Finding yourself far from a wall socket when your phone hits five percent is positively nervewracking. If you stash a portable battery in your bag, you can avoid that feeling altogether. But there are thousands of power banks out there and it can be tough to pick the right one for what you need. I’ve spent a few years testing dozens of batteries and found the best power banks for different scenarios. Whether you need a quick reup for your phone or a huge brick to keep your laptop alive, you’ll find something fitting here.
Best power banks for 2026
Photo by Amy Skorheim / Engadget
Capacity: 10,000mAh | Maximum Output: 15W (wireless) | Ports: One USB-C in/out | Included cable: USB-C to USB-C | Number of charges iPhone 15: 1.64 | Charge time iPhone: 4 to 100% in 2h 26m and 0 to 70% in 1h 8m | Weight: 8.82 oz | Dimensions: 4.22 x 2.71 x 0.78 in
Anker’s MagGo Power Bank was one of the first Qi2-certified products to come on the market, and the new standard has made the brand’s popular MagSafe/kickstand model much faster. It’s the most well-rounded best MagSafe battery I’ve tested, but if you’re looking for other options, we have an entire MagSafe power bank guide to peruse.
Advertisement
It brought an iPhone 15 from near-dead to half-full in about 45 minutes. For reference, it took our former top pick in this category an hour and a half to do the same. It’s similarly faster than Anker’s previous generation of this model, the 633, as well. After that initial refill, the MagGo 10K had enough left over to get the phone up to 70 percent on a subsequent charge.
In addition to faster charging speeds, this wireless power bank adds a LCD display to indicate the battery percentage left in the bank, plus the approximate amount of time before it’s full (when it’s refilling) or empty (when it’s doing the charging). A strong MagSafe connection makes it easy to use the phone while it charges and the small kickstand creates a surprisingly sturdy base for watching videos and the like. If you twist the phone to landscape, StandBy mode kicks in.
The power bank did a fine job of charging our Galaxy S23 Ultra — though that model doesn’t have Qi2 support. New Pixel 10 phones do, so those handsets will charge at a faster rate with this battery — and benefit from zero-effort magnetic alignment. The MagGo also has a USB-C port, so if you need to fill up something without wireless capabilities, you can.
Advertisement
Pros
Qi2 tech enables extra fast wireless charging
Sturdy kickstand props up iPhones as it charges
LED display for battery percentage
Cons
More expensive than other MagSafe packs
Photo by Amy Skorheim / Engadget
Capacity: 5,000 mAh | Maximum Output: 22.5W | Ports: One USB-C and one USB-C connector | Cable: USB-C to USB-C | Number of charges Galaxy S23 Ultra: 0.65 | Charge time: 0 to 65% in 1h 2m | Weight: 3.5 oz | Dimensions: 3.03 x 1.45 x 0.98 in
The Anker Nano power bank has impressive power delivery for its size. It’s the exact size and shape of the lipstick case my grandma used to carry and has a built-in USB-C connector that folds down when you’re not using it. That means that, in addition to being ultra-portable, you don’t need to remember to grab a charging cable when you toss it in your bag. There’s also a built-in USB-C port that can refill the battery or be used to fill up a different device with an adapter cable. Four indicator lights let you know how much charge remains in the battery.
Advertisement
In my testing, the 5,000mAh battery provided enough charge to get a depleted Galaxy S23 Ultra back up to 65 percent in about an hour. That’s relatively quick, but the Nano is also small enough that, with its sturdy connection, you can use your phone while it’s charging without feeling too awkward. The charger’s small size also makes it a good pick for recharging earbuds.
For a little more juice and an equally clever design, Anker’s 30W Nano Power Bank is a good option for delivering a single charge. It’s bigger in size and capacity (10,000mAh) and includes a display indicating the remaining charge percentage. The built-in USB-C cable doubles as a carry handle, which is a nice touch. That cable is in/out and there’s another USB-C in-out port in addition to an out-only USB-A port.
Cons
Advertisement
Small enough to get misplaced
Photo by Amy Skorheim / Engadget
Capacity: 10,000mAh | Maximum Output: 30W | Ports: One USB-C in/out port, one USB-C in/out cable, wall prongs | Cable: Built-in USB-C | Number of charges iPhone 15: 1.86 | Charge time iPhone: 5 to 100% 1h 53m and 5 to 91% 1h 5m | Number of charges Galaxy S23 Ultra: 1.45 | Charge time Galaxy: 5 to 100% 1h 2m, 5% to 50% 23m | Weight: 8.8 oz | Dimensions: 4.25 x 2.0 x 1.22 in
The toughest thing about using a power bank is remembering to bring it along. You also have to remember a cable and, if you want to refill the bank itself, a wall adapter. Anker’s 10K Fusion solves two of those problems with its attached USB-C cable for your gadget and foldable two-prong plug for charging the bank itself (yes, you still have to remember to bring the thing with you).
Despite the attachments, it’s compact, just a smidge wider than a stick of butter, yet still packs a 10,000 mAh capacity. The 30 watts of power enabled the “Super Fast Charging” message on a Galaxy S23 android phone and got it from five percent to full in just over an hour. In just 20 minutes, the 10K Fusion bumped a near-dead iPhone 15 to 45 percent. Though it slowed down towards the end of the Apple handset’s charge.
Advertisement
There’s an additional USB-C port for charging devices that may require a different cable and both it and the built-in connector can be used to refill the power bank. The cable makes a neat loop that looks a lot like a handle. Even though I’m wary of carrying a device around by its cord, it felt sturdy enough.
The onboard display indicates the Fusion’s remaining charge in terms of a percentage and was one of the more accurate readouts I’ve tested. I also like the corduroy texture along the sides — very fidget-worthy.
Our previous pick in this low-capacity category, the BioLite Charge 40 PD, is still an excellent choice — it’s durable, delivers a quick charge and looks cool. I use it often myself. Plus BioLite has an admirable mission of bringing energy to places where it’s otherwise scarce. But Anker’s new release, the 10K Fusion simply delivers a faster charge and more features at a lower price.
Advertisement
Pros
Has a built-in USB-C cable
Also has built-in wall prongs
Display is fairly accurate
Affordable
Cons
iPhone charging is slower than other banks in its range
Amy Skorheim for Engadget
Capacity: 20,000mAh | Maximumoutput: 30W | Ports: One built-in USB-C in/out cable, one USB-A port, one USB-C port | Cable: USB-C | Number of charges iPhone 15: 3 – 3.5 | Charge time iPhone: 5 to 100% in 2h 6m | Number of charges Galaxy S23 Ultra: 2.5 – 3 | Charge time S23 Ultra: 1h 15m | Weight: 14 oz | Dimensions: 6.06 x 3.0 x 0.99 in
An integrated cable seems to be the hot new feature in portable chargers — and I’m all for it. I can remember times when I’ve had a dead phone and power bank, but no way to connect the two. The Belkin Boost Charge 20K with Integrated Cable is one such bank I’ve tested and also one of the more affordable examples.
Advertisement
It can output a maximum of 30 watts, which doesn’t make it the fastest charger around, but it wasn’t a slouch. It charged a Samsung Galaxy S24 Ultra from near-dead to full in an hour and 15 minutes and bumped an iPhone 15 from five to 87 percent in just over an hour. And the 20,000mAh capacity means it can achieve those numbers around three times over.
In addition to the built-in (and conveniently magnetized) USB-C cable, there are two other ports: an out-only USB-A and an in/out Type C. That means you can technically charge three devices at the same time, but just note that the amount of charge and the time it takes for things to refill will both take a hit.
There’s no digital screen to tell you how much charge remains in the battery, just four indicator LEDs. I’ve certainly found display readouts to be helpful in determining just how much more juice I can squeeze out of a battery, but the lighted pips here are accurate and still useful.
While color options probably won’t make or break your battery pack purchase, I appreciate that the BoostCharge 20K comes in something other than standard black. You can of course get it in that shade, but also in blue, pink or white. The pink of my tester unit was pale and pretty and the matte finish does a good job of staying clean — some black smudges from who-knows-what in my bag came off easily with some rubbing alcohol.
Advertisement
Pros
Built-in USB-C cable is handy
Comes in four color options
Affordable
Great capacity for the price
Cons
Charge isn’t as fast as other banks
Photo by Amy Skorheim / Engadget
Capacity: 20,000mAh | Maximum Output: 65W | Ports: Two USB-C in/out | Cable: USB-C to USB-C | Number of charges iPhone 11: 2.95 | Charge time iPhone: 5 to 100% in 1h 39m average | Number of charges Galaxy S22 Ultra: 2.99 | Charge time Galaxy: 5 to 100% in 59m average | Number of charges iPad Air: 1.83 | Charge time iPad: 5 to 100% in 1h 55m and 83% in 1h 21m | Weight: 12.9 oz | Dimensions: 5.92 x 2.48 x 1.00 in
Advertisement
Nimble’s Champ Pro battery delivers a screaming fast charge and got a Galaxy S23 Ultra from five percent to full in under an hour. That’s faster than every other battery I tested except for Anker’s Laptop Power Bank, our premium pick — and that model costs $30 more. It lent nearly three full charges to both an iPhone and Galaxy device and has enough juice to refill an iPad more than once. The battery pack itself also re-ups from the wall noticeably faster than other models, so it’ll get you out the door quicker.
The company, Nimble, is a certified B-Corp, meaning they aim for higher environmental and social standards and verify their efforts through independent testing. The Champ Pro uses 90 percent post-consumer plastic and comes in packaging made from paper scrap with a bag for shipping back your old battery (or other tech) for recycling.
The unit itself feels sturdy and has a compact shape that’s a little narrower than a smartphone and about as long. The attached adjustable lanyard is cute, if a little superfluous, and the marbled effect from the recycled plastics give it a nice aesthetic. You can charge devices from both USB-C ports simultaneously, and both are input/output plugs.
