best-in-class reporting that’s too important to ignore for just $2.50 $1 per month for 1 year. Includes unlimited digital access and exclusive subscriber-only content. Subscribe Today.

Source link

Advertisement
Continue Reading

Tech

OnePlus’ next compact phone will outlast most big flagships thanks to its monsterous battery size

Published

on

In the past, smartphones with smaller form factors usually came with a couple of compromises, and battery life was often the first casualty. But OnePlus’ next palm-friendly flagship might just outlast most of your big premium devices.

Going big on battery and charging

The company has confirmed that the upcoming OnePlus 15T will pack a massive 7,500mAh battery, which dwarfs the cells found in tall phones like the Galaxy S26 Ultra. After confirming a major camera update, OnePlus China president Li Jie Louis revealed the battery and charging specs of this device.

The details were shared in a post on the Chinese social media platform, Weibo. According to the executive, the OnePlus 15T will feature what the company calls a “Glacier Battery”, which is a silicon-carbon-based battery technology that is designed to pack higher capacity without making the device significantly thicker.

A big battery is only part of the story. The OnePlus 15T will also support 100W wired and 50W wireless fast charging, ensuring quick charging and shorter downtime. The giant battery is quite impressive considering the device is expected to sport a 6.3-inch display, similar to the Galaxy S26 and Pixel 10.

Compact size but big on features

Aside from the huge battery, this device will even offer flagship-level performance. It is expected to be equipped with Qualcomm’s Snapdragon 8 Elite Gen 5 SoC and will likely run on the Android 16 OS out of the box. Louis also confirmed a notable upgrade in design with the OnePlus 15T featuring IP66, IP68, IP69, and IP69K ratings for water and dust resistance. To recall, the OnePlus 13T only shipped with an IP65 rating for protection against the elements.

Advertisement

Source link

Continue Reading

Tech

FBI investigates breach of surveillance and wiretap systems

Published

on

FBI

The U.S. Federal Bureau of Investigation (FBI) confirmed on Thursday that it’s investigating a breach that affected systems used to manage surveillance and wiretap warrants.

While the federal law enforcement agency declined to share more details regarding the incident’s scope and overall impact, it said that the incident has already been addressed.

“The FBI identified and addressed suspicious activities on FBI networks, and we have leveraged all technical capabilities to respond,” the law enforcement agency told CNN, which first reported the incident.

On Thursday, CNN also cited an anonymous source saying the breach affected FBI systems used to manage wiretapping and foreign intelligence surveillance warrants.

Advertisement

BleepingComputer reached out to an FBI spokesperson for more details, but a response was not immediately available.

While it’s unclear at the moment whether this incident is also connected, Chinese hackers part of a state-backed threat group tracked as Salt Typhoon have also compromised U.S. federal government systems used for court-authorized network wiretapping requests in 2024.

The incident came to light after Salt Typhoon breached the networks of telecommunications providers in the U.S. (AT&T, Verizon, Lumen, Charter Communications, Consolidated Communications, Comcast, Digital Realty, and Windstream), as well as dozens of other countries.

While inside the U.S. telecom firms’ networks, the hackers also gained access to the “private communications” of some U.S. government officials.

Advertisement

In November 2021, the FBI’s email servers were also hacked to distribute spam emails impersonating the bureau that warned recipients about fake cyberattacks.

The FBI also revealed in February 2023 that it was investigating malicious cyber activity involving an FBI New York Field Office computer system that was used to investigate child sexual exploitation.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025