Connect with us
DAPA Banner
DAPA Coin
DAPA
COIN PAYMENT ASSET
PRIVACY · BLOCKDAG · HOMOMORPHIC ENCRYPTION · RUST
ElGamal Encrypted MINE DAPA
🚫 GENESIS SOLD OUT
DAPAPAY COMING

Tech

The Reason Air Force One Needs Nearly Twice The Wiring Of A Regular 747

Published

on





Both of the current Boeing 747-200Bs, which carry the military designation VC-25A and are known as “Air Force One,” have some truly amazing features. They’ve been in use since 1990, and are maintained and operated by the Presidential Airlift Group, part of the White House Military Office. They boast 4,000 square feet of floor space, divvied up across three levels, and (among other things) include a large office, bathrooms, a small gym, a conference room, a state-of-the-art emergency medical bay, and two fully equipped food galleys.

It also has a world-class communication center that includes dozens upon dozens of telephones,  televisions, an array of multi-frequency radios, computers, and other communication and data-gathering equipment — all of which require a whole lot of wires. In fact, there are 238 miles worth of wiring running through the walls, floors, and ceilings, double what you’d find in a standard jumbo jet. The two new VC-25B’s replacing the old VC-25A’s will have 250 miles of wiring.

Additionally, every inch of that cabling is wrapped and hardened with heavy shielding to protect it and the sensitive electronics it supports from electromagnetic pulses or nuclear attacks. In fact, the Presidential plane is one big flying Faraday Cage. In simplest terms, creating a continuous capacitor that fully encapsulates any given electronic device will shield it from the devastating effects of an electromagnetic pulse. “Air Force One” has, in effect, two layers of cages, just in case the outer layer becomes damaged and lets a signal leak through. The second level of protection operates internally, encasing all critical systems in their own cages.

Advertisement

There are many layers to Air Force One

The current “Air Force One” is powered by four General Electric CF6-80C2B1 jet engines, each producing 56,700 pounds of thrust. It’s almost 232 feet long and 63 feet high, with a wingspan of 195 feet. These Boeing 747-200Bs have a top speed of 630 mph, a ceiling of 45,100 feet, and a range of 7,800 statute miles (6,800 nautical miles). It takes a crew of 30 people to operate and can carry up to 71 people.

While exact details of its advanced avionics and defenses are classified, the Air Force considers it a military aircraft because it’s designed to withstand an air attack. Not only does it have electronic countermeasures (ECM) to jam enemy radar, but also mirror-ball defenses to blind infrared guidance systems. It can also fire both chaff and flares to disrupt enemy missiles, including heat-seekers. A standard passenger plane doesn’t have to worry about such things, which is why “Air Force One” has twice the wiring of a conventional Boeing 747.

Advertisement

In 1943, Franklin Roosevelt became the first President to fly while in office. He hopped aboard a Boeing 314 flying boat named the “Dixie Clipper” and flew 5,500 miles across the Atlantic Ocean to meet with British Prime Minister Winston Churchill about the events of World War II. The “Air Force One” moniker didn’t come into use until Dwight D. Eisenhower was President in 1953, and even then, it was only considered a nickname. It didn’t become the official call sign until almost a decade later, in 1962, when John F. Kennedy became the first President to fly aboard the first purpose-built Boeing 707 “Air Force One.”



Advertisement

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Tech

5 Steps to Managing Shadow AI Tools Without Slowing Down Employees

Published

on

Adaptive Security Shadow AI

When an employee installs an AI writing assistant, connects a coding copilot to their IDE, or starts summarizing meetings with a new browser tool, they are doing exactly what a productive employee should do: finding faster ways to work.

Across most organizations today, employees are running three to five AI tools on any given day. Most were never reviewed by IT. A significant portion connect to corporate data through OAuth tokens or browser sessions, giving them access to shared drives, emails, and internal documents the employee never specifically intended to expose. Security teams often have no visibility into any of it.

This is the shadow AI gap, and it is widening fast. Most security tools were built to monitor email and network traffic flowing through the corporate network. A browser-based AI tool that connects to company data through a quick login approval bypasses those controls entirely, because it never passes through the corporate network at all.

According to Adaptive Security research, 80% of employees currently use unapproved generative AI applications at work, and only 12% of companies have a formal AI governance policy in place. The result is a growing disconnect between how employees work and what security teams can see.

Advertisement

A program that channels AI adoption into a safe, visible, approved path gives security teams the visibility they need and employees the tools they want. The five steps below show exactly how to build one.

Step 1: Build a Full Picture of What’s Running

A security program can only manage what it can see. The first step is discovering which AI tools are in use across the organization, and most security teams will find the answer surprising.

Three areas account for the majority of shadow AI activity.

  • OAuth connections. Most AI tools request access to Google Workspace or Microsoft 365 through OAuth, which grants them read or write permissions to corporate data. A quarterly audit of connected third-party apps, sorted by permission scope, usually surfaces dozens of tools the security team never reviewed.  

  • Advertisement
  • Browser extensions. Many AI tools run as browser extensions and never touch the operating system, so traditional endpoint management tools miss them entirely. A browser management solution or a lightweight agent installed on employee devices can scan for and identify which extensions are active across the organization.  

  • AI features bundled inside already-approved tools. Microsoft Copilot, Google Gemini, and Salesforce Einstein are examples of AI capabilities that may have been introduced after the original vendor review, often without a separate security evaluation.

A simple employee survey is also worth running. A survey framed around helping employees work more safely tends to get candid responses. Many shadow tools surface through surveys that automated discovery misses entirely.

The goal of this step is a current, accurate inventory: every AI tool in use, who is using it, and what data it has access to.  

AI-powered social engineering has moved beyond email –– into voice, SMS, and deepfake video.

Advertisement

Adaptive Security protects teams by simulating attacks, measuring risk, and closing the gaps legacy SAT misses. CISO-grade defense for a new threat model.

Take a tour

Step 2: Write a Policy That Works With Employees  

Most AI acceptable use policies stall for the same reason: they give employees a list of prohibited tools with no guidance on what the approved path looks like. A policy designed as a practical guide, one that identifies approved tools and provides a clear process for requesting new ones, is the foundation employees need to make good decisions.

An effective AI governance policy covers five things.

  • Clear data classification rules specifying which categories of data, including customer records, source code, and financial information, should never be entered into any AI tool.  

  • Advertisement
  • A verified data training opt-out status for each approved tool. Many AI tools use company inputs to improve their models by default unless enterprise settings are explicitly configured otherwise. Approval should require confirmed opt-out for any tool that handles sensitive data.  

  • A defined process for requesting new tools, with a target turnaround time.  

  • A plain-language explanation of why the guidelines exist.

That last element matters more than it might seem. Employees who understand why OAuth connections carry data exposure risk apply that reasoning to every tool decision they make. Policy becomes a form of education when the reasoning is included.  

Step 3: Create a Fast Lane for New Tool Requests  

Shadow AI grows fastest in organizations where the official approval process cannot keep pace with the rate of AI product releases. An employee who needs a tool today and faces a six-week security review will find a workaround within days. The goal of this step is to remove that friction.