My only qualm was with the four indicator lights. On a second testing round, it dropped down to just one remaining pip, yet went on to deliver a full fill-up plus an additional top off after that. That said, I’m glad the indicator lights under-estimated the remaining charge rather than the other way around, and the accuracy seemed to improve after subsequent depletions and refills.
Advertisement
Pros
Super fast charging
Made from recycled materials
Sturdy and compact design
Cons
Indicator lights underestimate charge
Amy Skorheim for Engadget
Capacity: 25,000mAh | Maximum total output: 120W | Ports: Wireless pad (15W), two USB-C (100W), one USB-A (15W), one USB-C (15W) | Cable: USB-C to USB-C (100W) | Number of charges iPhone 15: 5 | Charge time iPhone: 5 to 100% in 1h 52m (wired) 2h 38m (wireless) | Number of charges Galaxy S23 Ultra: 4 | Charge time S23 Ultra: 1h 4m | Number of charges iPad Air: 2.2 | Charge time iPad: 5 to 100% in 2h 20m | Number of charges MacBook Pro: 0.75 | Charge time MacBook Pro: 57 m | Weight: 1.28 lbs | Dimensions: 5.5 x 4.4 x 1.38 in
Advertisement
The compact and rounded design of the Biolite Charge 100 Max makes it more packable and conducive to travel than the Lion Eclipse Mag. It was also a touch faster in refilling most devices, but since the Charge 100W is $50 more expensive for slightly less capacity, it earns runner-up status.
In addition to four USB ports (three Type-C and one Type-A) It has a MagSafe-compatible wireless charging pad on one side, with a maximum output of 15 watts. The magnetic hold is enough to keep it in place as it charges, but it’s not as strong as you’ll find on smaller MagSafe batteries — I wouldn’t carry it around during a refill.
The 10 LED pips indicate the remaining charge and I found those to be pretty accurate, though the last pip doesn’t flash before it dies like other batteries. The rubberized texture and yellow accents are a welcome aesthetic change from the techy black look of most larger batteries — and it’s quite nice to hold. There’s also plenty to appreciate about the company itself: a climate neutral-certified B-Corporation that helps bring lights and cook stoves to energy impoverished areas around the world.
Advertisement
Pros
Compact and colorful design
Delivers a quick charge to phones, tablets and laptops
Company is a climate neutral-certified
Cons
More expensive than similar-capacity batteries
Amy Skorheim for Engadget
Capacity: 25,000mAh | Maximumoutput: 165W | Ports: Two built-in USB-C in/out cables, one USB-A port, one USB-C port | Cable: USB-C to USB-C | Number of charges iPhone 15: 4 – 5 | Charge time iPhone: 5 to 100% in 1h 54m | Number of charges Galaxy S23 Ultra: 3.75 – 4 | Charge time S23 Ultra: 52m | Number of charges iPad Air: 1.75 – 2 | Charge time iPad: 5 to 100% in 1h 58m | Number of charges MacBook Pro: 0.68 | Charge time MacBook Pro: 53 m | Weight: 1.31 lbs | Dimensions: 6.18 x 2.12 x 1.93 in
The only thing worse than needing a power bank and not having one is having one but no way to connect it to your device. The Anker laptop power bank with built-in cable forgoes any clever naming scheme, but makes sure you’re never left without a way to charge your stuff.
Advertisement
It has two attached USB-C cables: one attached to the side of the battery that acts as a carrying cable and another retractable cord that extends up to two feet. Both handle in/out functions so you can use them to refill a device or reup the battery itself.
The display tells you the amount of charge remaining in the battery pack as well as the output wattage that’s funneling towards your devices from each port. When refilling the battery, you can see an estimate of how long it will be until the unit is full. Calculating and displaying info like that takes up a bit of power but, in my testing, the unit outputs the same or a higher amount of charge compared with other 25,000 mAh batteries.
It’s an attractive, high-capacity bank, with matte silver exterior and a smaller display area than Anker’s Prime bank (our previous pick for this category). One of my concerns with that battery was the huge display area which was easily scratched. This newer unit feels more durable.
Two built-in USB-C cables so you’re never without a cord
Durable build
Display shows detailed charging information
Delivers a fast charge
Cons
Screen picks up smudges easily
Anker
Capacity: 26,250mAh | Maximum combined output: 300W | Ports: Two USB-C (140W), one USB-A (22.5W) | Cable: USB-C to USB-C (240W) | Number of charges iPhone 15: 5 – 5.5 | Charge time iPhone: 5 to 100% in 1h 41m | Number of charges Galaxy S23 Ultra: 4.3 | Charge time S23 Ultra: 1h 9m | Number of charges iPad Air: 2.5 | Charge time iPad: 5 to 100% in 1h 50m | Number of charges MacBook Pro: 0.83 | Charge time MacBook Pro: 1h 12m | Weight: 1.32 lbs | Dimensions: 6.3 x 1.5 x 2.5 in
Advertisement
I knew it wouldn’t be long before I came across an app-connected power bank — the portable battery landscape is crowded and brands are no doubt looking for ways to stand out. Anker’s latest Prime Power Bank (26K, 300W) does stand out, but it’s not because of the app. Yes, it works, letting you see the remaining charge, how much power is going to a device and other bits of data on your phone. But I can’t imagine this info being important to most people. If it is, the same numbers are available on its built-in display anyway.
What’s actually impressive are the speeds the bank delivers, the large capacity and the extra simple recharging via the optional base. The three ports can be used all at once, with the two USB-C ports delivering up to 140 watts each. It’s tough to think of a scenario where that actually happens, as most devices recharge far below that wattage, but if you ever need to partially charge two high powered laptops at the same time, you can.
More commonly, the battery will simply give phones, tablets and laptops speedy refills. It got a near-dead iPhone 15 to 60 percent in a half hour and delivered more charge to my MacBook Pro than any other battery I’ve tested. The display not only tells you how much charge is left in the battery, it also has a temperature gauge — a wise thing to keep an eye on when it comes to lithium ion batteries.
The attractive and sleek design has a shiny black front where the display lives and a matte silver body. The bank is more compact than most 27,000mAh batteries out there. Anker made the battery a little wider and flatter than the last round of Prime devices, which makes it a bit easier to handle and somehow looks more elegant than the square brick did.
Advertisement
The charging power base is a separate (and optional) purchase, but it makes recharging the battery extra convenient — you just plunk it down and walk away. It’s the same base used with the previous line of Anker Prime batteries, so if you have one already, you’re set. Unfortunately the base costs $110. Combined with the battery, that’s more than $300, but if you want a truly premium power bank, this is it.
Pros
Delivers a super fast charge
Sleek and premium design
Display shows remaining charge and battery temperature
Cons
Pricey, especially with the optional base
Photo by Amy Skorheim / Engadget
Advertisement
Capacity: 15,000mAh | Maximum Output: 32W | Ports: One USB-C in/out, one USB-C in, one USB-A | Cable: USB-A to USB-C | Number of charges iPhone 11: 2.99 | Charge time iPhone 11: 0 to 100% 2h average and 0 to 99% in 1h 45m | Number of charges iPad Air: 1.17 | Charge time iPad: 0 to 100% 2h 23m and 0 to 17% 15m | Weight: 12.8 oz | Dimensions: 5.0 x 1.25 x 3.0 in
Plenty of battery packs are built to withstand drops and other abuse, but very few are waterproof or even water resistance. It makes sense; water and electrical charges aren’t good companions. The Nestout Portable Charger battery has an IP67 rating, which means it can handle being submerged in water for a number of minutes, and Nestout claims a 30-minute dunk in a meter of water shouldn’t interfere with the battery’s operation. I couldn’t think of a likely scenario where a power bank would spend a half hour in three feet of water, but I could see a backpacker traversing a river and submerging their pack for a few minutes, or a sudden downpour drenching all of their gear. So I tested by dropping the battery in a five gallon bucket of water for five minutes. After drying it off, the unit performed as if it had never been wet.
The water resistance comes courtesy of screw-on caps with silicone gaskets that physically keep the water out, so you’ll need to make sure you tighten (but don’t over tighten) the caps whenever you think wetness is in your future. The company also claims the battery lives up to a military-standard shock/drop specification which sounds impressive, but it’s hard to pin down what exactly that means. I figured it should at minimum survive repeated drops from chest height onto a hard surface, and it did.
As for charging speeds, it wasn’t quite as quick as our recommendation for a mid-capacity bank. The Belkin charged an iPhone 15 to 80 percent in under an hour and the Nestout got the smaller iPhone 11 to 80 percent in a little more than that. Another thing to note is that the supplied cable is short, just seven inches total, so you’ll likely want to use your own cord.
Advertisement
Nestout also makes accessories for its batteries, which I found delightful. A dimmable LED worklight snaps on to the top of the battery while a small tripod holds them both up. The portable solar panel reminded me of a baby version of Biolite’s camping panels. Nestout’s version refilled the 15,000mAh bank to 40 percent in under three hours, which sounds slow, but is actually fairly impressive considering the compact size of the panels. This is also a blazingly hot summer, so I’d expect better performance in more reasonable weather.
Pros
Waterproof with the caps secured
Clever accessories (sold separately)
Survived drop tests
Cons
Not the fastest charge times
Included cable is short
What to look for in a portable battery pack
Battery type
Nearly every rechargeable power bank you can buy (and most portable devices) contain a lithium-ion battery. These beat other current battery types in terms of size-to-charge capacity, and have even increased in energy density by eight fold in the past 14 years. They also don’t suffer from a memory effect (where a battery’s lifespan deteriorates due to partial charges).
Flying with portable batteries
You may have heard about lithium ion batteries overheating and catching fire — a recent Hong Kong flight was grounded after just such a thing happened in an overhead bin. Current restrictions implemented by the TSA still allow external batteries rated at 100Wh or less (which all of our recommendations are) to fly with you, but only in your carry-on luggage — they can’t be checked.
