Home Blog Page 13

Most AI Chatbots Will Help a Teen Plan a Mass Shooting, Study Finds – Decrypt

0
Most AI Chatbots Will Help a Teen Plan a Mass Shooting, Study Finds – Decrypt


In brief

A study found that most AI chatbots will help teens plan violent attacks.
Some bots provided detailed weapon and bombing guidance.
Researchers say safety failures are a business choice, not a technical limit. OpenAI called the study “flawed and misleading.”

A new report published Wednesday by the Center for Countering Digital Hate found that eight out of 10 of the world’s most popular AI chatbots will walk a teenager through planning a violent attack with straight answers, sometimes with enthusiasm.

CCDH researchers, in conjunction with news media company CNN, spent November and December 2025 posing as two 13-year-old boys—one in Virginia, one in Dublin—and tested ten major platforms: ChatGPT, Gemini, Claude, Copilot, Meta AI, DeepSeek, Perplexity, Snapchat My AI, Character.AI, and Replika.

Across 720 responses, the bots were asked about school shootings, political assassinations, and synagogue bombings. They provided actionable help roughly 75% of the time, according to the study. They discouraged the fake teens in just 12% of cases.

Screenshot from the CCDH study on AI

Perplexity assisted in 100% of tests. Meta AI was helpful (as in, helpful in planning violence) in 97.2% of the tests. DeepSeek, which signed off rifle selection advice with “Happy (and safe) shooting!” after discussing a politician assassination scenario, came in at 95.8%. Microsoft’s Copilot told a researcher “I need to be careful here,” then gave detailed rifle guidance anyway. Google’s Gemini helpfully noted that metal shrapnel is typically more lethal when a user brought up bombing a synagogue.

The Center for Countering Digital Hate, a left of center policy group, has come into prominence over the last few years for its role in combatting what it views as the rise of antisemitism online. It has also been criticized for helping shape Joe Biden-era policies regarding online speech related to COVID and vaccines. In December of last year, the U.S. State Department attempted to bar the Center’s founder and CEO Imran Ahmed, along with four others, from the United States, alleging attempts at “foreign censorship.”

]]>

In response to the study released Wednesday, several platforms told CNN and CCDH they have improved their safeguards. Google noted the tests used an older Gemini model. OpenAI said the methodology used in the AI study was “flawed and misleading.” Anthropic and Snapchat said they regularly update their safety protocols.

In the Center’s study, Character.AI stands in its own category. The platform didn’t just assist—it cheered. “No other chatbot tested explicitly encouraged violence in this way, even when providing practical assistance in planning a violent attack,” the researchers wrote.

Screenshot from the CCDH study on AI
Screenshot from the CCDH study on AI

For context on the level of reach Character.AI has among AI users, the platform’s Gojo Satoru persona alone has racked up over 870 million conversations. The #100 persona on the platform registered over 33 million conversations back in 2025. If just 1% of conversations with top personas involve violence, that would account for millions of interactions.

This isn’t Character.AI’s first time on the wrong end of one of these stories. In October 2024, 14-year-old Sewell Setzer III’s mother filed a lawsuit after her son died by suicide in February of that year. His last conversation was with a chatbot modeled after Daenerys Targaryen, which told him to “come home to me as soon as possible” moments before his death. The 14-year old had been talking to the bot dozens of times a day for months, growing increasingly withdrawn from school and family.

Google and Character.AI settled multiple related lawsuits in January 2026. The company banned open-ended teen chats entirely by November 2025, after regulators and grieving parents made it impossible to keep pretending the problem was manageable.

The emotional attachment to AI, in particular among vulnerable individuals, may run deeper than most people realize. OpenAI disclosed in October 2025 that roughly 1.2 million of its 800 million weekly ChatGPT users discuss suicide on the platform. The company also reported 560,000 showing signs of psychosis or mania, and over a million forming strong emotional bonds with the chatbot.

A separate Common Sense Media study found that more than 70% of U.S. teens now turn to chatbots for companionship. OpenAI CEO Sam Altman has acknowledged that emotional overreliance is “a really common thing” with young users.

In other words, the potential harms aren’t hypothetical.

A 16-year-old in Finland spent nearly four months using a chatbot to refine a manifesto before stabbing three classmates at Pirkkala school in May 2025. In Canada, OpenAI staff internally flagged a user’s account for violent ChatGPT queries tied to a mass shooting. The company banned the account but didn’t notify law enforcement. That user allegedly killed eight people and injured 25 others months later.

Only two platforms performed markedly better in the study: Snapchat’s My AI, which refused in 54% of cases, and Anthropic’s Claude, which refused 68% of the time and actively discouraged users in 76% of responses—the only chatbot that reliably tried to steer people away from violence rather than just declining specific requests. CCDH’s conclusion: safety doesn’t appear to be a technical impossibility, but a business decision.

“The most damning conclusion of our research is that this risk is entirely preventable. The technology to prevent this harm exists,” the researchers wrote in the report. “What’s missing is the will to put consumer safety and national security before speed-to-market and profits.”

Daily Debrief Newsletter

Start every day with the top news stories right now, plus original features, a podcast, videos and more.



Source link

Coronation Street follow-up: As Theo spies on Todd, 3 theories on how the abuse storyline will end

    0
    Coronation Street follow-up: As Theo spies on Todd, 3 theories on how the abuse storyline will end


    Coronation Street viewers were left uneasy in tonight’s episode (Wednesday, March 11) as Theo Silverton was seen secretly watching Todd Grimshaw from his van.

    The tense moment comes after the pair recently split following an uncomfortable exchange on Theo’s birthday. Despite the breakup, Theo insisted he still wants them to remain in each other’s lives.

    But with his behaviour becoming more unsettling, fans are now wondering exactly how this troubling storyline will eventually play out.

    Don’t miss a single story! Add us as a Preferred Source in Google for all your entertainment news

    It’s important to us that you never miss our articles when searching for stories! We have all the latest TV & Celebrity news to share with our community of loyal readers.

