Toggle light / dark theme

‘About this image’ is designed to show where on the web an image appeared in the past and how it was described to help you find the truth about its origins.

Google is starting to roll out its new “About this image” tool, which aims to provide essential background information and context about images in Google Search. The feature was first announced at Google’s I/O developer conference in May, and now it’s rolling out to English users globally. You can access the feature from the three-dot menu that appears in Search and Google Images results. The search giant is also announcing updates to its Fact Check Explorer initiative and AI-powered Search Generative Experience.

The “About this image”… More.


More context, if you bother to look.

The week of Oct. 23 through Oct 30 is a big one for low-Earth orbit (LEO) with all but one flight headed to already existing constellations. This includes two Falcon 9 launches on opposite sides of the country, one Russian Soyuz 2.1b launch, and two different launches planned out of China, one involving humans.

Two Chinese launches start the week, with the first being a Chang Zheng 2D preparing for its flight from LC-3 at Xichang Satellite Launch Center. Then, a Chang Zheng 2F/G will launch out of LC-90 at the China Jiuquan Satellite Launch Center, before a Soyuz 2.1b launches out of Plesetsk Cosmodrome. Then the first Falcon 9 launches more Starlink satellites on the other side of the world out of SLC-4E at Vandenberg Spaceforce Base (VSFB). Then, on the other side of America, Falcon 9 Starlink launches out of SLC-40 at Cape Canaveral Space Force Station (CCSFS).

Chang Zheng 2D – Yaogan 39 Group 04

Scientists manipulated light to behave as if influenced by gravity using distorted photonic crystals, opening avenues for optics advancements and 6G communication.

Manipulating Light’s Behavior With Pseudogravity

A collaborative group of researchers has manipulated the behavior of light as if it were under the influence of gravity. The findings, which were published in the journal Physical Review A on September 28, 2023, have far-reaching implications for the world of optics and materials science, and bear significance for the development of 6G communications.

Quantum teleportation enables the transfer of quantum information to distant locations through the use of quantum entanglement and classical communication. This concept has been realized in various quantum light systems, ranging from laboratory-based experiments to practical real-world tests. Notably, by utilizing the low-Earth orbit Micius satellite, scientists have successfully teleported quantum information over distances exceeding 1,200 km. However, there hasn’t been a quantum teleportation system yet whose rate can reach the order of Hertz. This hinders future applications of the quantum internet.

In a paper published in Light Science & Application, a team of scientists, led by Prof. Guangcan Guo and Prof. Qiang Zhou from the University of Electronic Science and Technology of China (UESTC) cooperating with Prof. Lixing You from the Shanghai Institute of Microsystem and Information Technology of the Chinese Academy of Sciences, have improved the teleportation rate to 7.1 qubits per second for the first time based on the “No. 1 Metropolitan Quantum Internet of UESTC”.

This presents a new record for the quantum teleportation system over metropolitan range.

Two types of technologies could change the privacy afforded in encrypted messages, and changes to this space could impact all of us.

On October 9, I moderated a panel on encryption, privacy policy, and human rights at the United Nations’s annual Internet Governance Forum. I shared the stage with some fabulous panelists including Roger Dingledine, the director of the Tor Project; Sharon Polsky, the president of the Privacy and Access Council of Canada; and Rand Hammoud, a campaigner at Access Now, a human rights advocacy organization. All strongly believe in and champion the protection of encryption.

I want to tell you about one thing that came up in our conversation: efforts to, in some way, monitor encrypted messages.

Policy proposals have been popping up around the world (like in Australia, India, and, most recently, the UK) that call for tech companies to build in ways to gain information about encrypted messages, including through back-door access. There have also been efforts to increase moderation and safety on encrypted messaging apps, like Signal and Telegram, to try to prevent the spread of abusive content, like child sexual abuse material, criminal networking, and drug trafficking.

Not surprisingly, advocates for encryption are generally opposed to these sorts of proposals as they weaken the level of user privacy that’s currently guaranteed by end-to-end encryption.

In my prep work before the panel, and then in our conversation, I learned about some new cryptographic technologies that might allow for some content moderation, as well as increased enforcement of platform policies and laws, all *without* breaking encryption. These are sort-of fringe technologies right now, mainly still in the research phase. Though they are being developed in several different flavors, most of these technologies ostensibly enable algorithms to evaluate messages or patterns in their metadata to flag problematic material without having to break encryption or reveal the content of the messages.

🕵️‍♂️ Nation-state hackers are turning to Discord. Discover how they’re using this social platform for potential cyber-espionage and target critical infrastructure.

Read:


In what’s the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show that nation-state hacking groups have entered the fray in leveraging the social platform for targeting critical infrastructure.

Discord, in recent years, has become a lucrative target, acting as a fertile ground for hosting malware using its content delivery network (CDN) as well as allowing information stealers to siphon sensitive data off the app and facilitating data exfiltration by means of webhooks.

A SpaceX Falcon 9 rocket will launch 22 Starlink internet satellites to orbit this evening (Oct. 17), if all goes according to plan.

The Falcon 9 is scheduled to lift off from Florida’s Cape Canaveral Space Force Station today at 5:20 p.m. EDT (2120 GMT). If SpaceX doesn’t hit that target, there are five backup opportunities available between 6:11 p.m. EDT and 8:48 p.m. EDT (2211 to 48 GMT), company representatives wrote in a mission description.

This Jenner-active AI is frighteningly good.

Our sci-fi-inspired fears of artificial intelligence replicating us may not be unfounded: Meta set off alarm bells after introducing an AI chatbot named Billie that resembled Kendall Jenner so closely, they thought it was the model herself, the NY Post reports.

A video introducing the creepy Kardashian doppelganger is currently eliciting screams across the web.

“The CIA and other US intelligence agencies will soon have an AI chatbot similar to ChatGPT. The program, revealed on Tuesday by Bloomberg, will train on publicly available data and provide sources alongside its answers so agents can confirm their validity. The aim is for US spies to more easily sift through ever-growing troves of information, although the exact nature of what constitutes “public data” could spark some thorny privacy issues.

“We’ve gone from newspapers and radio, to newspapers and television, to newspapers and cable television, to basic internet, to big data, and it just keeps going,” Randy Nixon, the CIA’s director of Open Source Enterprise, said in an interview with Bloomberg. “We have to find the needles in the needle field.” Nixon’s division plans to distribute the AI tool to US intelligence agencies “soon.””.


The CIA confirmed that it’s developing an AI chatbot for all 18 US intelligence agencies to quickly parse troves of ‘publicly available’ data.

The researchers tested their algorithm on a replica of a US Army combat ground vehicle and found it was 99% effective in preventing a malicious attack.

Australian researchers have developed an artificial intelligence algorithm to detect and stop a cyberattack on a military robot in seconds.


The research was conducted by Professor Anthony Finn from the University of South Australia (UniSA) and Dr Fendy Santoso from Charles Sturt University in collaboration with the US Army Futures Command. They simulated a MitM attack on a GVT-BOT ground vehicle and trained its operating system to respond to it, according to the press release.

According to Professor Finn, an autonomous systems researcher at UniSA, the robot operating system (ROS) is prone to cyberattacks because it is highly networked. He explained that Industry 4, characterized by advancements in robotics, automation, and the Internet of Things, requires robots to work together, where sensors, actuators, and controllers communicate and share information via cloud services. He added that this makes them very vulnerable to cyberattacks. He also said that computing power is increasing exponentially every few years, enabling them to develop and implement sophisticated AI algorithms to protect systems from digital threats.