Advertisement
Recently, Southwest Airlines was the first in the industry to take that rule one step further. Now, flyers on that airline must keep power banks in clear view when using them to recharge a device. If the portable charger isn’t actively in use, however, it can stay in your carry-on bag in the overhead bin.
Capacity
Power bank manufacturers almost always list a battery’s capacity in milliamp hours, or mAh. Smaller batteries with a 5,000mAh capacity make good phone chargers and can fill a smartphone to between 50 and 75 percent. Larger batteries that can recharge laptops and tablets, or give phones multiple charges, can exceed 25,000mAh and we have a separate guide that covers that entire category.
Unsurprisingly, the prices on most batteries goes up as mAh capacity increases, and since batteries are physical storage units, size and weight go up with capacity as well. If you want more power, be prepared to spend more and carry around a heavier brick.
You might think that a 10,000mAh power bank could charge a 5,000mAh phone to 100 percent twice, but that’s not the case. In addition to simple energy loss through heat dissipation, factors like voltage conversion also bring down the amount of juice that makes it into your phone. Most manufacturers list how many charges a battery can give a certain smartphone. In our tests, 10,000mAh of battery pack capacity translated to roughly 5,800mAh of device charge. 20,000mAh chargers delivered around 11,250mAh to a device, and 25,000mAh banks translated to about 16,200mAh of charge. That’s an average efficiency rate of around 60 percent.
Advertisement
Wireless
Wireless charging, whether through a bank or a plugged-in charging pad, is less efficient than wired connections. But it is convenient — and in most cases, you can carry around and use your phone as it refills with a magnetically attached power bank.
Power banks with wireless charging are far better than they once were. Just a couple years ago, the ones I tested were too inefficient to recommend in this guide. When batteries adhering to the Qi2 wireless charging standard started arriving in 2023, performance markedly improved.
To gain Qi2-certification, a device has to support speeds of up to 15 watts and include magnetic attachment points. The MagSafe technology on iPhones were once the only handsets that were Qi2-compatible, but now Google’s Pixelsnap tech brings both the higher speed and magnetic grip to Pixel 10 phones. Samsung may follow up with its own version in future releases.
The latest wireless charging standard, Q12 25W, is supported by the new iPhone 17 phones as well as the Google Pixel 10 Pro XL. Battery packs that are Qi2 25W-enabled are starting to hit the market as well, and the Ugreen MagFlow was the first on the scene.
Advertisement
Ports
USB-C ports can deliver faster charges than USB-A ports, and most of the portable chargers we recommend here have Type-C connections. But Type-A jacks are still handy if you need to use a specialized cable for a certain device (my camera’s USB-A to micro USB cable comes to mind).
There’s also variation among USB-C ports. Larger banks with more than one port will sometimes list different wattages for each. For example, a bank with three ports may have two 65W ports and one 100W port. There will also be at least one in/out port on the bank, which can be used to charge the battery itself or to deliver a charge to your device. Wattages and in/out labels are printed right next to the port — and always in the tiniest font possible (remember, your phone is an excellent magnifying glass if you ever have trouble reading them).
As with standard wall chargers, the port’s wattage will determine what you can charge. A phone will happily charge off a 100W connection, but a 15W plug won’t do much for your laptop. And remember, the cable has to match the maximum wattage. A cable rated for 60W won’t deliver 100W speeds.
Luckily, some of the best power banks include a built-in USB-C cable. That’ll not only ensure you have the right cord, it’s one less thing you have to remember to bring along.
Advertisement
Design
Once, most rechargeable batteries were black with a squared-off, brick-like design, but now they come in different colors and shapes with attractive finishes and detailing. While that doesn’t affect how they perform, it’s a consideration for something you’ll interact with regularly. Some portable power banks include extra features like MagSafe compatibility, a built-in wall plug or even a kickstand. Nearly all have some sort of indicator to let you know how much available charge your power bank has left, usually expressed with lighted pips near the power button. Some of the newer banks take that a step further with an LED display indicating remaining battery percentage.
How we test best power banks
First, I considered brands Engadget reviewers and staff have tried over the years and checked out customer ratings on retail sites like Amazon and Best Buy. Then, I acquired the most promising candidates and tested them in my home office.
Amy Skorheim for Engadget
For testing, I used each battery to charge both an iPhone and an Android phone, as well as an iPad and a MacBook Pro for the larger portable chargers. I let the devices get down to between zero and five percent and charged them until the devices were full or the power bank died.
Advertisement
For reference, here are the battery capacities of the device I’ve used for testing over the years:
*The iPhone 17 has a slightly larger battery at 3,692mAh
I continuously update this guide as companies release new products.
Other power banks we tested
Here are a few picks that didn’t quite make the cut, but are worth mentioning.
Advertisement
Belkin Stage PowerGrip
If you’re into iPhonography, this clever accessory could be worth a look. Belkin’s Stage PowerGrip is a 9,300mAh power bank that has both a wireless charging pad and built-in cable. But it’s also a Bluetooth shutter with a quarter-inch tripod thread. The design resembles a standard digital camera and provides a sturdy grip once you magnetically attach your phone (make sure you’re either using a MagSafe case or no case to ensure a solid connection).
The shutter is conveniently placed and the remote speed was quick enough to capture the cute things my cat was doing. The accessory can even act as a stand while it charges in either landscape or portrait orientation. As a power bank, it’s slow, taking about two hours to get my iPhone 16 from three to 98 percent, but it has enough juice for a full refill plus a little more, which could help if you’re out taking pictures all day.
Anker MagGo for Apple Watch power bank
The Anker MagGo for Apple Watch power bank combines a 10K battery with a built-in USB-C cable and a pop-up Apple Watch charger. I didn’t formally test it as it’s a little too niche, but it deserves a mention for saving my keister on two occasions. Driving to a hike, my watch told me it was down to 10 percent. Thankfully, I had this and could refill the watch before I got to the trailhead. Later, on an interstate trip, I realized the travel charging station I’d brought was a dud. This kept my watch alive for the week I was away. It does a good job simply charging a phone via the handy on-board cable, too. But for those with an Apple Watch, it’s extra useful.
HyperJuice 245W
Hyper’s massive-but-sleek brick is one nice looking power bank. The HyperJuice 245W packs a hefty 27,000mAh capacity, enough to refill my tester phone about four times and get a MacBook Pro from near-dead to 75 percent. It only has USB-C ports, but you at least get four of them. USB-C only is probably fine for most situations, but a USB-A port would be nice for charging the occasional older peripheral. The 245 wattage is pretty high for a power bank and it was indeed speedy. It filled a Samsung Galaxy S24 Ultra in just over an hour. But it’s the same price and capacity as our Mophie Powerstation pick for laptop banks, and that one has a better variety of ports. Hyper’s battery is also comparable to Anker’s laptop battery, which is cheaper, has built-in cables and has nearly the same capacity. Plus, that bank is just as swanky looking.
Advertisement
EcoFlow Rapid magnetic power bank
I was curious to try out the first power bank from EcoFlow, a company that primarily makes larger power stations and whole-home backup batteries. The first offering in the brand’s Rapid series is a Qi2-enabled magnetic charger with a 5,000mAh capacity. It looks quite nice with shiny silver accents and soft-touch grey plastic on the MagSafe-compatible front. There’s a little pull-out leg that sturdily displays your phone as it charges and the attached USB-C cable lets you refill devices directly, then tucks out of the way when it’s not in use. But it didn’t outperform our top pick in the MagSafe category, in terms of both charging speeds and the amount of charge delivered.
Mophie Snap+ Powerstation Mini
The Mophie snap+ Powerstation Mini is terribly well-built. It feels premium with a rubberized contact point for the MagSafe charging pad and a stand that runs the entire width of the bank itself, making it extra sturdy. It’s compact, too, but only carries a 5,000mAh capacity, which gets you a partial charge on most newer or larger phones. Our current MagSafe/iPhone pick has double the capacity, a stand and a digital display — for just $20 more than the Powerstation Mini.
Power bank FAQs
What’s the difference between a portable power bank and a portable charger?
A slew of terms are used to describe power banks, including portable batteries, portable chargers, external battery packs and even, somewhat confusingly, USB chargers, which is what wall chargers are often called. They all mean the same thing: a lithium ion battery that stores a charge so you can refill a smartphone, tablet, earbuds, console controller, ereader, laptop, or just about any other device with its own built-in, rechargeable battery.
There’s little difference between the terms, so the specs you’ll want to pay attention to are capacity (expressed in mAh), size and weight so you can find the right balance between recharging what you need and portability.
Advertisement
Power stations, on the other hand, are distinct. These are bigger units (often around the size of a car battery) that can be used to charge multiple devices multiple times, but notably, they can’t be taken on airplanes.
Does fast charging actually ruin your battery?
Not exactly. The real enemy of a battery’s longevity is heat. The faster you charge a battery, the more heat is generated. Modern phones have features that keep the battery cool while charging, like physical heat shields and heat sinks, as well as software features that slow down processes that generate too much heat. Phone manufacturers are keen to promote a phone’s fast-charging abilities, so they had to figure out ways to make faster charging work.
While there aren’t long-term studies on what fast charging does to a phone, a study on EV batteries (which use the same general concept of charged lithium ions flowing from one side of the battery to the other, absorbing or releasing a usable charge) showed a very slight decrease in capacity over time with only fast charging — though what actually made a larger difference was how hot the battery itself was, due to ambient temperatures, when it was charged.
In short, fast charging could be slightly harder on your battery than normal charging. But the safeguards most smartphones have make that difference fairly negligible. To really ensure you’re optimizing charging capabilities, limit your phone’s heat exposure overall.
Advertisement
Can you use a power bank for all your devices?