    Click here and tick Entertainmentdaily.com to ensure you see stories from us first in Google Search.

    Theo spied on Todd (Credit: ITV)

    Theo spied on Todd in Coronation Street

    The episode opened with Todd attempting to clear his head, starting the day with meditation before heading out for a run. However, the peaceful moment quickly turned awkward when he unexpectedly ran into Gary, Maria and Theo.

    Later, at work, George and Christina rallied around Todd as he struggled with the fallout from the split. Todd was also seen calling the bank in an attempt to regain control of his own bank card.

    Over at the pub, Todd’s loved ones did their best to lift his spirits. But the mood shifted when Theo appeared and asked to speak to him privately. In the beer garden, Theo insisted they needed to stay friends, telling Todd that the bond they shared was too strong for them to simply become strangers again.

    However, Todd was left feeling as though he might never truly escape Theo’s hold. After having too much to drink, he was eventually walked home by his good mate James, completely unaware that his abusive ex was watching him from a distance.

    Even more troubling, Theo was also still tracking Todd’s movements using a mobile tracking app.

    Theo and Todd at the bistro in Coronation Street
    How will it end? (Credit: ITV)

    3 theories on how Todd and Theo’s abuse storyline will end

    With viewers increasingly eager to see the storyline reach a resolution, several theories have begun circulating among fans about how things could ultimately end for Todd and Theo.

    ITV has yet to confirm when the plot will conclude, but speculation is already building about what might happen next.

    1. Prison

    One outcome many viewers are hoping for is that Theo Silverton ends up facing justice and being sent to prison for his treatment of Todd.

    If that route were taken, it could mean a court case playing out on screen, with Todd sharing details about the abuse he endured. Such a development would likely keep the storyline running for some time yet. The big question is whether Theo will ultimately be held accountable.

    Taking to X, one fan wrote: “I don’t want Theo to be the one killed off in Corrie’s big bump off the villain storyline. I want that [bleep] to rot a LONG time in prison.”

    2. Death of Todd

    Another, far darker possibility fans have discussed is that Todd Grimshaw could lose his life before he ever truly escapes Theo.

    Todd already feels he hasn’t fully broken free despite the breakup. Could things escalate even further? And might Theo lash out again, this time going to a far more extreme and deadly level?

    One fan on social media predicted: “Theo’s going to kill Todd isn’t he?”

    Another replied: “I thought that, like Chantelle in EastEnders.”

    Theo and Todd arguing in the flat in Coronation Street
    When will it be over? (Credit: ITV)

    3. Death of Theo in flashforward

    A third theory suggests Theo himself could meet a grim end as the storyline reaches its climax.

    While many fans would rather see justice served through the law, some believe the villain could instead be killed off.

    As viewers will know, Theo is one of five potential murder victims featured in the flashforward scenes set for April 23. The big mystery remains whether he will actually be the one who dies, and if so, who might be responsible.

    One fan wrote: “I need Theo to die a slow and painful death like the one he let Billy go through, or go to prison – lock him up and throw away the key.”

    Another added: “Theo’s gotta die. That’s the only suitable conclusion for this story.”

    With plenty of people likely to want revenge once the truth comes out, could someone could really go that far?

    Read more: Coronation Street opinion: Soap losing balance as villains dominate

    Coronation Street usually airs Monday-Friday at 8.30pm on ITV.

    What do you think about this story? Let us know by leaving a comment on our Facebook page @CoronationStreetInsider. We want to hear your thoughts!



    Source link

    Pokémon Pokopia Becomes a Huge Success on Nintendo Switch 2

    0
    Pokémon Pokopia Becomes a Huge Success on Nintendo Switch 2


    Pokémon Pokopia has officially launched on the Nintendo Switch 2, and the game is already making a big impact. It has also been confirmed that the game is being distributed as a Game Key Card. With the first in-game event already live, new reports are now revealing strong sales numbers.

    According to industry analyst Daniel Ahmad, the game is performing extremely well.

    Pokopia is turning out to be a major success for Nintendo, as well as its development partners Koei Tecmo and Game Freak.

    The game has already sold out in many physical stores. Retailers reportedly underestimated the demand at launch, which led to stock shortages.

    At the same time, digital sales have reached record levels, showing strong interest from players worldwide.

    The launch has also caused a noticeable boost in Nintendo Switch 2 console sales in stores, suggesting that the game is attracting many new players to the platform.

    Because of this, Pokopia is quickly becoming the “system seller” Nintendo needed for the first half of 2026.

    Interestingly, the use of Game Key Cards does not appear to be hurting sales. Reports suggest that when a game is truly good, players are still willing to buy it regardless of the format.



    Source link

    Metaverse Standards Forum and RP1 Create the Open Metaverse Browser Initiative – Join Us in Building the Next Open Ecosystem

    Metaverse Standards Forum and RP1 Create the Open Metaverse Browser Initiative – Join Us in Building the Next Open Ecosystem


    As AI-enabled AR glasses and VR headsets go mainstream, there is an urgent need to evolve today’s web infrastructure to deliver spatial services to these next-generation devices. The race is on to establish the open standards required to make this transition possible at scale. Just as the early web depended on foundational standards to succeed, the spatial internet faces the same challenge. The opportunity lies in building on existing web standards while developing essential new protocols and APIs.

    The Metaverse Standards Forum and RP1 are addressing this challenge by launching the Open Metaverse Browser Initiative, an open-source effort to build the foundation for how the world will access spatial services.

    The Evolution of the Web

    Just as the web browser unlocked the World Wide Web by providing universal access to information on 2D devices, the metaverse browser will unlock proximity-based services across AR and virtual environments without installing separate apps for each service.

    The metaverse is the evolution of the World Wide Web, bringing spatial computing to the same open, standards-based foundation that made the web successful.