Advertisement
  • Most AI tool requests do not warrant a full procurement review. A structured intake form with defined evaluation criteria is enough for the majority of lower-risk tools.  

  • A structured intake form and a defined set of evaluation criteria make faster decisions possible. For tools with limited data access, many organizations find a shorter turnaround feasible once evaluation criteria are documented and consistently applied.  

  • The evaluation criteria should cover data access scope, vendor security practices, data training opt-out status, compliance certifications, and whether the tool already has a functional equivalent on the approved list.

Security teams that publish their approved tool list openly and keep it current typically see a meaningful reduction in shadow AI usage. When employees know where to find the right tools, they use them.

Step 4: Use Monitoring as a Shared Safety Layer  

Continuous visibility into AI tool usage across an organization serves two groups simultaneously.

Advertisement
  • Security teams get the real-time picture they need to identify and address exposure before it becomes an incident.  

  • Employees get a form of protection they often do not have on their own: a signal when a tool they are using may be putting their credentials or company data at risk.

A browser-native monitoring approach gives security teams visibility into AI activity without rerouting employee web traffic or adding friction to daily work. The signals it captures feed into each employee’s broader risk profile, sitting alongside their phishing simulation results and training completion data in one place.

That combined view matters because risky behaviors compound. An employee who clicks phishing links, skips training, and runs unapproved AI tools with access to sensitive data presents a much higher risk than any single behavior would indicate. Seeing the full picture in one place helps security teams focus on the employees who need attention most.

Step 5: Make Good Security Behavior Easy

Security programs that make the secure choice the easiest choice are the ones employees follow. In the context of AI governance, two things drive that: just-in-time coaching and training that explains the reasoning behind the rules.

Advertisement

Just-in-time coaching delivers a brief, contextual prompt at the moment an employee attempts to use an unsanctioned tool. This is more effective than quarterly training modules, because the intervention happens at the point of decision. A well-designed prompt tells the employee what the concern is, directs them to an approved alternative, and takes less than thirty seconds to read.

Training that explains the reasoning behind AI governance policies builds the kind of judgment employees can apply across any situation they encounter, including tools and threats that emerge long after the training itself. The AI tool landscape is changing fast enough that no training program can anticipate every specific case.

An employee who understands that OAuth connections to corporate Google Workspace can expose the entire shared drive to a third-party vendor will apply that understanding to tools that did not exist six months ago.

Building a Security Program Based on How Teams Work 

AI adoption is a signal of productive teams doing their jobs well. Companies that build practical programs around that momentum, with clear paths to approved tools and real-time visibility for security teams, tend to handle it best.

Advertisement

Security teams that close that gap find that shadow AI usage declines organically over time. Browser-native visibility, clear paths to approved tools, and just-in-time coaching at the moment of risk are what make that possible.

When employees have access to effective, approved tools and a fast, transparent path to get new ones reviewed, the incentive to work around the system largely disappears.

Adaptive Security’s AI Governance product gives security teams real-time visibility into every AI tool and shadow app running across their organization, with automated policies and just-in-time employee coaching built in.

Learn more at adaptivesecurity.com.

Sponsored and written by Adaptive Security.

Advertisement

Source link

Continue Reading

Tech

These 11 Automatic Cat Feeders Were the Best We Tested in 2026

Published

on

Compare Our Picks

Others Tested

A white and clear automatic feeder and water dispenser for cats with brown kibble on a wood floor.

Photograph: Molly Higgins

Oneisall 2-in-1 Automatic Cat Feeder and Water Dispenser for $54: Generally, I’m a fan of all the Oneisall pet products I’ve tested. While they aren’t the most technologically advanced, they are always reliable and cheap. This model is relatively simple. To set up, you’ll need to hook up the bowl supports and dishwasher-safe stainless steel bowls, fill the water and kibble compartments, and plug in. This model runs on corded electricity but has an optional 4 AA batteries in case of power outage. There is no connected app. You’ll just set the clock and adjust meal settings, and you can schedule one to six meals per day with adjustable portions, from one to 10 portion sizes. I don’t love having food and water so close, since cats prefer them to be separate to prevent cross-contamination in the wild. I always recommend automatic pet fountains instead for a fresh source of water, but if you don’t have a lot of space, are on a budget, and need a temporary solution for getting fresh water to your kitty while you’re out of town, the gravity-fed water system ensures water stays relatively fresh (plus, the translucent tank makes it easier to check water levels). I’d recommend this basic option if you’re on a budget and need a temporary solution for when you’re out of the house (and don’t mind not having a connected app).

Front view of the Closer Pets C200 Automatic Pet Feeder two white ovalshaped containers with a timer dial at the top of...

Photograph: Molly Higgins

Closer Pets C200 2-Meal Automatic Pet Feeder for $50: This automatic feeder is super simple, which is both its weakness and its strength. It’s essentially two shallow plastic containers with stainless steel inserts (both dishwasher safe) and tamper-resistant lids that are locked and automatically open using an old-school egg-style timer that runs on a AA battery rather than electricity. Although the container has an ice pack to keep the wet food cool, after one night it lost virtually all of its coolness. There’s a lid-link clip attachment, a small piece of plastic that links the lids to ensure they will open at the same time, which is super helpful for owners of two cats like me. I wish the timer were electric so I could program it to the exact time I want it open, rather than guesstimating the timing on the little marks. However, this is a simple solution to help make sure both my cats are given wet food without me having to wake up at the crack of dawn.

Image may contain Hardwood Wood Electronics Screen Computer Hardware Hardware and Monitor

Photograph: Molly Higgins

Oneisall Cordless WiFi Automatic Cat Feeder for $70: I had high hopes for this cordless feeder that boasts a rechargeable battery with a 100-day life and an integrated app, but it’s just too unreliable. Through the app, you can program up to 10 daily meals (in 1-12 portions each), monitor pets’ eating habits, and customize meal calls. Unlike other apps, you’re not able to choose portion size, but instead have to multiply the number of servings. The app gave me constant problems, and would often disconnect from the feeder and be unable to reconnect to WiFi. Luckily, I was able to program meals via the screen and buttons, but it would’ve been a whole lot nicer if the app had worked reliably.

Advertisement

Do Not Recommend

Image may contain Computer Hardware Electronics and Hardware

Courtesy of Amazon

Catit Pixi Smart 6-Meal Feeder for $100: Like others on this list, the Catit Pixi wet and dry feeder uses ice packs to keep wet food fresh and rotates the meals in six compartments on a set schedule. The schedule can be programmed via the app or changed on the body of the feeder. At this price point, the app shouldn’t be this limited and glitchy. The schedule is available in military time only, and the app is extremely limited—you can only set the meal schedule for the same day, and when I wanted to do only two to three meals a day spread over two days, I had to reschedule the meals for every new day. The feeder didn’t keep it cold enough to spread the meals out and the wet food was not at a safe eating temperature. At this price point, just get the Petlibro Polar wet feeder for a few bucks more.