That depends on the size of the bank and the size of your device’s battery. A small 5,000mAh battery isn’t strong enough to charge laptops, but a portable charger with a 20,000mAh capacity will give your computer a partial refill. You also have to consider port compatibility. If your device has a USB port, you’ll be able to easily find a cable to connect it to a battery. If your device has a more unique port, such as a DC port, you won’t be able to use a battery. Devices with an AC cable and plug can be charged, and sometimes powered (such as in the case of a printer or speaker), by larger laptop batteries with AC ports.
In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings.
The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall security posture,” according to an internal government report reviewed by ProPublica.
Advertisement
Or, as one member of the team put it: “The package is a pile of shit.”
For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security.
Such judgments would be damning for any company seeking to sell its wares to the U.S. government, but it should have been particularly devastating for Microsoft. The tech giant’s products had been at the heart of two major cybersecurity attacks against the U.S. in three years. In one, Russian hackers exploited a weakness to steal sensitive data from a number of federal agencies, including the National Nuclear Security Administration. In the other, Chinese hackers infiltrated the email accounts of a Cabinet member and other senior government officials.
The federal government could be further exposed if it couldn’t verify the cybersecurity of Microsoft’s Government Community Cloud High, a suite of cloud-based services intended to safeguard some of the nation’s most sensitive information.
Advertisement
Yet, in a highly unusual move that still reverberates across Washington, the Federal Risk and Authorization Management Program, or FedRAMP, authorized the product anyway, bestowing what amounts to the federal government’s cybersecurity seal of approval. FedRAMP’s ruling — which included a kind of “buyer beware” notice to any federal agency considering GCC High — helped Microsoft expand a government business empire worth billions of dollars.
“BOOM SHAKA LAKA,” Richard Wakeman, one of the company’s chief security architects, boasted in an online forum, celebrating the milestone with a meme of Leonardo DiCaprio in “The Wolf of Wall Street.” Wakeman did not respond to requests for comment.
It was not the type of outcome that federal policymakers envisioned a decade and a half ago when they embraced the cloud revolution and created FedRAMP to help safeguard the government’s cybersecurity. The program’s layers of review, which included an assessment by outside experts, were supposed to ensure that service providers like Microsoft could be entrusted with the government’s secrets. But ProPublica’s investigation — drawn from internal FedRAMP memos, logs, emails, meeting minutes, and interviews with seven former and current government employees and contractors — found breakdowns at every juncture of that process. It also found a remarkable deference to Microsoft, even as the company’s products and practices were central to two of the most damaging cyberattacks ever carried out against the government.
FedRAMP first raised questions about GCC High’s security in 2020 and asked Microsoft to provide detailed diagrams explaining its encryption practices. But when the company produced what FedRAMP considered to be only partial information in fits and starts, program officials did not reject Microsoft’s application. Instead, they repeatedly pulled punches and allowed the review to drag out for the better part of five years. And because federal agencies were allowed to deploy the product during the review, GCC High spread across the government as well as the defense industry. By late 2024, FedRAMP reviewers concluded that they had little choice but to authorize the technology — not because their questions had been answered or their review was complete, but largely on the grounds that Microsoft’s product was already being used across Washington.
Advertisement
Today, key parts of the federal government, including the Justice and Energy departments, and the defense sector rely on this technology to protect highly sensitive information that, if leaked, “could be expected to have a severe or catastrophic adverse effect” on operations, assets and individuals, the government has said.
“This is not a happy story in terms of the security of the U.S.,” said Tony Sager, who spent more than three decades as a computer scientist at the National Security Agency and now is an executive at the nonprofit Center for Internet Security.
For years, the FedRAMP process has been equated with actual security, Sager said. ProPublica’s findings, he said, shatter that facade.
“This is not security,” he said. “This is security theater.”
Advertisement
ProPublica is exposing the government’s reservations about this popular product for the first time. We are also revealing Microsoft’s yearslong inability to provide the encryption documentation and evidence the federal reviewers sought.
The revelations come as the Justice Department ramps up scrutiny of the government’s technology contractors. In December, the department announced the indictment of a former employee of Accenture who allegedly misled federal agencies about the security of the company’s cloud platform and its compliance with FedRAMP’s standards. She has pleaded not guilty. Accenture, which was not charged with wrongdoing, has said that it “proactively brought this matter to the government’s attention” and that it is “dedicated to operating with the highest ethical standards.”
Microsoft has also faced questions about its disclosures to the government. As ProPublica reported last year, the company failed to inform the Defense Department about its use of China-based engineers to maintain the government’s cloud systems, despite Pentagon rules stipulating that “No Foreign persons may have” access to its most sensitive data. The department is investigating the practice, which officials say could have compromised national security.
Microsoft has defended its program as “tightly monitored and supplemented by layers of security mitigations,” but after ProPublica’s story published last July, the company announced that it would stop using China-based engineers for Defense Department work.
Advertisement
In response to written questions for this story and in an interview, Microsoft acknowledged the yearslong confrontation with FedRAMP but also said it provided “comprehensive documentation” throughout the review process and “remediated findings where possible.”
“We stand by our products and the comprehensive steps we’ve taken to ensure all FedRAMP-authorized products meet the security and compliance requirements necessary,” a spokesperson said in a statement, adding that the company would “continue to work with FedRAMP to continuously review and evaluate our services for continued compliance.”
The program was an early target of the Trump administration’s Department of Government Efficiency, which slashed its staff and budget. Even FedRAMP acknowledges it is operating “with an absolute minimum of support staff” and “limited customer service.” The roughly two dozen employees who remain are “entirely focused on” delivering authorizations at a record pace, FedRAMP’s director has said. Today, its annual budget is just $10 million, its lowest in a decade, even as it has boasted record numbers of new authorizations for cloud products.
Advertisement
The consequence of all this, people who have worked for FedRAMP told ProPublica, is that the program now is little more than a rubber stamp for industry. The implications of such a downsizing for federal cybersecurity are far-reaching, especially as the administration encourages agencies to adopt cloud-based artificial intelligence tools, which draw upon reams of sensitive information.
The General Services Administration, which houses FedRAMP, defended the program, saying it has undergone “significant reforms to strengthen governance” since GCC High arrived in 2020. “FedRAMP’s role is to assess if cloud services have provided sufficient information and materials to be adequate for agency use, and the program today operates with strengthened oversight and accountability mechanisms to do exactly that,” a GSA spokesperson said in an emailed statement.
The agency did not respond to written questions regarding GCC High.
A “Cloud First” World
About two decades ago, federal officials predicted that the cloud revolution, providing on-demand access to shared computing via the internet, would usher in an era of cheaper, more secure and more efficient information technology.
Advertisement
Moving to the cloud meant shifting away from on-premises servers owned and operated by the government to those in massive data centers maintained by tech companies. Some agency leaders were reluctant to relinquish control, while others couldn’t wait to.
In an effort to accelerate the transition, the Obama administration issued its “Cloud First” policy in 2011, requiring all agencies to implement cloud-based tools “whenever a secure, reliable, cost-effective” option existed. To facilitate adoption, the administration created FedRAMP, whose job was to ensure the security of those tools.
FedRAMP’s “do once, use many times” system was intended to streamline and strengthen the government procurement process. Previously, each agency using a cloud service vetted it separately, sometimes applying different interpretations of federal security requirements. Under the new program, agencies would be able to skip redundant security reviews because FedRAMP authorization indicated that the product had already met standardized requirements. Authorized products would be listed on a government website known as the FedRAMP Marketplace.
On paper, the program was an exercise in efficiency. But in practice, the small FedRAMP team could not keep up with the flood of demand from tech companies that wanted their products authorized.
Advertisement
The slow approval process frustrated both the tech industry, eager for a share in the billions of federal dollars up for grabs, and government agencies that were under pressure to migrate to the cloud. These dynamics sometimes pitted the cloud industry and agency officials together against FedRAMP. The backlog also prompted many agencies to take an alternative path: performing their own reviews of the products they wanted to adopt, using FedRAMP’s standards.
It was through this “agency path” that GCC High entered the federal bloodstream, with the Justice Department paving the way. Initially, some Justice officials were nervous about the cloud and who might have access to its information, which includes highly sensitive court and law enforcement records, a Justice Department official involved in the decision told ProPublica. The department’s cybersecurity program required it to ensure that only U.S. citizens “access or assist in the development, operation, management, or maintenance” of its IT systems, unless a waiver was granted. Justice’s IT specialists recommended pursuing GCC High, believing it could meet the elevated security needs, according to the official, who spoke on condition of anonymity because they were not authorized to discuss internal matters.
Pursuant to FedRAMP’s rules, Microsoft had GCC High evaluated by a so-called third-party assessment organization, which is supposed to provide an independent review of whether the product has met federal standards. The Justice Department then performed its own evaluation of GCC High using those standards and ruled the offering acceptable.
By early 2020, Melinda Rogers, Justice’s deputy chief information officer, made the decision official and soon deployed GCC High across the department.
Advertisement
It was a milestone for all involved. Rogers had ushered the Justice Department into the cloud, and Microsoft had gained a significant foothold in the cutthroat market for the federal government’s cloud computing business.
Moreover, Rogers’ decision placed GCC High on the FedRAMP Marketplace, the government’s influential online clearinghouse of all the cloud providers that are under review or already authorized. Its mere mention as “in process” was a boon for Microsoft, amounting to free advertising on a website used by organizations seeking to purchase cloud services bearing what is widely seen as the government’s cybersecurity seal of approval.
That April, GCC High landed at FedRAMP’s office for review, the final stop on its bureaucratic journey to full authorization.
Microsoft’s Missing Information
In theory, there shouldn’t have been much for FedRAMP’s team to do after the third-party assessor and Justice reviewed GCC High, because all parties were supposed to be following the same requirements.
Advertisement
But it was around this time that the Government Accountability Office, which investigates federal programs, discovered breakdowns in the process, finding that agency reviews sometimes were lacking in quality. Despite missing details, FedRAMP went on to authorize many of these packages. Acknowledging these shortcomings, FedRAMP began to take a harder look at new packages, a former reviewer said.