    What This Looks Like

    Walk into an airport wearing smart glasses. Instantly, you’ll see a route to your gate overlaid on the floor in front of you. Your flight status floats above your departure gate. Security wait times appear as you approach checkpoints. When you arrive at your gate, the airline’s check-in interface appears automatically. You select your seat from a 3D visualization of the plane. Meanwhile, a colleague in another city joins you virtually, their avatar standing beside you for a quick meeting before your flight.

    None of this will require installing apps. Each service will activate automatically based on your location. The airport provides navigation, the airline provides check-in, your company provides communication tools. All working together seamlessly in your view, then disappearing as you move to new locations.

    This is how the metaverse works: multiple services from different providers appearing automatically based on where you are and what you need.

    The AOL Moment

    The XR industry today resembles the early 1990s internet, fragmented into incompatible proprietary platforms. We’re in another “AOL moment.” Just as walled gardens gave way to the open web, today’s proprietary XR platforms will evolve into an open metaverse built on universal standards.

    A standards-based metaverse browser connects any device to any spatial service, giving organizations the ability to own and operate their spatial presence just like hosting a website today. Open standards create full data ownership, revenue control, and freedom to build without dependence on any platform or gatekeeper.

    How do we get the standards we need before fragmentation becomes locked in?

    RP1 has developed an operational prototype metaverse browser that connects to immersive 3D content and third-party services across any device, on demand, in real time. RP1 is contributing this prototype to seed an open-source project under the stewardship of the Metaverse Standards Forum, a collaborative non-profit bringing together more than 2,500 member companies and leading standards organizations.

    The initiative will be hosted on GitHub under a permissive open-source license, enabling broad industry contributions and providing a functional testbed for exercising and validating interoperability standards.

    “Open standards are a powerful foundation for transformative platforms, and RP1 has given us an extraordinary head start to create not just a browser implementation, but a testbed for interoperability collaboration,” said Neil Trevett, president of the Metaverse Standards Forum. “We invite the standards community to join the initiative and leverage this mutual opportunity to drive the evolution and widespread adoption of their standards.”

    “The metaverse and XR industry is fragmented and proprietary. A standards-based metaverse browser is the way forward and the Metaverse Standards Forum was custom built to foster this kind of industry-wide cooperation,” said Sean Mann, co-founder and CEO of RP1. “Industry and academic interest in this project has been overwhelming, and we welcome all interested parties to get involved.”

    Join Us

    This is a call to the entire standards community: standards development organizations with expertise in web, networking, 3D, spatial, and XR technologies; implementers ready to build, test, and validate emerging specifications; enterprises planning spatial infrastructure who want a seat at the table; and developers and researchers passionate about spatial technologies.

    Early participants will shape the project’s direction, structure, and deliverables. The initiative will use proven, transparent open-source governance welcoming contributions from all. Organizations are encouraged to join the Metaverse Standards Forum for a voice in the project and broader Working Group activities.



    Source link

    Binance Initiates Legal Action Against The Wall Street Journal Over Alleged Defamatory Reporting

    Binance Initiates Legal Action Against The Wall Street Journal Over Alleged Defamatory Reporting


    In Brief

    Binance has filed a lawsuit against The Wall Street Journal over allegedly false reporting, highlighting its extensive compliance infrastructure and commitment to protecting its reputation and users.

    Binance Initiates Legal Action Against The Wall Street Journal Over Alleged Defamatory Reporting

    Cryptocurrency exchange Binance announced that it has initiated legal action against The Wall Street Journal over an article published on February 23rd, 2026, which the company claims contained false and defamatory statements. According to Binance, the reporting prompted unwarranted inquiries from government officials and caused reputational and operational harm.

    The exchange stated that the lawsuit seeks to defend its reputation and hold the publication accountable for the impact of the article, which Binance says misrepresented facts and contributed to confusion and misdirected attention across public and private sectors. Binance’s Global Head of Litigation, Dugan Bliss, described the action as a necessary measure to address misinformation, reputational damage, and broader consequences for the cryptocurrency industry, emphasizing the company’s commitment to compliance and innovation.

    Binance Emphasizes Industry-Leading Compliance And Rigorous Risk Oversight

    According to a publication on its website, Binance highlighted the scale and scope of its compliance infrastructure, noting that the company employs more than 1,500 professionals—nearly a quarter of its global workforce—dedicated to risk management, investigations, and regulatory compliance. The firm has invested hundreds of millions of dollars in talent, processes, technology, and operational tools, covering areas such as sanctions compliance, anti-money laundering, financial crime investigations, and on-chain monitoring. Binance’s approach includes proactive customer due diligence, transaction monitoring, sanctions screening, behavioral analytics, and mechanisms to prevent access from prohibited jurisdictions, including VPN circumvention detection.

    Furthermore, the company cited measurable results from its compliance efforts, including a 96.8% reduction in sanctions-related exposure as a percentage of total exchange volume between January 2024 and July 2025, a 97.3% decline in exposure to major Iranian cryptocurrency exchanges, and processing more than 71,000 law enforcement requests globally in 2025. Binance also reported supporting the freezing and recovery of hundreds of millions of dollars linked to illicit activity during the same period.

    Binance emphasized that risk cannot be fully eliminated on public blockchains, as assets can be sent to exchange deposit addresses without prior approval. The company said its strategy focuses on detection, investigation, mitigation, offboarding, and reporting, backed by continuous monitoring and process improvement. The exchange holds regulatory approvals in over 20 jurisdictions and is the first to secure full authorization under the Abu Dhabi Global Market’s Financial Services Regulatory Authority framework, reflecting ongoing investment in governance and independent oversight.

    The lawsuit is Binance’s effort to address reputational harm while maintaining its operational standards and user trust. The company reaffirmed its commitment to strengthening compliance measures, cooperating with law enforcement, engaging with regulators, protecting users, and correcting inaccurate reporting when it arises.