Catit Pixi Smart Cat Feeder for $140: Kibble is stored in the body of this dry feeder, but it doesn’t have a window to visually check food levels. The calendar to plan meals shows only a week at a time, and although it should repeat daily based on the schedule, I found that some days there would be no schedule despite setting one up. The Pixi also doesn’t tell you how much food was dispensed; it just refers to it as a “portion”—I manually measured and found the portion was less than a tablespoon of kibble. After using it continuously for more than a month, I found it was extremely glitchy and almost never reliably stuck to the programmed schedule, sometimes skipping meals altogether. This feeder is potentially dangerous, and I’d caution pet parents against relying on it.

Advertisement

Closer Pets C500 for $75: This automatic wet and dry feeder can schedule up to four pre-portioned meals (and one meal given manually) that are opened on a timer system using three AA batteries (sold separately). The user presets the four times they want the bowls, which have ice packs underneath, to rotate. The bowls are quite deep and narrow and aren’t super easy for cats to reach, which could cause whisker fatigue. And although there are two relatively large ice packs, when I checked on the feeder after a night’s sleep, the packs weren’t very cold. This may be OK for kibble, but wet food was kept at unsafe temperatures, and my cats couldn’t reach all of the food.

Why Use an Automatic Feeder?

Advertisement

Automatic feeders are great for pet owners who want to help manage their pets’ weight and monitor eating patterns. Plus, they allow for a lot more control and precision for owners to learn exactly how much their cat is eating and when. Because cats are naturally more nocturnal, many have the annoying habit of waking you up in the early hours, demanding food, and these allow you to set up a schedule that fits more to their schedule without inconveniencing yours.

Of course, it’s never recommended to leave pets alone for long periods, but these automatic feeders give more peace of mind and are a whole lot healthier for your pet than leaving a huge amount of food for free-feeding while you’re away for the night. Simply put, it’s an easier way to feed and monitor your cat’s health with less work for you, the human.

I have two rescue cats, ages 4 and 5, and they eat two wet-food meals a day and small amounts of dry kibble throughout the day. Vets (and TikTokkers) have successfully persuaded me to move toward a primarily wet-food diet, however, which has a higher water content. This provides more moisture in their diet, which helps with potentially life-threatening problems like UTIs, which are especially prevalent in male cats. I still like to give smaller dry-food meals throughout the day for them to satisfy their need for crunch.

For dry food, I use Hill’s Science Diet, and for wet food, I use Friskies’ Shreds variety. (Yes, only Shreds. Fellow cat owners will understand.)

Advertisement

I set up the feeders, noting ease of setup, potential problems, and app navigation. I also tested various schedules and manual feedings through the app, noting any issues. I used each of the feeders for at least a week, if not more.

How Long Can I Leave My Cat Alone?

Although cats are generally thought of as less high-maintenance than dogs, it’s still not good to leave your cat for prolonged periods. Under dire circumstances, you can leave a cat alone for 24 to 48 hours with scheduled feedings and a clean water source, but it’s not ideal—especially for cats with health issues, kittens younger than a year, or very elderly cats. Although these feeders are automatic, and meals can be scheduled in advance and over multiple days, our pets still need their human pals around for enrichment, care, and well, love.

Source link

Advertisement
Continue Reading

Tech

Four AI supply-chain attacks in 50 days exposed the release pipeline red teams aren’t covering

Published

on

Four supply-chain incidents hit OpenAI, Anthropic and Meta in 50 days: three adversary-driven attacks and one self-inflicted packaging failure. None targeted the model, and all four exposed the same gap: release pipelines, dependency hooks, CI runners, and packaging gates that no system card, AISI evaluation, or Gray Swan red-team exercise has ever scoped.

On May 11, 2026, a self-propagating worm called Mini Shai-Hulud published 84 malicious package versions across 42 @tanstack/* npm packages in six minutes flat. The worm rode in on release.yml, chaining a pull_request_target misconfiguration, GitHub Actions cache poisoning, and OIDC token extraction from runner memory to hijack TanStack’s own trusted release pipeline. The packages carried valid SLSA Build Level 3 provenance because they were published from the correct repository, by the correct workflow, using a legitimately minted OIDC token. No maintainer password was phished. No 2FA prompt was intercepted.

The trust model worked exactly as designed and still produced 84 malicious artifacts.

Two days later, OpenAI confirmed that two employee devices were compromised and credential material was exfiltrated from internal code repositories. OpenAI is now revoking its macOS security certificates and forcing all desktop users to update by June 12, 2026. OpenAI noted that it had already been hardening its CI/CD pipeline after an earlier supply-chain incident, but the two affected devices had not yet received the updated configurations. That is the response profile of a build-pipeline breach, not a model-safety incident.

Advertisement

Four incidents, one finding

Model red teams do not cover release pipelines. The four incidents below are evidence for a single architectural finding that belongs in every AI vendor questionnaire.

OpenAI Codex command injection (disclosed March 30, 2026). BeyondTrust Phantom Labs researcher Tyler Jespersen found that OpenAI Codex passed GitHub branch names directly into shell commands with zero sanitization. An attacker could inject a semicolon and a backtick subshell into a branch name, and the Codex container would execute it, returning the victim’s GitHub OAuth token in cleartext. The flaw affected the ChatGPT website, Codex CLI, Codex SDK, and the IDE Extension. OpenAI classified it Critical Priority 1 and completed remediation by February 2026. The Phantom Labs team used Unicode characters to make a malicious branch name visually identical to “main” in the Codex UI. One branch name. That is where the attack started.

LiteLLM supply-chain poisoning and Mercor breach (March 24–27, 2026). The threat group TeamPCP used credentials stolen in a prior compromise of Aqua Security’s Trivy vulnerability scanner to publish two poisoned versions of the LiteLLM Python package to PyPI. LiteLLM is a widely adopted open-source LLM proxy gateway used across major AI infrastructure teams. The malicious versions were live for roughly 40 minutes and received nearly 47,000 downloads before PyPI quarantined them.

That was enough.

Advertisement

The attack cascaded downstream into Mercor, the $10 billion AI data startup that supplies training data to Meta, OpenAI, and Anthropic. Four terabytes exfiltrated, including proprietary training methodology references from Meta. Meta froze the partnership indefinitely. A class action followed within five days. One compromised open-source dependency sitting 40 minutes on PyPI created a cross-industry blast radius that no single vendor’s model red team would have caught.

Anthropic Claude Code source map leak (March 31, 2026). This incident was not adversary-driven. Anthropic shipped Claude Code version 2.1.88 to the npm registry with a 59.8 MB source map file that should never have been included. The map file pointed to a zip archive on Anthropic’s own Cloudflare R2 bucket containing 513,000 lines of unobfuscated TypeScript across 1,906 files. Agent orchestration logic. 44 feature flags. System prompts. Multi-agent coordination architecture. All public. All downloadable. No authentication required. Security researcher Chaofan Shou flagged the exposure within hours, and Anthropic pulled the package. Anthropic confirmed it was a “release packaging issue caused by human error.” This was the second such leak in 13 months. The root cause was a missing line in .npmignore. No attacker was involved, but the release-surface gap is identical. No human review gate existed between the build artifact and the registry publish step.