This was the environment in which Microsoft’s GCC High application entered the pipeline. The name GCC High was an umbrella covering many services and features within Office 365 that all needed to be reviewed. FedRAMP reviewers quickly noticed key material was missing.
The team homed in on what it viewed as a fundamental document called a “data flow diagram,” former members told ProPublica. The illustration is supposed to show how data travels from Point A to Point B — and, more importantly, how it’s protected as it hops from server to server. FedRAMP requires data to be encrypted while in transit to ensure that sensitive materials are protected even if they’re intercepted by hackers.
But when the FedRAMP team asked Microsoft to produce the diagrams showing how such encryption would happen for each service in GCC High, the company balked, saying the request was too challenging. So the reviewers suggested starting with just Exchange Online, the popular email platform.
Advertisement
“This was our litmus test to say, ‘This isn’t the only thing that’s required, but if you’re not doing this, we are not even close yet,’” said one reviewer who spoke on condition of anonymity because they were not authorized to discuss internal matters. Once they reached the appropriate level of detail, they would move from Exchange to other services within GCC High.
It was the kind of detail that other major cloud providers such as Amazon and Google routinely provided, members of the FedRAMP team told ProPublica. Yet Microsoft took months to respond. When it did, the former reviewer said, it submitted a white paper that discussed GCC High’s encryption strategy but left out the details of where on the journey data actually becomes encrypted and decrypted — so FedRAMP couldn’t assess that it was being done properly.
A Microsoft spokesperson acknowledged that the company had “articulated a challenge related to illustrating the volume of information being requested in diagram form” but “found alternate ways to share that information.”
Rogers, who was hired by Microsoft in 2025, declined to be interviewed. In response to emailed questions, the company provided a statement saying that she “stands by the rigorous evaluation that contributed to” her authorization of GCC High. A spokesperson said there was “absolutely no connection” between her hiring and the decisions in the GCC High process, and that she and the company complied with “all rules, regulations, and ethical standards.”
Advertisement
The Justice Department declined to respond to written questions from ProPublica.
A Fight Over “Spaghetti Pies”
As 2020 came to a close, a national security crisis hit Washington that underscored the consequences of cyber weakness. Russian state-sponsored hackers had been quietly working their way through federal computer systems for much of the year and vacuuming up sensitive data and emails from U.S. agencies — including the Justice Department.
At the time, most of the blame fell on a Texas-based company called SolarWinds, whose software provided hackers their initial opening and whose name became synonymous with the attack. But, as ProPublica has reported, the Russians leveraged that opening to exploit a long-standing weakness in a Microsoft product — one that the company had refused to fix for years, despite repeated warnings from one of its engineers. Microsoft has defended its decision not to address the flaw, saying that it received “multiple reviews” and that the company weighs a variety of factors when making security decisions.
In the aftermath, the Biden administration took steps to bolster the nation’s cybersecurity. Among them, the Justice Department announced a cyber-fraud initiative in 2021 to crack down on companies and individuals that “put U.S. information or systems at risk by knowingly providing deficient cybersecurity products or services, knowingly misrepresenting their cybersecurity practices or protocols, or knowingly violating obligations to monitor and report cybersecurity incidents and breaches.”
Advertisement
Deputy Attorney General Lisa Monaco said the department would use the False Claims Act to pursue government contractors “when they fail to follow required cybersecurity standards — because we know that puts all of us at risk.”
But if Microsoft felt any pressure from the SolarWinds attack or from the Justice Department’s announcement, it didn’t manifest in the FedRAMP talks, according to former members of the FedRAMP team.
The discourse between FedRAMP and Microsoft fell into a pattern. The parties would meet. Months would go by. Microsoft would return with a response that FedRAMP deemed incomplete or irrelevant. To bolster the chances of getting the information it wanted, the FedRAMP team provided Microsoft with a template, describing the level of detail it expected. But the diagrams Microsoft returned never met those expectations.
“We never got past Exchange,” one former reviewer said. “We never got that level of detail. We had no visibility inside.”
Advertisement
In an interview with ProPublica, John Bergin, the Microsoft official who became the government’s main contact, acknowledged the prolonged back-and-forth but blamed FedRAMP, equating its requests for diagrams to a “rock fetching exercise.”
“We were maybe incompetent in how we drew drawings because there was no standard to draw them to,” he said. “Did we not do it exactly how they wanted? Absolutely. There was always something missing because there was no standard.”
A Microsoft spokesperson said without such a standard, “cloud providers were left to interpret the level of abstraction and representation on their own,” creating “inconsistency and confusion, not an unwillingness to be transparent.”
But even Microsoft’s own engineers had struggled over the years to map the architecture of its products, according to two people involved in building cloud services used by federal customers. At issue, according to people familiar with Microsoft’s technology, was the decades-old code of its legacy software, which the company used in building its cloud services.
Advertisement
One FedRAMP reviewer compared it to a “pile of spaghetti pies.” The data’s path from Point A to Point B, the person said, was like traveling from Washington to New York with detours by bus, ferry and airplane rather than just taking a quick ride on Amtrak. And each one of those detours represents an opportunity for a hijacking if the data isn’t properly encrypted.
Other major cloud providers such as Amazon and Google built their systems from the ground up, said Sager, the former NSA computer scientist, who worked with all three companies during his time in government.
Microsoft’s system is “not designed for this kind of isolation of ‘secure’ from ‘not secure,’” Sager said.
A Microsoft spokesperson acknowledged the company faces a unique challenge but maintained that its cloud products meet federal security requirements.
Advertisement
“Unlike providers that started later with a narrower product scope, Microsoft operates one of the broadest enterprise and government platforms in the world, supporting continuity for millions of customers while simultaneously modernizing at scale,” the spokesperson said in emailed responses. “That complexity is not ‘spaghetti,’ but it does mean the work of disentangling, isolating, and hardening systems is continuous.”
The spokesperson said that since 2023, Microsoft has made “security‑first architectural redesign, legacy risk reduction, and stronger isolation guarantees a top, company‑wide priority.”
Assessors Back-Channel Cyber Concerns
The FedRAMP team was not the only party with reservations about GCC High. Microsoft’s third-party assessment organizations also expressed concerns.
The firms are supposed to be independent but are hired and paid by the company being assessed. Acknowledging the potential for conflicts of interest, FedRAMP has encouraged the assessment firms to confidentially back-channel to its reviewers any negative feedback that they were unwilling to bring directly to their clients or reflect in official reports.
Advertisement
In 2020, two third-party assessors hired by Microsoft, Coalfire and Kratos, did just that. They told FedRAMP that they were unable to get the full picture of GCC High, a former FedRAMP reviewer told ProPublica.
“Coalfire and Kratos both readily admitted that it was difficult to impossible to get the information required out of Microsoft to properly do a sufficient assessment,” the reviewer told ProPublica.
The back channel helped surface cybersecurity issues that otherwise might never have been known to the government, people who have worked with and for FedRAMP told ProPublica. At the same time, they acknowledged its existence undermined the very spirit and intent of having independent assessors.
A spokesperson for Coalfire, the firm that initially handled the GCC High assessment, requested written questions from ProPublica, then declined to respond.
Advertisement
A spokesperson for Kratos, which replaced Coalfire as the GCC High assessor, declined an interview request. In an emailed response to written questions, the spokesperson said the company stands by its official assessment and recommendation of GCC High and “absolutely refutes” that it “ever would sign off on a product we were unable to fully vet.” The company “has open and frank conversations” with all customers, including Microsoft, which “submitted all requisite diagrams to meet FedRAMP-defined requirements,” the spokesperson said.
Kratos said it “spent extensive time working collaboratively with FedRAMP in their review” and does not consider such discussions to be “backchanneling.”
FedRAMP, however, was dissatisfied with Kratos’ ongoing work and believed the firm “should be pushing back” on Microsoft more, the former reviewer said. It placed Kratos on a “corrective action plan,” which could eventually result in loss of accreditation. The company said it did not agree with FedRAMP’s action but provided “additional trainings for some internal assessors” in response to it.
The Microsoft spokesperson told ProPublica the company has “always been responsive to requests” from Kratos and FedRAMP. “We are not aware of any backchanneling, nor do we believe that backchanneling would have been necessary given our transparency and cooperation with auditor requests,” the spokesperson said.
Advertisement
In response to questions from ProPublica about the process, the GSA said in an email that FedRAMP’s system “does not create an inherent conflict of interest for professional auditors who meet ethical and contractual performance expectations.”
GSA did not respond to questions about back-channeling but said the “correct process” is for a third-party assessor to “state these problems formally in a finding during the security assessment so that the cloud service provider has an opportunity to fix the issue.”
FedRAMP Ends Talks
The back-and-forth between the FedRAMP reviewers and Microsoft’s team went on for years with little progress. Then, in the summer of 2023, the program’s interim director, Brian Conrad, got a call from the White House that would alter the course of the review.
Chinese state-sponsored hackers had infiltrated GCC, the lower-cost version of Microsoft’s government cloud, and stolen data and emails from the commerce secretary, the U.S. ambassador to China and other high-ranking government officials. In the aftermath, Chris DeRusha, the White House’s chief information security officer, wanted a briefing from FedRAMP, which had authorized GCC.
Advertisement
The decision predated Conrad’s tenure, but he told ProPublica that he left the conversation with several takeaways. First, FedRAMP must hold all cloud providers — including Microsoft — to the same standards. Second, he had the backing of the White House in standing firm. Finally, FedRAMP would feel the political heat if any cloud service with a FedRAMP authorization were hacked.
DeRusha confirmed Conrad’s account of the phone call but declined to comment further.
Within months, Conrad informed Microsoft that FedRAMP was ending the engagement on GCC High.