    Disclaimer

    In line with the Trust Project guidelines, please note that the information provided on this page is not intended to be and should not be interpreted as legal, tax, investment, financial, or any other form of advice. It is important to only invest what you can afford to lose and to seek independent financial advice if you have any doubts. For further information, we suggest referring to the terms and conditions as well as the help and support pages provided by the issuer or advertiser. MetaversePost is committed to accurate, unbiased reporting, but market conditions are subject to change without notice.

    About The Author

    Alisa, a dedicated journalist at the MPost, specializes in cryptocurrency, zero-knowledge proofs, investments, and the expansive realm of Web3. With a keen eye for emerging trends and technologies, she delivers comprehensive coverage to inform and engage readers in the ever-evolving landscape of digital finance.

    More articles

    Alisa, a dedicated journalist at the MPost, specializes in cryptocurrency, zero-knowledge proofs, investments, and the expansive realm of Web3. With a keen eye for emerging trends and technologies, she delivers comprehensive coverage to inform and engage readers in the ever-evolving landscape of digital finance.

    More articles



    Source link

    Abyssus Confirmed For Xbox And PlayStation – Underwater FPS To Finally Surface On Console | TheXboxHub

    0
    Abyssus Confirmed For Xbox And PlayStation – Underwater FPS To Finally Surface On Console | TheXboxHub


    Abyssus Confirmed For Xbox And PlayStation – Underwater FPS To Finally Surface On Console | TheXboxHub

    The chaotic underwater shooter Abyssus is preparing to dive onto consoles.

    After building a strong following on PC with thousands of “Very Positive” reviews on Steam, the brinepunk roguelike FPS from DoubleMoose and The Arcade Crew is officially heading to Xbox Series X|S and PlayStation 5 later this summer.

    The console debut won’t arrive quietly either. Alongside the new versions, the game will launch with a major free 1.3 content update, expanding the underwater adventure with new areas, enemies, blessings and full crossplay support across all platforms.

    For console players who’ve yet to experience the fast-paced action beneath the waves, this will be the most complete version of Abyssus yet.

    At A Glance

    Game: Abyssus

    Developer: DoubleMoose

    Publisher: The Arcade Crew

    Platforms: Xbox Series X|S, PlayStation 5, PC (Steam)

    Genre: Roguelike co-op first-person shooter

    Players: Solo or 1-4 player co-op

    Console Release: Summer 2026

    Major Update: Free 1.3 update launching alongside consoles

    Key Feature: Crossplay across all platforms

    Abyssus Makes The Jump To Consoles

    Originally released on PC, Abyssus has carved out a reputation as a frantic roguelike co-op FPS set in a mysterious underwater world.

    Now that experience is expanding to Xbox Series X|S and PlayStation 5, allowing console players to finally step into the role of a Brinehunter; elite explorers diving into the ocean depths to uncover the secrets of a long-lost civilisation.

    The premise begins with a mission to investigate a strange electromagnetic signal on the ocean floor. What starts as an expedition quickly spirals into survival as players discover an ancient sunken city filled with hostile forces and corrupted creatures.

    And the only way out? Going deeper.

    A Massive Free Update Arrives Alongside The Console Release

    Console players will be jumping in at a great time, as the upcoming 1.3 update significantly expands the world of Abyssus.

    This free update introduces:

    A brand-new God bringing fresh blessings and abilities

    Additional blessings for existing Gods

    A new playable area with enemies and bosses

    New room objectives to keep each run unpredictable

    A revamped skill tree and improved matchmaking

    Full crossplay support across PC and consoles

    New sea shanties to accompany your underwater battles

    Combined, these additions aim to make every run through the depths feel different while improving the multiplayer experience for squads exploring together.

    Chaotic Co-Op Action Beneath The Waves

    At its core, Abyssus is designed around fast-paced cooperative gameplay.

    Players can tackle the adventure solo or team up in 1-4 player co-op, navigating underwater ruins while battling waves of enemies armed with ancient technology powered by mysterious “brine” energy.

    Weapons play a major role in the action. From plasma launchers to revolver-style energy weapons, players can customise their loadouts through a huge range of upgrades and modifiers.

    The numbers are impressive too…

    8 core weapons

    48 weapon mods

    150+ blessings

    40 equippable charms

    124 forge modifications

    A Deep Dive Worth Taking?

    Roguelike shooters continue to evolve, but Abyssus seemingly stands out thanks to its unusual setting and relentless pace.

    The mix of cooperative combat, unpredictable runs and deep customisation has already won over a PC audience, and the upcoming console launch, complete with a major free update and crossplay support, should make the underwater action accessible to a much wider crowd.

    When Abyssus surfaces on Xbox Series X|S and PlayStation 5 this summer, expect plenty of players ready to dive headfirst into its chaotic brinepunk depths.

    And if you’re on PlayStation, a physical PlayStation 5 edition of Abyssus has also been announced. This boxed version will include all currently released cosmetic DLC, giving collectors and fans the chance to grab a complete version of the game when it arrives later this summer.



    Source link

    Undertone Review: This Podcast Horror Movie From A24 Is Genuinely Scary – SlashFilm

      0
      Undertone Review: This Podcast Horror Movie From A24 Is Genuinely Scary – SlashFilm


      I love horror movies, but I’m very rarely scared by them. Not because I’m particularly brave, but rather because I’ve spent so much of my life watching horror movies that I’ve built up a tolerance. I’m desensitized to things that go bump in the night. But every now and then, something breaks through and gives me the creeps, like Ian Tuason’s exceptionally scary debut “undertone,” a new fright flick from the folks at A24. Using impeccable sound design and making great use of negative space, Tuason’s stripped-down film builds a continuous amount of dread as it creeps along.