TanStack worm and downstream propagation (May 11–14, 2026). Wiz Research attributed the Mini Shai-Hulud attack to TeamPCP with high confidence. StepSecurity detected the compromise within 20 minutes. The worm spread beyond TanStack to Mistral AI, UiPath, and 160-plus packages within hours. Mini Shai-Hulud even impersonated the Anthropic Claude GitHub App identity by authoring commits under the fabricated identity “claude ” to bypass code review.

Four incidents. Three frontier labs. One finding. The red-team scope stops at the model boundary, and the build pipeline sits on the other side of it.

Advertisement

The timing no system card can explain

On May 10, 2026, OpenAI launched Daybreak, a cybersecurity initiative built on GPT-5.5 and a new permissive model called GPT-5.5-Cyber designed for authorized red teaming, penetration testing, and vulnerability discovery. Daybreak pairs Codex Security with partners, including Cisco, CrowdStrike, Akamai, Cloudflare, and Zscaler. OpenAI positioned the launch as proof that frontier AI can tilt the balance toward defenders.

The next day, the TanStack worm compromised two OpenAI employee devices.

OpenAI’s own incident disclosure acknowledged the gap directly. The company had already been hardening its CI/CD pipeline after the earlier Axios supply-chain attack, but the two affected devices “did not have the updated configurations that would have prevented the download.” The controls existed. The deployment was in progress. The worm arrived first.

The security community saw the same gap: Security researcher @EnTr0pY_88 noted on X that the real signal was the certificate rotation, not the exfiltrated code. “The cert rotation…is what you do when the blast radius reached signing trust, not just source access.” @OpenMatter_ put the SLSA provenance failure in one sentence. “If an attacker controls your CI runner, they control your attestations. Policy-based security is failing at scale.” And @The_Calda compressed the disclosure’s internal contradiction into seven words. “‘Limited impact’ but the next sentence is ‘we’re rotating signing certs.’”

Advertisement

A company that launched a cyber defense platform on Sunday and disclosed a build-pipeline breach on Tuesday is not failing at model safety. OpenAI is demonstrating the exact gap this audit grid exists to close. The model red team and the release-pipeline red team are two different disciplines; four incidents in 50 days suggest only one of them is being funded consistently.

The VentureBeat Prescriptive Matrix

The matrix below maps the seven release-surface classes missing from AI vendor questionnaires, with vendor hit, failure mechanism, detection gap, technical mitigation, and priority tier a security team can execute before Q2 renewals close.

For teams that need to map these rows into existing GRC tooling, rows 2, 3, and 5 align with NIST SSDF PS.1.1 (protect all forms of code from unauthorized access and tampering). Row 4 maps to SSDF PS.2.1 (provide mechanisms for verifying software release integrity). Row 6 maps partially to SLSA Source Track requirements for verified contributor identity, though no published framework directly addresses upstream dependency maintainer credential provenance. Row 7 is not yet addressed by any published framework, which is itself the finding.

Release-surface class

Advertisement

Vendor hit

Failure mechanism

Detection gap

Technical mitigation

Advertisement

Priority

Model capability evals (jailbreak, misuse, exfiltration)

All three (ongoing)

Covered. System cards, AISI Expert suite, Gray Swan scope this today.

Advertisement

None. This row is the baseline.

Continue requiring the system card at every renewal.

Baseline

CI runner trust boundary (pull_request_target)

Advertisement

TanStack; OpenAI downstream (May 11–14, 2026)

TanStack pwn-request ran fork code in base-repo context. Poisoned pnpm cache. Extracted OIDC token from runner memory. Two OpenAI employee devices compromised.

No system card covers CI runner isolation. No AISI eval tests fork-to-base trust boundaries.

Audit every repo for pull_request_target + fork SHA checkout. Block fork code from base-repo context. Pin cache keys to commit SHA.

Advertisement

Do this week

OIDC trusted-publisher + SLSA provenance

TanStack; OpenAI downstream (May 11, 2026)

TanStack minted valid SLSA Build Level 3 provenance for all 84 malicious packages. First known npm worm with valid cryptographic attestation.

Advertisement

SLSA attestation confirms build origin, not build intent. No vendor questionnaire distinguishes the two.

Pin trusted publisher to branch + workflow, not just repository. Add behavioral analysis at install time.

Do this week

Release packaging review (human gate before publish)

Advertisement

Anthropic (Mar 31, 2026)

Missing .npmignore shipped 59.8 MB source map in Claude Code npm package. 513K lines exposed including agent logic, 44 feature flags, system prompts. Second leak in 13 months. Self-inflicted, not adversary-driven.

No red-team exercise checks artifact contents before registry publish.

Human review between build artifact and registry publish. Enforce .npmignore in CI. Fail build on unexpected artifact size.

Advertisement

Before renewal

Dependency lifecycle hooks (prepare, postinstall)

TanStack; OpenAI + downstream (May 11, 2026)

router_init.js executes on import. tanstack_runner.js self-propagates via optionalDependencies prepare hook. Spread to Mistral AI, UiPath, 160+ packages in hours.

Advertisement

Lifecycle hooks execute before any scanner runs. Model evals never test package install behavior.

Disable lifecycle scripts in CI by default. Explicit allowlist for production. Flag new optionalDependencies in PR review. Set minimumReleaseAge.

Do this week

Vendor maintainer credential hygiene

Advertisement

Meta via Mercor (Mar 24–27, 2026)

TeamPCP stole LiteLLM maintainer credential via prior Trivy compromise. Two poisoned PyPI versions live 40 min. Mercor cache held Meta training methodology references. 4 TB exfiltrated. Meta froze the partnership.

Vendor questionnaires ask about encryption and access control, not maintainer credential provenance for upstream dependencies.

Require hardware-key auth from every maintainer before onboarding. Add package-manager cooldown. Audit transitive dependency tree quarterly.

Advertisement

Add to vendor contract

Agent container input sanitization

OpenAI Codex (disclosed Mar 30, 2026)

BeyondTrust Phantom Labs injected shell commands through GitHub branch-name parameter. Stole OAuth tokens from Codex container. Scalable across shared repos. Rated Critical P1, patched Feb 2026.

Advertisement

Agent red teams test prompt injection, not input-parameter injection at the container level.

Sanitize all external input before shell execution. Audit OAuth token scope and lifetime per agent session. Enforce least-privilege on every container.

Do this week

Security director action plan

The matrix tells your team what to fix. Three actions tell security directors how to move it forward.

Advertisement
  1. Add one question to every AI vendor questionnaire. “Does your organization red-team its release pipeline, including CI runner trust boundaries, OIDC token scoping, dependency lifecycle hooks, and registry publish gates? Provide the last assessment date and scope.” No date and no scope document is the finding.

  2. Run rows 2 through 7 against your own CI pipelines this week. StepSecurity and Snyk both published detection and remediation steps for the TanStack worm patterns. Dev teams pull OpenAI SDKs, Anthropic packages, and Llama weights through npm, PyPI, and HuggingFace every week. The same patterns that got exploited are in your CI right now.