“After three years of collaboration with the Microsoft team, we still lack visibility into the security gaps because there are unknowns that Microsoft has failed to address,” Conrad wrote in an October 2023 email. This, he added, was not for FedRAMP’s lack of trying. Staffers had spent 480 hours of review time, had conducted 18 “technical deep dive” sessions and had numerous email exchanges with the company over the years. Yet they still lacked the data flow diagrams, crucial information “since visibility into the encryption status of all data flows and stores is so important,” he wrote.
Advertisement
If Microsoft still wanted FedRAMP authorization, Conrad wrote, it would need to start over.
A FedRAMP reviewer, explaining the decision to the Justice Department, said the team was “not asking for anything above and beyond what we’ve asked from every other” cloud service provider, according to meeting minutes reviewed by ProPublica. But the request was particularly justified in Microsoft’s case, the reviewer told the Justice officials, because “each time we’ve actually been able to get visibility into a black box, we’ve uncovered an issue.”
“We can’t even quantify the unknowns, which makes us very uncomfortable,” the reviewer said, according to the minutes.
Microsoft and the Justice Department Push Back
Microsoft was furious. Failing to obtain authorization and starting the process over would signal to the market that something was wrong with GCC High. Customers were already confused and concerned about the drawn-out review, which had become a hot topic in an online forum used by government and technology insiders. There, Wakeman, the Microsoft cybersecurity architect, deflected blame, saying the government had been “dragging their feet on it for years now.”
Advertisement
Meanwhile, to build support for Microsoft’s case, Bergin, the company’s point person for FedRAMP and a former Army official, reached out to government leaders, including one from the Justice Department.
The Justice official, who spoke on condition of anonymity because they were not authorized to discuss the matter, said Bergin complained that the delay was hampering Microsoft’s ability “to get this out into the market full sail.” Bergin then pushed the Justice Department to “throw around our weight” to help secure FedRAMP authorization, the official said.
That December, as the parties gathered to hash things out at GSA’s Washington headquarters, Justice did just that. Rogers, who by then had been promoted to the department’s chief information officer, sat beside Bergin — on the opposite side of the table from Conrad, the FedRAMP director.
Rogers and her Justice colleagues had a stake in the outcome. Since authorizing and deploying GCC High, she had receivedaccolades for her work modernizing the department’s IT and cybersecurity. But without FedRAMP’s stamp of approval, she would be the government official left holding the bag if GCC High were involved in a serious hack. At the same time, the Justice Department couldn’t easily back out of using GCC High because once a technology is widely deployed, pulling the plug can be costly and technically challenging. And from its perspective, the cloud was an improvement over the old government-run data centers.
Advertisement
Shortly after the meeting kicked off, Bergin interrupted a FedRAMP reviewer who had been presenting PowerPoint slides. He said the Justice Department and third-party assessor had already reviewed GCC High, according to meeting minutes. FedRAMP “should essentially just accept” their findings, he said.
Then, in a shock to the FedRAMP team, Rogers backed him up and went on to criticize FedRAMP’s work, according to two attendees.
In its statement, Microsoft said Rogers maintains that FedRAMP’s approach “was misguided and improperly dismissed the extensive evaluations performed by DOJ personnel.”
Bergin did not dispute the account, telling ProPublica that he had been trying to argue that it is the purview of third-party assessors such as Kratos — not FedRAMP — to evaluate the security of cloud products. And because FedRAMP must approve the third-party assessment firms, the program should have taken its issues up with Kratos.
Advertisement
“When you are the regulatory agency who determines who the auditors are and you refuse to accept your auditors’ answers, that’s not a ‘me’ problem,” Bergin told ProPublica.
The GSA did not respond to questions about the meeting. The Justice Department declined to comment.
Pressure Mounts on FedRAMP
If there was any doubt about the role of FedRAMP, the White House issued a memorandum in the summer of 2024 that outlined its views. FedRAMP, it said, “must be capable of conducting rigorous reviews” and requiring cloud providers to “rapidly mitigate weaknesses in their security architecture.” The office should “consistently assess and validate cloud providers’ complex architectures and encryption schemes.”
But by that point, GCC High had spread to other federal agencies, with the Justice Department’s authorization serving as a signal that the technology met federal standards.
Advertisement
It also spread to the defense sector, since the Pentagon required that cloud products used by its contractors meet FedRAMP standards. While it did not have FedRAMP authorization, Microsoft marketed GCC High as meeting the requirements, selling it to companies such as Boeing that research, develop and maintain military weapons systems.
But with the FedRAMP authorization up in the air, some contractors began to worry that by using GCC High, they were out of compliance. That could threaten their contracts, which, in turn, could impact Defense Department operations. Pentagon officials called FedRAMP to inquire about the authorization stalemate.
The Defense Department acknowledged but did not respond to written questions from ProPublica.
Rogers also kept pressing FedRAMP to “get this thing over the line,” former employees of the GSA and FedRAMP said. It was the “opinion of the staff and the contractors that she simply was not willing to put heat to Microsoft on this” and that the Justice Department “was too sympathetic to Microsoft’s claims,” Eric Mill, then GSA’s executive director for cloud strategy, told ProPublica.
Advertisement
Authorization Despite a “Damning” Assessment
In the summer of 2024, FedRAMP hired a new permanent director, government technology insider Pete Waterman. Within about a month of taking the job, he restarted the office’s review of GCC High with a new team, which put aside the debate over data flow diagrams and instead attempted to examine evidence from Microsoft. But these reviewers soon arrived at the same conclusion, with the team’s leader complaining about “getting stiff-armed” by Microsoft.
“He came back and said, ‘Yeah, this thing sucks,’” Mill recalled.
While the team was able to work through only two of the many services included in GCC High, Exchange Online and Teams, that was enough for it to identify “issues that are fundamental” to risk management, including “timely remediation of vulnerabilities and vulnerability scanning,” according to a summary of the team’s findings reviewed by ProPublica.
Those issues, as well as a lack of “proper detailed security documentation” from Microsoft, limit “visibility and understanding of the system” and “impair the ability to make informed risk decisions.”
Advertisement
The team concluded, “There is a lack of confidence in assessing the system’s overall security posture.”
A Microsoft spokesperson said in a statement that the company “never received this feedback in any of its communications with FedRAMP.”
When ProPublica read the findings to Bergin, the Microsoft liaison, he said he was surprised.
“That’s pretty damning,” Bergin said, adding that it sounded like language that “would’ve generally been associated with a finding of ‘not worthy.’ If an assessor wrote that, I would be nervous.”
Advertisement
Despite the findings, to the FedRAMP team, turning Microsoft down didn’t seem like an option. “Not issuing an authorization would impact multiple agencies that are already using GCC-H,” the summary document said. The team determined that it was a “better value” to issue an authorization with conditions for continued government oversight.
While authorizations with oversight conditions weren’t unusual, arriving at one under these circumstances was. GCC High reviewers saw problems everywhere, both in what they were able to evaluate and what they weren’t. To them, most of the package remained a vast wilderness of untold risk.
Nevertheless, FedRAMP and Microsoft reached an agreement, and the day after Christmas 2024, GCC High received its FedRAMP authorization. FedRAMP appended a cover report to the package laying out its deficiencies and noting it carried unknown risks, according to people familiar with the report.
It emphasized that agencies should carefully review the package and engage directly with Microsoft on any questions.
Advertisement
“Unknown Unknowns” Persist
Microsoft told ProPublica that it has met the conditions of the agreement and has “stayed within the performance metrics required by FedRAMP” to ensure that “risks are identified, tracked, remediated, and transparently communicated.”
But under the Trump administration, there aren’t many people left at FedRAMP to check.
While the Biden-era guidance said FedRAMP “must be an expert program that can analyze and validate the security claims” of cloud providers, the GSA told ProPublica that the program’s role is “not to determine if a cloud service is secure enough.” Rather, it is “to ensure agencies have sufficient information to make these risk decisions.”
The problem is that agencies often lack the staff and resources to do thorough reviews, which means the whole system is leaning on the claims of the cloud companies and the assessments of the third-party firms they pay to evaluate them. Under the current vision, critics say, FedRAMP has lost the plot.
Advertisement
“FedRAMP’s job is to watch the American people’s back when it comes to sharing their data with cloud companies,” said Mill, the former GSA official, who also co-authored the 2024 White House memo. “When there’s a security issue, the public doesn’t expect FedRAMP to say they’re just a paper-pusher.”
Meanwhile, at the Justice Department, officials are finding out what FedRAMP meant by the “unknown unknowns” in GCC High. Last year, for example, they discovered that Microsoft relied on China-based engineers to service their sensitive cloud systems despite the department’s prohibition against non-U.S. citizens assisting with IT maintenance.
Officials learned about this arrangement — which was also used in GCC High — not from FedRAMP or from Microsoft but from a ProPublica investigation into the practice, according to the Justice employee who spoke with us.
A Microsoft spokesperson acknowledged that the written security plan for GCC High that the company submitted to the Justice Department did not mention foreign engineers, though he said Microsoft did communicate that information to Justice officials before 2020. Nevertheless, Microsoft has since ended its use of China-based engineers in government systems.
Advertisement
Former and current government officials worry about what other risks may be lurking in GCC High and beyond.
The GSA told ProPublica that, in general, “if there is credible evidence that a cloud service provider has made materially false representations, that matter is then appropriately referred to investigative authorities.”
Ironically, the ultimate arbiter of whether cloud providers or their third-party assessors are living up to their claims is the Justice Department itself. The recent indictment of the former Accenture employee suggests it is willing to use this power. In a court document, the Justice Department alleges that the ex-employee made “false and misleading representations” about the cloud platform’s security to help the company “obtain and maintain lucrative federal contracts.” She is also accused of trying to “influence and obstruct” Accenture’s third-party assessors by hiding the product’s deficiencies and telling others to conceal the “true state of the system” during demonstrations, the department said. She has pleaded not guilty.
There is no public indication that such a case has been brought against Microsoft or anyone involved in the GCC High authorization. The Justice Department declined to comment. Monaco, the deputy attorney general who launched the department’s initiative to pursue cybersecurity fraud cases, did not respond to requests for comment.