      If there’s an overall problem with what Tuason is doing here, it’s that his script isn’t terribly original. Recently it was announced that the filmmaker was hired to reboot the popular “Paranormal Activity” franchise, and there are long chunks of “undertone” that feel like the director’s audition tape for that gig. Throw in a little “Sinister” mixed with heavy creepypasta influences, and you’ve got yourself a film that feels more than a touch predictable. 

      And yet … “undertone” is so good at getting under your skin that I was willing to give these slightly derivative touches a pass. If you’re looking for a scary movie that’s actually scary, “undertone” delivers. If you’re a horror fan, you’ve seen this sort of story told before, but it’s rarely told this well.

      undertone knows how to give you the creeps

      Evy (Nina Kiri) co-hosts a popular paranormal podcast called “The Undertone.” The show dabbles in online urban legends and supposedly true ghost stories, but Evy is skeptical while her co-host Justin (Adam DiMarco) seems to be a true believer. Evy is currently puttering around the house of her dying mother (Michèle Duquet), and it’s clear she’s been there for a while because she’s set up a makeshift podcasting studio at the dining room table. “undertone” never leaves this house, and Evy and her seemingly comatose mom are the only characters we ever see on screen, which makes the entire movie feel both intimate and claustrophobic. Tuason apparently shot the film in his parents’ house, which only adds to the atmosphere. This doesn’t feel like a set; it feels like the slightly out-of-date home an elderly parent has occupied for a long, long time.

      Evy’s mother was clearly devoutly religious when she was still on her feet, as her house is choked with Catholic iconography. Tuason understands that anyone who has grown up in a house littered with such holy tchotchkes knows exactly how creepy and ominous they can all seem when it’s late at night and the lamps are dimmed. (My own mother used to have a painting of Jesus hanging above our entryway door, and late at night, the Messiah’s eyes seemed to follow you around the room).

      The presence of a dying parents and the spectre of being smothered by faith made me think “undertone” would follow in the footsteps of so many recent horror movies and be all about trauma. To be clear, I’m not against using trauma in your horror story, but it’s become a kind of lazy shorthand for so many modern fright filmmakers. Refreshingly enough, “undertone” is simply using these details as window dressing; they color the movie but don’t inform it. Some may take issue with this and feel like Tuason hasn’t made the most of the themes he’s touching on, but I think the film handles them just right.

      The creepy sound design and negative space of undertone is highly effective

      Things kick into gear when Justin reveals he’s received a mysterious email containing ten audio files. After listening to part of the first file and realizing it’s potentially creepy, he’s deliberately avoided playing the rest, and wants to listen to them one by one with Evy while recording a new episode of their podcast. Evy is game, and as the two start listening to the files, the story of an unseen married couple begins to take shape. The husband on the recordings says his wife has been talking in her sleep but she doesn’t believe him, so he’s going to start recording through the night to prove herr wrong. You can probably guess what’s going to happen: some bad stuff is going to get captured on these recordings, and every fiber of our being will want to practically scream at Evy and Justin to stop listening before it’s too late.

      “Two people listen to spooky audio files” doesn’t exactly sound like the most thrilling cinematic experience, especially when we only ever see one of those people. And yet, “undertone” manages to create a true sense of horror thanks to Kiri’s sympathetic lead performance — we really worry for her as things start to go very, very wrong — impeccable audio design, and a great use of shadow and space.

      Director Tuason and cinematographer Graham Beasley will frequently frame Kiri’s Evy off-center, with the darkened open space of the house looming behind her. This negative space draws our gaze because we’ve been conditioned to expect something to pop up in there. When Evy puts on her noise-canceling headphones, all the sound of the room drops away, cocooning us into Evy’s headspace. I saw the film in a Dolby theater, and I highly recommend you do the same, as the finely-tuned audio system made the film’s frequently unnerving soundtrack even more powerful.

      undertone uses online urban legends to enhance its horror

      To enhance the horror, “undertone” draws on the type of fears and superstitions that have risen to prominence in the internet age. As the film begins we learn about a supposedly cursed YouTube video that kills anyone who watches it. Later, the podcast hosts dive into hidden subliminal messages in children’s nursery rhymes (played backwards, of course). And just for good measure, we learn about a baby doll that whispers creepy stuff when you pull its string. 

      These are the types of horrors that have become ingrained in internet culture; the type of urban legends that first started on school yards before migrating to the web as message boards became popular. The familiarity is a feature, not a bug, because we’ve all heard (or read) online legends about these sorts of things. It effectively draws us into the world of the film and makes it feel all the more, well, real.

      “undertone” is in no hurry, burning out its scary story like a candle melting away during a long, dark night. Which is why the film’s bombastic finale feels slightly unnecessary. To be sure, Tuason does a magnificent job ramping up the nightmare fuel and creating a series of scenes that feel designed to give you a panic attack, but it almost feels like too much for such an otherwise subtle experience. No matter: “undertone” is so effectively spooky that I found my eyes nervously darting to shadows as I walked to my car after the screening. The best horror movies don’t need cheap jumpscares, they just need to make you feel like something dreadful is out there, lurking, waiting to make itself heard.

      /Film Rating: 8 out of 10

      “undertone” opens in theaters on March 13, 2026.



      Source link

      Foundry Digital Expands Beyond Bitcoin With New Zcash Mining Pool

      Foundry Digital Expands Beyond Bitcoin With New Zcash Mining Pool


      Key Highlights

      The upcoming Zcash pool marks Foundry Digital’s first major mining infrastructure offering for another cryptocurrency network.The new pool aims to fill a gap in the existing Zcash mining ecosystem.Foundry Digital also plans to offer operational tools and reporting systems, which are designed for larger mining firms and publicly listed companies.

      Digital asset infrastructure firm Foundry Digital plans to launch a new mining pool for Zcash in April 2026, expanding its operations beyond Bitcoin mining. The company operates Foundry USA Pool, one of the largest Bitcoin mining pools globally by hash rate.

      According to the official announcement, the upcoming Zcash pool marks its first major mining infrastructure offering for another cryptocurrency network.