  3. Brief the board on the provenance gap. The TanStack worm proved that valid cryptographic provenance can sit on top of a malicious package. Attestation tells the board where a package was built. Behavioral analysis tells the board what it does after install. Q2 renewal requires both. Snyk’s analysis recommends pinning trusted publisher configurations to specific branches and workflows, not just repositories. That is the language the board presentation needs.

The worm already knows where your AI credentials live

Mini Shai-Hulud does not stop at CI secrets. Datadog Security Labs documented that the payload reads ~/.claude.json and exfiltrates it. It scans for 1Password and Bitwarden vaults, Kubernetes service accounts, cloud provider tokens, and shell history files where developers paste API keys. StepSecurity’s deobfuscation confirmed that Mini Shai-Hulud harvests Claude and Kiro MCP server configurations, which store API keys and auth tokens for external services. For developers using AI coding agents, the worm already knows where their credentials live.

OpenAI, Anthropic, and Meta will keep publishing system cards. They will keep funding red-team competitions. They will keep passing model evaluations. None of that stops the next worm from riding in on release.yml.

The TanStack postmortem team said it directly. Modern supply-chain defenses are important but not sufficient on their own. Teams must proactively identify and close workflow gaps rather than relying solely on the security features of their tools.

Source link

Advertisement
Continue Reading

Tech

US Citizens In ICE Detention Centers Is The New Normal In Trump’s America

Published

on

from the MAGA’s-replacement-theory dept

Behold this utter bullshit, uttered by the Trump administration’s “border czar” Tom Homan:

White House border czar Tom Homan said Thursday he’s “sure” Immigration and Customs Enforcement (ICE) officers have detained U.S. citizens, “but we don’t deport them.”

Homan told reporters outside the White House that U.S. citizens have “nothing to fear.”

“We deport people that are going to be deportable,” he continued. “We arrest people that will be deportable based on suspicion. Have U.S. citizens ever been shortly detained based on suspicion? I’m sure. I’m sure.”

This is demonstrably false. For the moment, children born in the United States are considered to be US citizens. The Trump administration wants to end birthright citizenship, but it hasn’t managed to accomplish that yet. But that isn’t stopping it from deporting US citizens just because they’re too young to be capable of invoking their rights, like the two-year-old US born child the administration deported to Honduras in direct violation of a federal court order.

Advertisement

Pretending it’s no big deal for US citizens to have their rights violated intermittently as the government goes after non-white people, that’s even more obnoxious. That the administration hasn’t deported large numbers of US citizens is a miracle, rather than an indicator of ICE competence.

If you keep arresting the same person over and over, sooner or later what’s left of the safety net will fail and that citizen will be expelled from the country. That’s what one US citizen is hoping to prevent with his lawsuit against the government, which is being handled by the Institute for Justice. On multiple occasions, federal officers have decided this US citizen is deserving of deportation, as Isabela Dias reports for Mother Jones:

In a declaration submitted as part of a civil lawsuit, Garcia Venegas said the agents pulled him out of the car and onto the ground, and shackled his arms and legs. Garcia Venegas estimates seven or eight law enforcement personnel, including US Immigration and Customs Enforcement officers and local police—most of whom wore plain clothes and tactical vests—surrounded him. They asked him no questions.

Garcia Venegas, a 26-year-old Florida-born US citizen, said he tried to show his Alabama STAR ID as proof of status, but the agents ignored him. They put him in the back seat of one of their vehicles, questioned him about his place of birth, and searched his wallet. He offered to provide his American passport, which was inside the house, but the agents refused. Several minutes later, they released him, but not before having dogs sniff the truck for drugs, according to the declaration. Garcia Venegas said the officers told him he had been stopped because the car he was driving was registered in the name of his brother, who is undocumented.

One time might be an aberration. Repeated occurrences are something else entirely.

Advertisement

This wasn’t the first time ICE agents stopped and held Garcia Venegas. In fact, Saturday’s encounter marked the third such incident, according to court filings. Garcia Venegas, whose parents are originally from Mexico, had twice before been detained after ICE raided construction sites where he was working, and twice before he was let go after proving his American citizenship.

On one hand, repetition indicates that anti-migrant efforts under Trump are extremely sloppy, overseen by people who value quantity over quality. That’s almost certainly true, especially now that the DHS has lowered hiring and training standards for ICE. On top of that, there’s the casual racism of the policies, which — thanks to the Supreme Court — are pretty much legal because officers are allowed to infer from darker skin tones that someone might be in the country illegally.

On the other hand, there’s a chance Venegas is being targeted repeatedly for vindictive reasons. That seems less likely, at least in terms of what’s been detailed in his court filings. If it continues now that his lawsuit has been filed, that might suggest his arrests and detentions are no longer accidental.

Whatever the case, there’s going to be more of this happening, no matter what half-assed niceties Tom Homan might state during press conferences. The Trump administration is fighting to end birthright citizenship in this nation. If it does make this happen, it won’t be retroactive. But that’s hardly going to matter to the DHS and its underling agencies, which have repeatedly violated the letter and spirit of existing laws, when not violating direct orders from federal courts.

And this administration is going even further, seeking to “denaturalize” certain US citizens in order to deport them:

Advertisement

The Trump administration on Friday announced a major expansion of its denaturalization campaign targeting foreign-born American citizens accused of fraudulently obtaining U.S. citizenship.

The Justice Department unveiled denaturalization cases in federal courts across the country against roughly a dozen U.S. citizens born overseas. Officials said they had committed serious crimes or immigration fraud, or had ties to terrorism.

At first glance, this might look like the sort of thing the US government should be doing. This takes serious criminals off our books (so to speak) and sends problematic naturalized citizens back to their home countries to be their problem.

But we already know how this is going to work. The “worst of the worst” lie has been uttered repeatedly to defend the administration’s aggressive/transgressive tactics. But the facts have repeatedly shown the administration just wants non-whites gone. It doesn’t really care about any relevant criminal activity.

The same thing is happening here. The administration is making it clear this is just more bigotry, rather than an actual effort to root out the “worst of the worst” for the safety of the nation.

Advertisement

The group of naturalized U.S. citizens whose citizenship the Justice Department is now seeking to revoke includes immigrants from Bolivia, China, Colombia, Gambia, India, Iraq, Kenya, Morocco, Nigeria, Somalia and Uzbekistan.

While this group does include some accused of molesting a child and a supposed terrorist sympathizer, it also includes these people:

The group also includes individuals who allegedly used false identities to apply for immigration benefits and a man who allegedly entered into sham marriages to commit immigration fraud.

These are far less serious crimes, which don’t lend themselves to the “worst of the worst” narrative the administration deploys when its actions are questioned.

The lack of diversity (in other words, no white people or those with ties to Western European countries) in those selected to be first up for denaturalization is a leading indicator of further unlawful detentions of US citizens. As the government goes after more non-white US citizens under this pretense, DHS agencies will respond by rounding up more non-white US citizens, turning Homan’s false assurances into the lie it was always meant to be.

The administration actually wants to deport certain US citizens. That these agencies are far too willing to oblige, even without the necessary facts in hand, will definitely increase the number of citizens being held by ICE and correspondingly increase the number of those deported despite still being citizens of this nation.