Advertisement
She left her government position in January 2025. Microsoft hired her to become its president of global affairs.
A company spokesperson said Monaco’s hiring complied with “all rules, regulations, and ethical standards” and that she “does not work on any federal government contracts or have oversight over or involvement with any of our dealings with the federal government.”
Switching phones is always a gamble. You expect something new, something exciting – maybe even something better. And to be fair, the Galaxy S26 Ultra delivers on that promise in many ways. It is one of the most technically impressive smartphones available today, packing a 6.85-inch 2K LTPO AMOLED display with a 120Hz refresh rate, peak brightness reaching up to 2,600 nits, and Qualcomm’s Snapdragon 8 Elite Gen 5 chip, which offers roughly a 10–15% performance boost over its predecessor.
But after spending time with it, I found myself in a strange position. The more I appreciated what Samsung had built, the more I started missing my iPhone 17 Pro.
The Privacy Display has got some real trade-offs
The standout feature this year is easily Samsung’s Privacy Display. It uses pixel-level light control to restrict viewing angles, effectively making your screen unreadable from the sides. In theory, it’s brilliant. In practice, it’s genuinely useful – especially in public spaces like flights or metros where shoulder surfing is a real concern.
Samsung deserves credit here because this isn’t just software trickery. It’s hardware-driven innovation, and that’s increasingly rare in modern smartphones.
Advertisement
The Samsung Galaxy S26 Ultra, angled for its Privacy Display.Tom Bedford / Digital Trends
But the moment you turn it on, the compromises become clear. The display dims noticeably, color accuracy takes a slight hit, and the overall viewing experience feels constrained. This is particularly noticeable because the S26 Ultra’s panel is otherwise one of the brightest and most vibrant in the industry.
And that’s when the contrast hits you.
Apple doesn’t offer a privacy display. But it also doesn’t introduce features that degrade the core experience. The iPhone approach is slower, more conservative – but also more refined. You don’t get experimental features, but you also don’t deal with their trade-offs.
Camera improvements that don’t change the outcome
On paper, the S26 Ultra’s camera system sounds upgraded. The main sensor now features a wider f/1.4 aperture, while the telephoto sits at f/2.9, theoretically improving low-light performance. The phone retains its triple 50MP setup, including a periscope zoom lens.
In isolation, the results are excellent. Photos are sharp, bright, and social-media ready.
Advertisement
iPhone 17 ProUnsplash
But compared to the S25 Ultra, the differences are minimal. In most real-world scenarios, you would struggle to tell which phone took which shot unless you were actively looking for it. Even benchmark comparisons and side-by-side tests suggest that the improvement is incremental rather than transformative.
Tom Bedford / Digital Trends
Meanwhile, the iPhone continues to excel in areas that matter day to day – video consistency, color accuracy, and optimization for apps like Instagram and Snapchat. Apple’s computational photography may not always push boundaries, but it delivers predictability.
Samsung is innovating. Apple is refining. And more often than not, refinement wins in daily use.
Performance and AI: Powerful, but overwhelming
There is no denying the raw power of the S26 Ultra. The Snapdragon 8 Elite Gen 5 delivers top-tier performance, and the device handles everything – from gaming to multitasking – effortlessly. But the real focus this year is AI.
Samsung has packed the phone with features: AI image editing, generative fill, object insertion, writing assistants, real-time translation, and contextual suggestions through tools like Now Brief or Now Nudge. These features are technically impressive, but they come with limitations. AI-generated images often output at lower resolutions – which doesn’t match the phone’s native display. Editing images can reduce quality by up to 20–30%, making them less practical for long-term use.
Digital Trends
More importantly, many of these tools feel optional rather than essential. They are features you try, not features you rely on.
And over time, that starts to feel exhausting.
Advertisement
The iPhone, by comparison, takes a different approach. It integrates AI more quietly, focusing on tasks that improve existing workflows rather than introducing entirely new ones. It does less – but it does it more consistently.
The irony of it all
The S26 Ultra didn’t make me dislike Android. It reminded me why I liked iOS.
Because while Samsung is experimenting with bold features – privacy displays, AI tools, camera tweaks – Apple is focusing on stability, consistency, and polish. And that difference becomes more noticeable the longer you use both. The features you admire aren’t always the ones you miss.
My final take
The Galaxy S26 Ultra is an exceptional device. It is powerful, innovative, and packed with features that push the boundaries of what a smartphone can do. But using it didn’t feel like an upgrade in my daily life. It felt like stepping into a different philosophy. And sometimes, that’s enough to make you realize that what you value isn’t innovation for its own sake – but how seamlessly everything fits together.
Advertisement
And in that regard, I found myself missing my iPhone 17 Pro more than I expected.
Hackers have targeted TrueConf conference servers in attacks that exploit a zero-day vulnerability, allowing them to execute arbitrary files on all connected endpoints.
The flaw is tracked as CVE-2026-3502 and received a medium severity score. It stems from a missing integrity check in the software’s update mechanism, which can be used to replace the legitimate update with a malicious variant.
TrueConf is a video conferencing platform that can run as a self-hosted server. Although it also supports cloud deployments, it is generally designed for closed, offline environments.
According to the vendor, more than 100,000 organizations transitioned to TrueConf during the COVID-19 pandemic for remote online business activities. Among TrueConf users are military forces, government agencies, oil and gas corporations, and air traffic management companies.
Advertisement
CheckPoint researchers have been tracking a campaign they track as TrueChaos that, since the beginning of the year, has exploited CVE-2026-3502 in zero-day attacks targeting government entities in Southeast Asia.
“An attacker who gains control of the on-premises TrueConf server can replace the expected update package with an arbitrary executable, presented as the current application version, and distribute it to all connected clients,” CheckPoint says.
“Because the client trusts the server-provided update without proper validation, the malicious file can be delivered and executed under the guise of a legitimate TrueConf update.”
The flaw affects TrueConf versions 8.1.0 through 8.5.2, and following CheckPoint’s report to the vendor, a fix was released in version 8.5.3 in March 2026.
Advertisement
“TrueChaos” operation
CheckPoint has moderate confidence in attributing the TrueChaos activity to a Chinese-nexus threat actor, based on tactics, techniques, and procedures (TTPs), the use of Alibaba Cloud and Tencent for hosting the command and control (C2) infrastructure, and victimology.
The attacks spread through a centrally managed government TrueConf server, impacting multiple agencies, pushing malicious files via fake updates to all connected TrueConf clients.
TrueConf update notice Source: Check Point
The infection chain includes DLL sideloading and the deployment of reconnaissance tools (tasklist, tracert), privilege escalation (UAC bypass via iscicpl.exe), and the establishment of persistence.
The researchers were unable to recover the final payload, but noted that network traffic pointed to Havoc C2 infrastructure, making it highly likely that the Havoc implant was used.
Overview of the TrueChaos attack chain Source: Check Point
Havoc is an open-source C2 framework capable of executing commands, managing processes, manipulating Windows tokens, executing shellcode, and deploying additional payloads on compromised systems.
It has previously been used by the Chinese threat cluster ‘Amaranth Dragon’ in attacks with a similar targeting scope.
Advertisement
CheckPoint’s report shares indicators of compromise (IoCs) as well as multiple infection signals. Strong signs of a breach include the presence of poweriso.exe or 7z-x64.dll, and suspicious artifacts like %AppData%\Roaming\Adobe\update.7z or iscsiexe.dll.
Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.
This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.
Decentralized finance company Drift says it has suspended withdrawals and deposits after confirming a security incident.
The crypto platform said in a post on X that it was “experiencing an active attack,” and that it was working to “contain the incident.”
Security researchers and public blockchain data suggest the losses could be significant. Blockchain security firm CertiK said on X that hackers may have stolen around $136 million, while crypto analytics firm Arkham put the figure at around $285 million stolen.
If confirmed, this would make the Drift hack the largest crypto theft of the year, according to the Rekt leaderboard, a site that tracks crypto thefts by size.
Advertisement
It’s not clear who is behind the attack, and a spokesperson for Drift did not immediately respond to a request for comment.
Security firms say North Korea was behind the most crypto thefts last year, netting at least $2 billion in stolen cryptocurrency, funds the regime is believed to use to finance its nuclear weapons program and skirt international sanctions that restrict its access to the global financial system.
Electro-permanent magnets (EPMs) are pretty nifty concepts, and if you aren’t familiar with them, they are permanent magnets with the ability to be electrically switched on or off. Unlike an electromagnet — which maintains a magnetic field only while power is applied — an EPM can remain “on” even when power is removed. Want to see one work? There’s a video embedded below that shows one off, but if you’d like to know how they work, we have you covered.
Inside are two types of magnet, one of which is permanent and the other being a semi-hard magnet paired with an electromagnetic coil. A semi-hard magnet’s flux can be changed by exposing it to a strong enough magnetic field, and that’s the key to making it work.
Being able to electrically switch a permanent magnet on or off is a neat trick.
When both magnets work together, the EPM is “on” and acts like a permanent magnet. To turn the EPM off, the polarity of the semi-hard magnet is flipped with a short and powerful electromagnetic pulse, after which the two magnets oppose one another and more or less cancel each other out. So rather than generating a magnetic field, an EPM more accurately reconfigures it.
As intriguing as EPMs are, we haven’t really seen one properly in action until it was brought to our attention that [Dave Jones] of EEVblog tried one out last year. He received a Zubax FluxGrip EPM, which is intended for drone and robotic applications and can hold up to 25 kg. Watch [Dave] fire it up in the video (link is cued up to the 7:30 mark), it’s pretty interesting to see one of these actually work.
Advertisement
EPMs are not prohibitively expensive but they are not exactly cheap, either. But if a switchable magnet sounds up your alley and you can’t afford an EPM, consider an alternative “switchable” magnet design that works by momentarily canceling out a permanent magnet with a paired electromagnet. Unlike an EPM, it’s not a permanent switch but it would be enough to drop a payload.