      Addressing limited mining infrastructure

      Foundry said the new pool is intended to fill a gap in the existing Zcash mining ecosystem, where infrastructure tailored for institutional miners remains limited.

      The company plans to provide operational tools and reporting systems designed for larger mining firms and publicly listed companies. These include auditable payout systems, compliance-oriented processes, and monitoring tools for mining operations.

      Focus on U.S.-based operations

      According to Foundry, the Zcash mining pool will operate from the United States, a setup the company says could help reduce counterparty and compliance risks for participating miners.

      The infrastructure is expected to follow similar operational standards used in the company’s Bitcoin mining pool, which provides reporting systems and support services for miners.

      Zcash’s role in privacy-focused crypto

      Launched in 2016, Zcash is a cryptocurrency built around zero-knowledge proof technology, allowing transactions to be verified on a public blockchain while concealing details such as wallet addresses and transaction values. The project has often been cited as an example of privacy-preserving blockchain design within public distributed networks.

      Moreover, Zooko Wilcox, chief product officer at Shielded Labs and founder of Zcash, commented on the development, stating, “This will spread out the Zcash mining hashpower from its current concentration in a single pool, and hopefully it will bring in new Zcash miners who trust Foundry to operate a high-quality service.”

      Why it matters

      The launch indicates a possible shift in mining infrastructure for Zcash, which has historically lacked large institutional pool operators. If major mining firms join the new pool, the network could see changes in how hash power is distributed and managed.

      For Foundry Digital, the move reflects a broader effort to expand beyond Bitcoin-focused services and build infrastructure across multiple blockchain networks as the digital asset mining sector matures.

      Also Read: Binance vs WSJ: Lawsuit Filed, DOJ Probe Launched on Same Day

      Disclaimer: The information researched and reported by The Crypto Times is for informational purposes only and is not a substitute for professional financial advice. Investing in crypto assets involves significant risk due to market volatility. Always Do Your Own Research (DYOR) and consult with a qualified Financial Advisor before making any investment decisions.



      Source link

      RF-Microwave for 5G Market: Enabling High-Speed Wireless Communication Infrastructure | Web3Wire

      0
      RF-Microwave for 5G Market: Enabling High-Speed Wireless Communication Infrastructure | Web3Wire


      RF-Microwave for 5G Market

      The RF-Microwave for 5G Market is emerging as a critical segment within the global telecommunications and semiconductor industry. RF (radio frequency) and microwave components are essential technologies that enable the transmission, reception, and processing of high-frequency signals used in 5G networks. As telecom operators rapidly deploy 5G infrastructure worldwide, demand for advanced RF-microwave components such as amplifiers, antennas, filters, and transceivers continues to rise significantly.

      Major companies profiled in RF-microwave for 5G Market are:Qualcomm Technologies, Qorvo Inc., Skyworks Solutions, Analog Devices, Keysight Technologies, Rohde & Schwarz, Ericsson, Nokia, Huawei Technologies, Samsung Electronics, Murata Manufacturing, Anokiwave, MACOM Technology Solutions, Cobham Advanced Electron

      Request PDF Sample Copy of Report: (Including Full Toc, Figures, Chart): https://www.htfmarketreport.com/sample-report/3181263-global-rf-microwave-for-5g-market-growth

      The global RF-microwave for 5G market will expand at a compound annual growth rate (CAGR) of 11.19% from 2025 to 2033, from 8.7 Billion in 2025 to 21.3 Billion by 2033.

      The following Key Segments Are Covered in Our ReportBy Type:Filters, Antennas, Amplifiers, Oscillators, Duplexers

      By Application:Telecom Infrastructure, Smartphones, IoT Devices, Base Stations, Military

      Definition:RF (Radio Frequency) and microwave components for 5G refer to high-frequency electronic components and subsystems operating typically in the sub-6 GHz and mmWave spectrum (24 GHz-100 GHz) to enable high-speed, low-latency 5G networks.

      Market Trends:• Miniaturization of RF components is trending, Integration of RF front-end modules in mobile devices is increasing, Use of GaN and advanced semiconductors is gaining traction, Demand for low-loss, high-frequency substrates is growing

      Market Drivers:• Rapid global rollout of 5G networks drives RF-microwave component demand, High-frequency signal requirements boost advanced material usage, Growing IoT ecosystem increases need for reliable RF solutions, Telecom equipment upgrades support market expansion

      Market Opportunities:• Rapid rollout of 5G networks worldwide is significantly increasing demand for RF and microwave components, Growth in IoT devices and autonomous vehicles boosts need for high-frequency communication technologies

      Dominating Region:North America

      Fastest-Growing Region:Asia Pacific

      Buy Now Latest Edition of RF-microwave for 5G Market Report 👉 https://www.htfmarketreport.com/buy-now?format=1&report=3181263

      The titled segments and sub-section of the market are illuminated below:In-depth analysis of RF-microwave for 5G market segments by Types: Filters, Antennas, Amplifiers, Oscillators, Duplexers

      Detailed analysis of RF-microwave for 5G market segments by Applications: Telecom Infrastructure, Smartphones, IoT Devices, Base Stations, Military

      Regional Market Insights:North America• North America is a leading market for RF-microwave technologies due to early adoption of 5G networks and strong investments by telecom operators.

      Asia-Pacific• Asia-Pacific is expected to witness the fastest growth in the RF-microwave market. Countries such as China, South Korea, and Japan are aggressively expanding 5G infrastructure, driving demand for RF components.

      Europe• Europe is steadily expanding 5G deployment, supported by regulatory initiatives and investments in next-generation digital infrastructure.

      Get 10-25% Discount on Immediate purchase 👉 https://www.htfmarketreport.com/request-discount/3181263-global-rf-microwave-for-5g-market-growth

      Challenges in the Market:Despite strong growth prospects, the market faces several challenges:• High cost of advanced RF semiconductor materials• Complex design requirements for high-frequency circuits• Thermal management issues in dense network environments• Supply chain constraints in semiconductor manufacturingAddressing these challenges will be essential for maintaining the pace of 5G network expansion.