Advertisement

Filed Under: bigotry, cbp, dhs, donald trump, florida, ice, leonardo garcia venegas, mass deportation, rights violations, texas, tom homan, trump administration

Source link

Advertisement
Continue Reading

Tech

The Jury In The OpenAI Case Has Ruled Against Elon Musk

Published

on

After three weeks of testimony and not much deliberation, a jury has ruled against Elon Musk, finding that Sam Altman and Greg Brockman were not liable in the case. The jury found that the statute of limitations had already passed when Musk sued the two executives. 

Musk filed his lawsuit in 2024, accusing them of “stealing a charity” following his departure from the AI lab in 2018. Though the jury in the case served only an “advisory” role, Judge Yvonne Gonzalez Rogers agreed with the jury’s ruling. Musk’s claims of “breach of charitable trust and unjust enrichment are dismissed as untimely,” she said according to CNBC. Though Musk could still appeal the ruling, Rogers told his lawyer she would dismiss an appeal “on the spot.”

At the center of the case was OpenAI’s reorganization that saw it convert from a nonprofit to a public benefit corporation. Musk has maintained that the move, along with Microsoft’s $13 billion investment in the firm, was a breach of OpenAI’s original contractual agreements. A major question of the trial, though, was when Musk became aware of OpenAI’s for-profit ambitions due to the three-year statute of limitations in the case.

“The facts and the timeline in this case have long been clear, and we welcome the jury’s decision to dismiss these claims as untimely,” a Microsoft spokesperson said in a statement. “We remain committed to our work with OpenAI to advance and scale AI for people and organizations around the world.”

Advertisement

In testimony, Musk’s lawyers tried to paint Altman as a dishonest, lying person, even going so far as to reference his recent unflattering New Yorker profile. Altman often struggled to answer the allegations against him. Asked if he thought himself to be an honest person, Altman said, “I believe so.” Musk’s legal team immediately jumped on that answer. “You believe so?” asked Steven Molo, the lead lawyer for the world’s richest man. “I will just amend my answer to yes,” Altman responded.

When he was later questioned about statements from past OpenAI employees, including former CTO Mira Murati, who described Altman as someone who would say “one thing to one person and completely the opposite to another person,” Altman repeatedly claimed he had not seen their testimony. “You’ve repeatedly been called deceptive and a liar by people with whom you’ve done business, right?,” Molo asked. “I have heard people say that,” Altman responded.

Where Altman came off as meek during his testimony, Musk was combative and testy. “Your questions are not simple. They are designed to trick me, essentially,” Musk told William Savitt, OpenAI’s lead counsel. As the trial inched forward to its conclusion, Musk was absent, despite an order from Judge Yvonne Gonzalez Rogers that he remain in case he was called to testify again. “Mr. Musk isn’t here today. My clients are,” Savitt told the jury during closing arguments. “Mr. Musk came to this court for exactly one witness: Elon Musk. Now he’s in parts unknown.” Parts unknown, in this case, turned out to be by Trump’s side for his diplomatic trip to China.

Even before the trial began, Musk faced longshot odds at securing the remedies he sought. The billionaire sought to undo OpenAI’s for-profit conversion and force the removal Altman and Brockman from their positions on top of the company. There might have been a point early in OpenAI’s negotiations with the Attorneys General of California and Delaware where Musk might have had a chance to get his way, but it was clear Judge Gonzales Rogers was deeply hesitant to undo the work of public officials. When Musk filed a request for a preliminary injunction to stop the conversion, the judge said the request was “extraordinary and rarely granted.”

Advertisement

Source link

Continue Reading

Tech

Sony Raises PS Plus Prices For One- And Three-Month Subscriptions

Published

on

The company is blaming this increase on “ongoing market conditions.”

Sony has raised prices of the PS Plus subscription service. A one-month subscription to the Essential tier now costs $11 per month, an increase of $1. Additionally, a three-month subscription just went up to $28, an increase of $3. It looks like annual subscribers are off the hook for now, and the wording of Sony’s post on X announcing the change makes it sound like the Extra and Premium tiers are also impacted. This only impacts new subscribers, except in Turkey and India.

The company is blaming this increase on “ongoing market conditions.” When a tech company says this in 2026, it’s typically referring to Trump-adjacent tariffs or AI-based memory crunch. However, PS Plus is a digital subscription service that provides a handful of monthly game titles to download. Members do get cloud save storage and online multiplayer access, both of which require servers that could be more expensive to operate nowadays. Maybe that’s it. 

Advertisement

We don’t know if annual plans will be getting a price increase in the near future, but the company only mentioned the one- and three-month plans in the announcement. Engadget has reached out to Sony and will update this post when we hear back. The company jacked up annual plans by as much as $40 back in 2023.

Microsoft recently raised prices of Xbox Game Pass Ultimate all the way to $30 per month, which rightfully annoyed many players. New Microsoft Gaming CEO Asha Sharma quickly reversed course on this.

As for Sony, a monthly increase of $1 isn’t the biggest deal in the world. The same cannot be said of console price increases. A standard PS5 with a disc drive now costs a whopping $650. That’s a mighty big price of entry to even get started with PS Plus.

Advertisement

Source link

Advertisement
Continue Reading

Tech

How To Make Steel That Breathes

Published

on

There are plenty of porous materials out there that we’re all readily familiar with. Fabrics and wood are great examples, allowing liquids or gases to pass through to a certain degree—a property which is useful or problematic depending on the application.

Metals, however, are not something we would readily consider to be porous. They are solid, unyielding, and impermeable. However, with the right techniques, it is possible to produce so-called “breathable” steel, which has particularly interesting applications in the molding industry.

Breathe Into Me And Make Me Real

Imagine you’re making tooling for an injection molding operation. You’re using steel, of course, because you need a hard, resilient material that can deal with the high temperatures and pressures involved. It’s tough, and readily able to be machined into the desired geometry for your application. Of course, it doesn’t let liquid or gas pass, since it’s a solid impermeable material. This means that when you inject your mold full of hot plastic, you need to find somewhere for the air inside to go. Otherwise, the gas in the mold will end up dissolved in the molten plastic, causing voids, surface imperfections, and other irregularities. Chasing away gas porosity defects in finished parts is one of the major jobs of casting engineers the world over, an endless battle against the forces of heat transfer and fluid mechanics.

Traditionally, this is deal by designing a mold with exhaust ports or vacuum hookups to allow the air to vent out as needed. This takes a great deal of work to get right, particularly when it comes to getting your defect rates as low as possible in mass production. If your gas can’t vent fast enough, or if there are areas where it gets trapped, you end up with defects, and you have to go back to the drawing board.

Advertisement

Breathable mold steel attempts to solve this problem by venting gas through the tooling itself. It allows the creation of a steel mold that is full of tiny little pores that allow air to pass through, while still acting largely impermeable to the molten plastic being molded.

Breathable mold steel is quite something to behold, behaving quite unlike a normal steel part in this regard.

As you might imagine, it’s quite difficult to make a steel mold with complex geometry that also has lots of tiny contiguous holes that allow gases to pass through. It is possible, however, by using some tricky additive manufacturing techniques.