If you’ve also been following along and you’re also in a bit of a celebratory mood, then you can also join in on the fun by checking out these deals for a few of our favourite current-generation Apple products.
I’ve highlighted savings on Apple Watches and the AirPods Pro 3 — which now drop to their lowest price in Australia. These aren’t the only Apple deals live on Amazon right now, and if you’re totally enamoured with my picks, you can view the full selection at the Apple storefront on Amazon.
The US government has selected BlackSky to design and build the next generation of its space surveillance capabilities. The newly announced contract is an indefinite delivery/indefinite quantity (IDIQ) agreement, meaning the company will provide as many satellites and monitoring services as the Air Force Research Laboratory requires for its missions…. Read Entire Article Source link
Prominent leaker KeplerL2 recently claimed that Sony’s rumored handheld will feature a faster graphics chip than the Xbox Series S. The device, codenamed Canis, is expected to complement the PlayStation 6, which is not expected to arrive before late 2027. Read Entire Article Source link
The current war between Iran, the United States, Israel, and other Gulf countries has seen a huge spike in drone warfare, particularly from Iran. Iran’s use of drones in warfare is quite different from what Western countries do. The United States might use big surveillance drones like the RQ-4 Global Hawk or attack drones like the MQ-9 Reaper. Such drones are expensive and meant to come back to base after the mission is done.
A lot of Iranian drones, on the other hand, take a different approach. The Shahed-136 is a kamikaze drone that’s supposed to expend its payload by running into a target. As opposed to a Reaper drone, where the system to control it and the aircraft itself costs over $56 million, a Shahed-136 can cost anywhere between $20,000 and $50,000.
A Shahed, as reported by the US Army, has a wingspan of 8.2 feet and carries an 88-pound warhead. It’s powered by a small aircraft engine mounted in the “tail.” It’s also described as a “loitering” munition meaning that it can stay in the air and hunt for targets. It has a range of a little over 1,200 miles (or 2,000 kilometers).
Advertisement
Drones are cheap, interceptors are expensive
While an individual Shahed-136 is certainly effective, it can be intercepted easily. As such, it’s mostly used in a swarm configuration. A swarm of Shaheds can saturate air defense systems, forcing Western forces to “waste” interceptor missiles on targets that cost a fraction as much. The Terminal High Altitude Area Defense system, also called THAAD uses a network of radar installations and sensors to intercept airborne threats with missiles. Each interceptor missile costs approximately $12.7 million, according to U.S. Congress reports.
Advertisement
The THAAD has a reported successful intercept rate of 90%. That’s good for forces and civilians on the ground, but the cost is skyrocketing and the amount of missiles in stock is dwindling. Congress reports: “Another reported concern is that the usage rate of THAAD interceptors during Operation Fury has further depleted limited interceptor stocks.”
Each THAAD battery consists of six launcher trucks, each supplied with 48 missiles. Those trucks and missiles are guided by a TPY-2 radar station and a communications station. It requires 90 soldiers to run and a single battery costs $2.73 billion. Lockheed Martin, the developer of the THAAD, says that between the United States, United Arab Emirates, and Saudi Arabia, there are 10 active batteries.
SpaceX has confidentially filed paperwork with the Securities and Exchange Commission to sell shares to the public, according to multiple sources familiar with the registration, setting the stage for what would be the largest initial public offering in history and almost certainly making Elon Musk the world’s first trillionaire. The offering, internally code-named Project Apex, could come as early as June and reportedly aims to raise as much as $75 billion at a valuation of up to $1.75 trillion. That would more than double Saudi Aramco’s $29 billion listing in 2019, the current record holder, and would value SpaceX at roughly 94 times its 2025 revenue.
Twenty-one banks have lined up to manage the deal, with Goldman Sachs, JPMorgan Chase, Morgan Stanley, Bank of America, and Citigroup in senior roles, according to CNBC. Musk, who owns approximately 42 per cent of SpaceX according to PitchBook, has a current net worth estimated by Forbes at $823 billion. At a $1.75 trillion valuation, his stake alone would be worth more than $730 billion, pushing his total wealth past the trillion-dollar mark and placing him further ahead of every other person alive than any individual in modern economic history.
The company filing for this listing, however, is no longer just a rocket business. In February, SpaceX absorbed Musk’s artificial intelligence company xAI in an all-stock transaction that valued the combined entity at $1.25 trillion. That deal,a merger that raised immediate questions about optics, governance, and valuation, folded a company reportedly burning roughly $1 billion a month into one generating substantial cash flow. SpaceX also brought Musk’s social media platform X, formerly Twitter, under the same corporate roof. The result is a conglomerate spanning orbital launches, satellite internet, defence contracts, artificial intelligence, and social media, all controlled by a single individual who is simultaneously the largest financial backer of the sitting president of the United States.
The financial engine behind the valuation is Starlink, the satellite internet service that has become the most commercially successful space venture in history. In 2025, Starlink generated $10.6 billion in revenue on 54 per cent EBITDA margins, accounting for roughly two-thirds of SpaceX’s total revenue of $16 billion. The subscriber base has grown from 10,000 beta users in 2021 to more than 10 million paying customers across 150 countries as of February 2026. The Federal Aviation Administration’s January 2026 approval for up to 44 annual Starship launches has provided the operational headroom investors needed to underwrite a public valuation at this scale.
Advertisement
The 💜 of EU tech
The latest rumblings from the EU tech scene, a story from our wise ol’ founder Boris, and some questionable AI art. It’s free, every week, in your inbox. Sign up now!
The xAI component of the entity going public is, by contrast, a work in progress. Musk himself said in March that xAI was “not built right the first time around” and needed to be rebuilt from its foundations. Since the merger,all 11 of xAI’s original co-founders have departed the company, including researchers who had previously worked at Google DeepMind, Google Brain, and Microsoft Research. Jimmy Ba, who co-authored the Adam optimisation paper, one of the most cited in all of artificial intelligence, left in February. Critics have characterised the merger as a financial bailout that allows xAI’s mounting losses to be absorbed by Starlink’s cash flow ahead of the IPO, a framing Musk has rejected.
The conflicts of interest embedded in this offering are without precedent in American capital markets. In the past five years alone, SpaceX has won $6 billion in contracts from NASA, the Department of Defense, and other federal agencies, according to USAspending.gov. The company is NASA’s primary launch provider for crewed missions to the International Space Station and holds more than $4 billion in contracts for the Artemis lunar-landing programme. The Pentagon is reportedly preparing to award SpaceX a $2 billion contract to build a 600-satellite constellation for missile tracking as part of the Golden Dome missile-defence initiative, a programme Trump announced would cost $175 billion and begin initial operations within three years.
Advertisement
Musk was the largest individual donor to Trump’s 2024 presidential campaign and led the Department of Government Efficiency, or DOGE, a temporary body that unilaterally cancelled more than 10,000 federal contracts it deemed wasteful. Ethics observers noted that none of the cancellations affected Musk’s own companies. Among SpaceX’s current investors is Donald Trump Jr, the president’s eldest son, who holds shares through 1789 Capital, a venture firm that made him a partner shortly after his father won the presidency for a second time. That fund, which has crossed $1 billion in assets, has invested approximately $50 million in SpaceX and xAI and has backed at least four companies that subsequently received government contracts during the current administration. The White House has repeatedly denied any conflicts of interest between the presidency and the Trump family’s business activities.
The governance risks do not end at the political boundary. SpaceX under Musk has operated as a private company with minimal public disclosure for more than two decades. Going public will force it to file quarterly earnings, disclose executive compensation, open its books to auditors, and face shareholder lawsuits of the kind Tesla already contends with regularly. Tesla shareholders are currently suing Musk over the company’s $2 billion investment in xAI, arguing he directed shareholder capital into his own private venture. The SpaceX-xAI merger, in which both the buyer and seller were controlled by Musk, presents a similar structure of self-dealing that public-market investors andregulators already struggling with the pace of AI-era consolidationwill scrutinise closely.
One unusual feature of the planned offering is the reported intention to allocate up to 30 per cent of shares to retail investors, roughly triple the typical 5 to 10 per cent. The move echoes Google’s unconventional 2004 IPO, which used a Dutch auction to broaden access, and appears designed to build a base of loyal individual shareholders who may be less inclined to challenge management. For a company whose founder has cultivated a large and vocal online following, the retail allocation could serve as both a democratisation of access and a governance insulation mechanism.
SpaceX’s listing would be the first of what could be a trio of mega-IPOs from thecompanies that defined the current era of AI and deep tech. OpenAI and Anthropic are both reportedly considering public offerings, though neither has filed. Together, the three listings would represent a concentration of market value in a handful of companies whose products, from orbital internet to frontier AI models, now intersect with national security, global communications, and the basic infrastructure of economic life.
Advertisement
The scale of what SpaceX is attempting is difficult to overstate. A $75 billion raise would exceed the gross domestic product of more than half the world’s countries. A $1.75 trillion valuation would make SpaceX more valuable at listing than every company in the S&P 500 except Apple, Microsoft, Nvidia, Amazon, and Alphabet. And at the centre of it all is a single individual who builds the rockets that carry American astronauts, runs the satellites that provide internet to war zones, leads an AI company he admits needs rebuilding, owns a social media platform that shapes political discourse, and has the mobile-phone number of the president.
Whether that concentration of power, capital, and government dependency can survive the scrutiny of public markets is the question Project Apex will ultimately answer. Thedefence-tech sector is already drawing record investmenton the thesis that the next generation of military capability will be built by private companies rather than government labs. SpaceX is the largest and most consequential test of that thesis. If the IPO succeeds on the terms being discussed, it will not merely be the biggest stock offering in history. It will be a statement about the degree to which twenty-first-century governments have outsourced their most critical capabilities to the private sector, and about the price of getting them back.
You must be logged in to post a comment Login