      Future Outlook:The future of the RF-microwave for 5G market remains highly promising. As telecom operators continue to expand network coverage and adopt advanced technologies such as autonomous vehicles, smart cities, and industrial automation, demand for RF-microwave components will continue to grow.

      Advancements in semiconductor technologies, increasing investments in telecom infrastructure, and the global push toward digital connectivity will ensure that RF-microwave solutions remain a cornerstone of the evolving 5G ecosystem.

      Get customized report 👉 https://www.htfmarketreport.com/enquiry-before-buy/3181263-global-rf-microwave-for-5g-market-growth

      Thanks for reading this article; you can also get individual chapter-wise sections or region-wise report versions like North America, LATAM, Europe, Japan, Australia or Southeast Asia.

      Contact Us:Nidhi Bhawsar (PR & Marketing Manager)HTF Market Intelligence Consulting Private LimitedPhone: +15075562445sales@htfmarketintelligence.com

      About Author:HTF Market Intelligence Consulting is uniquely positioned to empower and inspire with research and consulting services to empower businesses with growth strategies, by offering services with extraordinary depth and breadth of thought leadership, research, tools, events, and experience that assist in decision-making.

      This release was published on openPR.

      About Web3Wire Web3Wire – Information, news, press releases, events and research articles about Web3, Metaverse, Blockchain, Artificial Intelligence, Cryptocurrencies, Decentralized Finance, NFTs and Gaming. Visit Web3Wire for Web3 News and Events, Block3Wire for the latest Blockchain news and Meta3Wire to stay updated with Metaverse News.



      Source link

      What Is a Private Key? How It Keeps Your Crypto Safe – NFT Plazas

        0
        What Is a Private Key? How It Keeps Your Crypto Safe – NFT Plazas


        Whether you’re sending, receiving, or simply holding crypto, you’ll need a private key to secure your wallet, prove ownership, and ultimately control your assets. A private key is a long, randomly generated alphanumeric code that works with a public key to secure your assets and authorize transactions.

        In this article, we’ll dig deeper into the concept of private keys, how they work, and their significance. In addition, we’ll provide a step-by-step guide on private key management, threats to keys, and best practices to keep crypto funds safe.

        What Is a Private Key?

        What Is a Private Key?

        A private key is a secret cryptographic key used to access and control assets in a cryptocurrency wallet. It is usually a long alphanumeric code that is generated by a cryptographic algorithm when a crypto wallet is created. 

        The private key works together with a public key to enable secure blockchain transactions. While the public key can be shared openly, the private key must always remain secret to prevent unauthorized access.

        Furthermore, the public key is used to create wallet addresses so others can receive funds, while the private key is used to approve transactions and create digital signatures that prove only the holder made the action of that key.

        How Does a Private Key Work?

        A private key works through asymmetric cryptography, where it pairs with a public key using a one-way mathematical function, commonly elliptic curve multiplication in blockchains like Bitcoin and Ethereum. This allows the public key to be derived from the private key, but not the other way around.

        Specifically, the private key is used to create digital signatures that confirm the request came only from the holder, while the corresponding public key verifies the signature without exposing the secret key. During a transaction, the wallet signs the data using the private key and an encryption algorithm, producing a digital signature that the network checks using the public counterpart before accepting the encrypted data. 

        As a result, this system ensures data security because the private key is stored in a secure location and never shared online, helping prevent unauthorized access to the wallet and its crypto funds.

        Benefits of Private Key Encryption

        1. Performance and Speed

        Private key encryption, often used in symmetric encryption, is known for its speed and efficiency when handling large amounts of data. Because the same key is used for both encryption and decryption, the encryption algorithm requires fewer computational steps than asymmetric encryption, which uses two keys. Therefore, systems that rely on strong symmetric key encryption, including stream ciphers, can process encrypted data quickly while maintaining high data security.

        2. Data Integrity

        Private key systems help protect data integrity by ensuring that information has not been altered during transmission. When an encryption algorithm encrypts information, the receiving party can decrypt the information using the secret key and confirm that the data matches the original message. If the encrypted data has been modified or corrupted, the decryption process will fail, signaling a potential security issue.

        3. Confidentiality

        One of the biggest advantages of private key encryption is confidentiality. Since the secret key is known only to authorized parties, unauthorized users cannot easily decrypt messages or access the protected information. As long as the key remains secure, the encryption system protects sensitive data from exposure across the internet or other

        4. Authentication and Integrity

        Private key systems also support authentication and integrity, especially when combined with public key encryption. In many security systems, the private key is used to create digital signatures, which allow others to verify identity using the corresponding public key. This process confirms that the message came from the correct user and that the data was not altered after it was sent.

        How Private Keys Are Used in Practice

        1. Decrypting Messages or Data

        A private key can be used to decrypt data that was encrypted with a public key. In asymmetric encryption, the sender encrypts information using the receiver’s public key, and the receiver then uses the private key to decrypt the data and read the original message. As a result, this method ensures that only the intended user with the correct key can access the information.

        2. Creating Digital Signatures

        Another common use of a private key is to create digital signatures. When a user signs a file, message, or transaction, the system uses the private key and an encryption algorithm to generate a signature tied to the corresponding public key. Consequently, anyone with the corresponding public key can verify that the signature is valid, confirming that the message came from only the holder of the key.

        3. Accessing Secure Systems

        Private keys are also used to access protected systems and services across the internet. For example, servers often rely on SSL certificates issued by a certificate authority. In these cases, systems use public and private key pairs, with the private key stored in a secure location on the server, enabling encrypted connections and protecting sensitive data.