By mixing a foaming agent into powder metal for selective laser melting (SLM) printing, it’s possible to generate interconnected micrometer-scale pores in steel that allow it to ‘breathe’. The pores are generated by the gas released during the heat-based decomposition of the foaming agent. Credit: research paper

As outlined in one research paper, it’s possible to produce breathable steel via selective laser melting (SLM) 3D printing techniques. This involves using a high-powered laser to fuse metal powder together, layer by layer, to produce a final part. Combining a foaming agent with the metal powder enables the creation of 3D-printed metal parts with incredibly fine interconnected pores.

The pores need to be particularly small, on the order of 80 micrometers or less, such that they allow gas in the mold to pass freely while blocking the flow of the larger polymer molecules of the injected plastic.

Chromium nitride is one foaming agent typically used, for the fact that the Cr and N released during its decomposition both lend beneficial properties to the steel of the finished product. The foaming agent is mixed in with the steel powder, and melts along with it as the part is being produced. The breakdown of the foaming agent releases gas bubbles which creates pores in the steel part as it is produced in a relatively predictable manner.

Advertisement
Microscope images of breathable steel samples produced with 3% CrNx and 5% CrNx foaming agent, respectively. Credit: research paper

The level of porosity can be controlled by the amount of foaming agent mixed in to the steel powder, as well as the laser settings. Lower melt pool temperatures caused by faster scanning speeds or lower laser powers tend to favor more porous structures, due to the fluid mechanics involved and how the cooler liquid steel flows into existing pores.

There have been earlier attempts to vent molds with special breathable steel inserts in the past. These consist of premade rectangular inserts or round bars which have been made with so-called “ventilated steel” like PM-35. This material is made by sintering steel powders together in such a way to create a porosity of 20-30%. However, this process isn’t always great for advanced geometry that one might find in a injection mold. Thus, the creation of breathable rods and bars that can be used as an insert in a larger mold, acting as a localized vent. It’s a useful technique, but comes with more constraints on mold and part geometry than being able to simply create the whole mold itself out of breathable steel.

Micro-CT images of a breathable steel sample. Credit: research paper

There are other powder metal techniques that allow the production of more complex vented parts, but they can be expensive and difficult to execute well down to smaller pore sizes, especially compared to the simplicity of SLM printing with an additional foaming agent. The 3D-printing based process has also proven to have more admirable mechanical properties compared to products like PM-35 steel in some cases, with impressive compressive strength as well as hardness and corrosion resistance.

Breathable steel is probably not something you’ll come across in your everyday life unless you happen to work in particular manufacturing fields. Still, if you have the expensive 3D printing hardware on hand to work with metal powders, and you really want to make a complex metal part that’s also porous, this is a great way to go. You could probably use it to make some very weird magic tricks at the very least. Ultimately, it just goes to show that modern material processing techniques can upend everything we think we know about a common material like steel. It’s amazing what can be done!

Advertisement

Source link

Continue Reading

Tech

X Accounts Are Limited To 50 Posts And 200 Replies A Day Unless They Pay For A Blue Checkmark

Published

on

That’s down from the previous 2,400 posts per day limit.

X has introduced some more incentive to get users to pay for “verification” on its platform, but the new limitation may have angered some longtime users. As seen on X and Reddit, users are reporting that X has quietly restricted the amount of posts allowed for those without the blue checkmark. Now, the X Help Center page on limits reads that posts are limited to “50 original posts and 200 replies per day for unverified accounts.”

Compared to cached versions of the same Help Center page, the new limit is much lower than the previous “2,400 per day” rule. Interestingly, the updated page still references the 2,400 updates per day restriction. However, X will inform users of when they hit the new limits and which limit they reached with an error message.

This move could be a part of X’s campaign to cut down on spam and bot activity on the platform, as seen when it introduced the “about this account” feature in October that reveals where an account is based. However, those unhappy with this restriction said it could result in more users leaving the platform. For those who want to stick around and post to their heart’s content, X Premium’s most affordable option, its Basic tier, starts at $3 a month or $32 per year.

Advertisement

Source link

Advertisement
Continue Reading

Tech

Andover Audio The One MK2 Turntable Music System Adds Auto Stop, Multi-Room Connectivity, and Improved Vinyl Playback

Published

on

Consumers in 2026 are looking for better sound with fewer boxes, and that includes a lot of audiophile listeners. Not everyone wants a full rack of components, long cable runs, and large floorstanding loudspeakers in the den or living room. Some do not have the space, and others simply want a cleaner system that is easier to live with.

The $2,699 Andover Audio The One MK2 Turntable Music System is designed for that buyer. Building on the original Andover-One and the One E, the MK2 combines vinyl playback, factory preset calibration, end of record auto stop, and multi-room connectivity in one self contained system. It is not trying to replace every traditional hi-fi setup, but it does offer a more practical path for listeners who want records, streaming flexibility, and room to expand without building a stack of gear.

We set out to redefine what’s possible in an all in one music system and that day at RMAF 2019 proved we did just that,” said Bob Hazelwood, Chief Engineer at Andover Audio. “It was a turning point, and we’re proud to bring the joy of true high fidelity listening into more homes to help people connect, unwind, and feel more at home through the power of music.”

andover-one-mk2-tonearm-angle

What’s New With the Andover One MK2?

Easy Setup: Andover systems have always been designed for simple setup, but the One MK2 goes further with factory preset calibration. Tracking force, anti skate, and cartridge alignment are set before the system leaves the factory, allowing users to place the unit, plug it in, put a record on the platter, cue the tonearm, and start listening.

Advertisement

Audio Technica VM95E Cartridge: The One MK2 includes an Audio Technica VM95E dual moving magnet cartridge, a proven design known for solid channel separation, reliable tracking, and broad stylus upgrade support. Owners can move to other VM95 Series stylus options later without replacing the entire cartridge, giving the system a practical upgrade path.

Adjustable VTA: The One MK2 tonearm allows vertical tracking angle adjustment through a set screw at the tonearm pivot. That gives users more flexibility when changing cartridges or upgrading to more alignment sensitive styli, such as the Audio-Technica AT-VMN95ML or AT-VMN95SH, which benefit from more precise setup than standard conical or elliptical options.

Removable Headshell: The headshell attaches to the tonearm with a locking collar, making cartridge changes, upgrades, cleaning, and inspection easier. It also gives owners a more practical path for future cartridge or stylus maintenance without turning a simple system into a Saturday afternoon crime scene.

Intelligent Auto Stop: The One MK2 adds an optical sensor that stops the turntable motor shortly after the record side ends. The tonearm still needs to be lifted manually, but the auto stop feature helps reduce unnecessary stylus and record wear if the listener does not get to the turntable right away.

Advertisement

Quiet Spin: The One MK2 uses a split plinth design that helps isolate the turntable motor from the speaker enclosure. By reducing motor and enclosure vibration from reaching the stylus, the design is intended to lower noise and improve playback clarity.

Multi-Room Ready: The MK2 provides a Digital Optical Output that enables connection to a compatible external streamer. This includes connection to the Andover Audio Songbird HR Music Streamer or other multi-room capable systems to stream audio from the Mk2 to other rooms.

andover-one-mk2-screen-angle

Key Features That Carry Over in the Andover One MK2

IsoGroove Technology: Andover’s IsoGroove Technology is designed to allow a turntable and speaker system to operate inside a single compact enclosure while reducing feedback, resonance, and vibration related noise. The system uses Andover’s proprietary speaker design, internal bracing, and DSP to help keep vinyl playback stable and clean.

Advertisement. Scroll to continue reading.
Advertisement

Bluetooth: The Andover One MK2 supports Bluetooth, allowing users to stream directly from smartphones, tablets, and other compatible devices.

USB Port: The USB port supports playback from a USB flash drive and can also be used to record vinyl playback to USB for use with other compatible devices.

Outputs: The One MK2 includes preamp outputs for connection to an external amplifier or powered speakers, along with subwoofer outputs for adding a powered subwoofer.

Intuitive Interface: The One MK2 features a front mounted graphic display with single knob control, along with an included RF remote. Users can select phono, Bluetooth, optical digital, and USB input/output, while also adjusting bass, treble, turntable speed, display brightness, and listening modes through the front panel rotary control or remote.

Advertisement

Class A Headphone Amplifier: The One MK2 includes a dedicated Class A headphone amplifier with a discrete output stage for private listening. Andover specifies compatibility with headphones from 16 ohms to 10k ohms, although real world performance with demanding headphones will depend on output power, gain, and voltage delivery. For most conventional dynamic and planar headphones, the built in amplifier should provide a useful private listening option without requiring a separate headphone amp.

andover-one-mk2-angle-remote

Listening Modes

Stereo/Mono Mode: The One MK2 allows listeners to switch between stereo and mono playback. Stereo is the standard choice for most modern records and sources, while mono can be useful for older mono records or recordings that sound more focused when summed properly.

Panoramic Mode: Panoramic mode is designed to widen the perceived stereo image from the single chassis system, helping the One MK2 create a larger soundstage than its physical footprint might suggest.

EQ Settings: The One MK2 includes adjustable EQ settings through the menu system, allowing users to tailor the sound for the room, source material, or personal preference.

Advertisement

Comparison Highlights

Andover Audio Model Andover-One MK2 (2026) Andover-One E (2022) Andover-One (2020)
Price $2,699 $1,499 $2,499
Platter Aluminum Steel  Acrylic
Tonearm Carbon Fiber Aluminum Carbon Fiber
Counterweight Pre Calibrated Semi-Fixed Adjustable
Anti-Skating Yes – Pre Calibrated No  Yes
Cartridge Audio-Technica VM95E Ortofon OM-5e Ortofon 2M Silver
Woofers 2 x  3.5″ ultralinear aluminum diaphragm woofers on the sides 2 (one on each side) 4 (2 on each side)
Tweeters 2 x AMT (Air Motion Transformer) tweeters on the front Dome AMT (Air Motion Transformer)
Power Output 200W total (2 x 70W to woofers + 2 x 30W to tweeters) 170 Watts 210 Watts
Frequency Response 55Hz – 30kHz +/- 3dB 50Hz to 20kHz 50Hz to 20kHz
Aluminum Trim No No Yes
Finish Walnut  Walnut  Walnut
Dimensions (WHD – with Dust Cover) 18 x 8.5 x 13.5-inches 18 x 8.83 x 13.5-inches 18 x 8.83 x 13.5-inches
andover-one-mk2-angle

The Bottom Line

The Andover Audio One MK2 is not trying to replace a serious separates based system, but it does make a strong case for listeners who want real vinyl playback, fewer boxes, and a cleaner living room. The combination of a custom turntable, factory preset calibration, end of record auto stop, IsoGroove vibration control, Bluetooth, USB playback and recording, optical input, subwoofer outputs, and multi room expansion gives it more flexibility than most all-in-one turntable systems. The Audio-Technica VM95E cartridge, adjustable VTA, and removable headshell also give owners a practical upgrade path instead of locking them into a dead end design.

What is missing? Wi-Fi streaming support needs to be clearly defined, and serious headphone users will want more information from Andover about the Class A headphone amplifier’s output power, gain, and real world performance with demanding headphones.

The One MK2 is best for vinyl listeners, apartment dwellers, design conscious buyers, and even some audiophiles who want a compact system that does not require a rack, external amplifier, separate speakers, and a cable map worthy of NASA.

andover-one-mk2-premier-system
Andover-One MK2 Premier System adds Record Storage Upper Stand and Andover-One Subwoofer.

Price & Availability

The Andover-One MK2 will be available June 1, 2026, and pre-orders are open now:

Advertisement. Scroll to continue reading.
Advertisement

Source link

Continue Reading

Tech

Gates Foundation ends an era, selling off all remaining Microsoft stock

Published

on

The Gates Foundation marked its 25th anniversary in May 2025 with a panel, from left: Emma Tucker, Wall Street Journal’s editor-in-chief; Mark Suzman, CEO of the Gates Foundation; and Bill Gates. (GeekWire screenshot from live stream)

The Gates Foundation trust no longer owns any shares of Microsoft, the company that made Bill Gates one of the world’s richest people and ultimately led him to launch the Seattle-based global health organization 26 years ago.

The sale was disclosed in a Securities and Exchange Commission filing on Friday, with 7.7 million shares sold for approximately $3.2 billion, as first reported by The Times of India.

The move doesn’t reflect any souring on the Redmond, Wash., tech giant but is the continuation of a Microsoft selloff that began in the last quarter of 2023. The assets that fund the foundation are independently managed by a separate entity, the Gates Foundation Trust.

The foundation’s trust was once heavily concentrated in Microsoft stock — at its 2022 peak, those shares represented 27% of its holdings, per International Business Times.

One year ago, the foundation announced that it would sunset in 2045, with Gates pledging to give away $200 billion — nearly all of his wealth — over the next two decades through the organization.

Advertisement

Cascade Asset Management Company, which manages the foundation’s trust, did not respond to a request for comment.

On the same day as the foundation’s selloff, hedge fund manager Bill Ackman and his firm Pershing Square Capital Management snapped up approximately 5.65 million shares of Microsoft worth about $2.09 billion. The purchase was funded by the sale of Pershing Square’s Alphabet holdings.

“Microsoft operates two of the most valuable franchises in enterprise technology, which account for approximately 70% of the company’s overall profits: M365 and Azure,” Ackman said on X.

Wall Street was less enthusiastic following Microsoft’s quarterly returns in April, sending the company’s stocks down 5% after the disclosure that its capital expenditures would hit roughly $190 billion this year.

Advertisement

The Gates Foundation is the world’s largest philanthropy and has disbursed more than $110 billion since its founding, supporting global vaccinations, educational programs, women’s health and other initiatives. The organization has been ramping up its grantmaking, issuing $8.5 billion last year, and committing to distributing $9 billion this year.

“There are too many urgent problems to solve for me to hold onto resources that could be used to help people. That is why I have decided to give my money back to society much faster than I had originally planned,” Gates wrote in announcing his philanthropic plans last May.

By the end of last year, the foundation’s endowment was worth $89 billion.

Source link

Advertisement
Continue Reading

Trending

Copyright © 2025