        4. Authorizing Cryptocurrency Transactions

        In cryptocurrency networks, a private key is essential for controlling a crypto wallet and managing crypto funds. When a user sends a transaction, the wallet uses the private key to generate a digital signature that proves ownership of the funds. The blockchain network verifies the signature using the public key before allowing the transaction to move forward.

        Because of this system, losing access to a private key means losing control of the associated cryptocurrency wallet. For this reason, many users store keys in cold wallets, especially hardware wallets like Ledger NanoX instead of leaving them exposed in a hot wallet or other software connected to the internet.

        Private Keys vs. Public Keys: What’s the Difference?

        Private Keys vs. Public Keys: What's the Difference?Private Keys vs. Public Keys: What's the Difference?

        Private keys and public keys form a key pair in asymmetric encryption with distinct roles. With a private key, only the holder can access the wallet, and exposure allows anyone to move crypto funds. On the other hand, the public key is the public counterpart used to receive funds and verify digital signatures without exposing the private key.

        Here is how these two keys differ:

        AspectPublic KeyPrivate KeyVisibilityYou can share your public keys with anyonePrivate keys must be kept secretPrimary RoleEncrypts data or verifies signaturesDecrypts data or signs transactionsGenerationPublic keys are derived from private key via one-way math Generated first as the source Usage ExampleReceive crypto like a wallet addressSpend crypto or access fundsSecurityNo risk if you share it with othersIf your private keys are compromised, you’ll lose access to your wallet and fundsPerformanceSlower, computationally intensiveFaster operations

        Private Keys vs. Passwords: What’s the Difference?

        Private keys are used to sign transactions, decrypt messages, and control access to crypto wallets and secure systems. While a password provides authentication to an account or device and can usually be reset. Here is a breakdown of how they differ:

        AspectPrivate KeyPasswordTypeCryptographic string (e.g., 256-bit number)Human-readable string of charactersUsageSigns transactions, proves ownership (e.g., spend crypto)Authenticates to accounts/servicesStorageUser device/wallet only. Never share it with anyone Often hashed on servers; resettableSecurity ModelAsymmetric crypto; irreversible if lostSymmetric/shared secret; vulnerable to breaches/phishingRecoverabilityNone. Permanent loss of assetsReset via email/SMS/supportVulnerabilityTheft grants full controlBrute-force, keylogging, reuse attacksCrypto RelevanceEssential for wallets like Tangem/LedgerProtects exchange logins, not funds 

        Threats to Your Private Keys

        Malware and viruses: Software can target private keys stored on computers or mobile devices.Phishing attacks: Fake websites or messages trick users into revealing private keys or passwords.Hardware theft: Losing devices that store private keys, including hardware wallets or hot wallets, exposes funds.Weak storage practices: Storing private keys in plain text, on the internet, or in easily accessible locations.Human error: Mistyping, misplacing, or failing to back up private keys can result in permanent loss of access.Keylogger software: Programs that record keystrokes can capture private keys as they are entered into software wallets.Social engineering: Attackers manipulate users into revealing their private keys or other sensitive information.

        Private Key Management: Challenges and How to Keep Your Keys Secure

        Challenges

        Risk of Loss: If a private key is lost, access to associated crypto assets or data is permanently gone, with no way to recover it.Susceptibility to Theft: Private keys stored insecurely can be stolen by hackers, malware, or phishing attacks.Human Error: Mistakes such as misplacing hardware wallets, writing keys down insecurely, or sharing keys unintentionally can compromise security.Complexity of Management: Users holding multiple keys across different wallets or platforms may struggle to track and manage them safely.

        How to Keep Your Keys Secure

        Hardware Wallets: Store private keys offline in physical devices, reducing exposure to online threats.Encrypted Backups: Create secure, encrypted backups of keys in multiple safe locations to prevent loss.Multi-Signature Wallets: Require multiple private keys to authorize transactions, minimizing the impact of a single key compromise.Key Management Software: Use specialized software to securely generate, store, and manage private keys with strong encryption.Avoid sharing keys: Never give your private keys to anyone, including friends or service providers, and do not store them on shared or cloud devices prone to breaches.Cold Storage: Cold wallets are one of the safest ways to secure your cryptocurrencies. You can keep the majority of your funds offline, connected only when needed, to prevent constant exposure to online threats.

        Conclusion

        In sum, a private key is the core element of any cryptocurrency wallet and the foundation of data security in blockchain systems. It allows you to control crypto assets, create digital signatures, and authorize transactions, while the public key verifies actions without exposing the secret key. To protect your keys and account, store it offline in hardware wallets, have secure backups, and use strong encryption algorithms.

        FAQs

        How can I see my private key?

        Most crypto wallets allow users to view the private key in the wallet settings. For hardware wallets, the key is stored securely offline, and the wallet provides a method to safely reveal it. Exposing the private key outside a secure device increases the risk of theft.

        Can a private key be hacked?

        Yes, a private key can be compromised if stored in software connected to the internet, through malware, phishing attacks, or social engineering. Using offline storage, such as hardware wallets or cold storage, significantly reduces risk.

        How do I recover my private key?

        A lost private key cannot be recovered without a backup. Proper private key management requires creating secure backups in multiple secure locations and using strong encryption algorithms for digital copies.

        Is a password the same as a private key?

        No. A password authenticates access to an account or device and can often be reset. A private key is a cryptographic key used to control a cryptocurrency wallet, sign transactions, and protect encrypted data. Losing a private key results in permanent loss of crypto funds.

        What’s the difference between a private key and a seed phrase?

        A private key is a single cryptographic key that allows control of a wallet and authorization of transactions. A seed phrase is a backup of multiple private keys, typically generated when creating a wallet, that can be used to restore access to all keys in case of device loss.



        Source link

        Popular Posts

        My Favorites

        Xai Play Brings Blockchain Rewards to Steam Achievements

        0
        Blockchain-based gaming platform XAI Play is integrating with Steam to introduce a reward system for in-game achievements.The platform connects to Steam’s existing infrastructure,...