Wednesday, March 4, 2026

 

DIGITAL LIFE


Deepfakes, job losses, opaque models: Exploring the dark side of AI

Artificial intelligence (AI) has become one of the defining technologies of what economists and policymakers describe as the Fourth Industrial Revolution. This is an era in which digital, physical, and biological systems are increasingly intertwined. In practical terms, AI refers to computer systems capable of performing tasks that typically require human intelligence, such as recognizing patterns, learning from data, making predictions, and assisting in complex decisions.

Aside from the generative AI and search tools that are at the forefront of the media and economic hyperbole, analytical and related AI systems already underpin smart manufacturing platforms, digital twins for testing and optimizing equipment performance, adaptive cybersecurity tools, medical diagnostics, and much more. It is unlikely that within a decade or so many occupations will not have been augmented or displaced by AI tools. The potential for productivity, innovation, and economic growth is great.

As with any new technology, however, there are good reasons to look closely at the social and economic impact AI might have. It would be prudent to put safeguards in place urgently given the way in which technologies have often amplified inequality, weakened democratic norms, and introduced new systemic risks in the past.

Recent research in the International Journal of Generative Artificial Intelligence has looked closely at many of the issues that are coming to the fore, such as labor disruption, deepfakes, the opacity of advanced AI models, bias, copyright, privacy, and security issues. Then, there is the issue of whether a superintelligent AI might surpass human abilities and redefine our very existence, perhaps even determining—algorithmically or through some kind of awareness—that we as a species are redundant, or worse, a problem that must be removed.

The researchers suggest that at the geopolitical level, international coordination is a major challenge, not least given the rogue behavior of some so-called state actors. The trajectory that AI takes in this Fourth Industrial Revolution is not fixed, nor is it predictable. We need to work together to ensure that it works for the benefit of humanity and the planet.

The dark side of AI involves severe risks including the manipulation of human behavior, deepfake-driven misinformation, and automated cyberattacks. It threatens privacy, enables biased decision-making, and poses significant societal dangers such as workforce displacement and the potential development of autonomous weapons. These threats raise critical ethical concerns about safety, accountability, and the "black box" nature of AI decision-making. 

Key aspects of the "dark side" of AI include(below):

Manipulation and behavioral control: AI can exploit user vulnerabilities and biases, steering behavior for profit or political influence. AI companions can cause social isolation and erode real-world relationship skills.

Deepfakes and fraud: The generation of realistic, fake, audio and video content is used for sophisticated fraud, scams, and spreading disinformation.

Security threats: Hackers use AI to automate attacks, create malware, and identify vulnerabilities in systems. "Hacking-as-a-Service" allows low-skill actors to conduct high-level cyberattacks.

Ethical and bias issues: AI systems can perpetuate or amplify discrimination in hiring, lending, and law enforcement, often due to biased training data.

Workforce disruption: AI presents significant risks to job security and economic stability.

Autonomous systems: The potential for AI to be integrated into weapons raises risks of uncontrollable, lethal autonomous systems.

Privacy infringement: AI systems can track and predict user behavior with extreme accuracy, such as detecting personal relationship status or, in extreme cases, predicting deaths.

"Black Box" problem: The lack of transparency in how AI models make decisions makes it difficult to hold them accountable for harmful outcomes.

Provided by Inderscience


TECH


Apple MacBook Neo: Wi-Fi 7, MagSafe charging, two USB-C ports and A18 Pro hardware base

Apple has been unstoppable with product announcements this week, but the most talked-about launch just happened in a way the Cupertino company certainly didn't plan. Before the highly anticipated budget laptop even had an official introduction on a brightly lit stage, Apple itself let slip its name in a small slip-up on its website.

The mix-up occurred on a regulatory compliance page on the brand's European website, where an unreleased device under the name "MacBook Neo" was briefly listed, sporting the model number A3404. The error did not go unnoticed by the internet's watchful eyes. MacRumors managed to detect and save the connection, which appeared framed within the 2026 Mac notebook lineup, before Apple's webmaster team could pull the plug and delete the evidence. Although the associated PDF document described only a generic “Laptop” running the macOS system, the text of the link itself left no room for doubt: the name is indeed MacBook Neo.

This error on the website did much more than just confirm the name under which the device will arrive in stores. According to MacRumors' detailed analysis, the submitted documents revealed physical hardware details that had not yet been confirmed so categorically.

We learned that the MacBook Neo will maintain modern convenience and include two USB-C ports, accompanied by the beloved and secure MagSafe charging port. In addition, the device will be future-proof, supporting the Wi-Fi 7 standard. However, there is one detail that clearly highlights Apple's cost-cutting strategy for this model: instead of using its own sophisticated proprietary N1 network chip, which you find in the new MacBook Air and MacBook Pro, the Neo will rely on a component manufactured by MediaTek to ensure network and Bluetooth connections.

The most interesting product Apple announced this week was its cheapest and least powerful laptop, the MacBook Neo. It’s just fascinating to see the company tackle an entirely new category — it’s not a premium ultraportable like the MacBook Air, and it’s not a computing powerhouse like the MacBook Pro. It’s simply an affordable $599 laptop. And after spending some time with it at Apple’s spring launch event today, I’m convinced it’s going to be a huge hit for the company.

For a $599 system, the MacBook Neo doesn’t look or feel like a budget machine. Its colorful aluminum case looks even more attractive than the MacBook Air and Pro’s, and at 2.7 pounds (the same as the Air), it’s easy to carry. I need to spend more time with its 13-inch screen, but at first glance it looks decently vibrant as well. It’s a shame Apple didn’t include a MagSafe charging port, but hey, at least the headphone jack is still around. And for many people, two USB-C ports should be plenty, but just keep in mind only one of those is USB-C 3 (DisplayPort, charging and speeds up to 10Gb/s) and the other is USB-C 2 (charging and speeds up to up to 480Mb/s).

The downsides to the MacBook Air became more apparent as I used it. Its keyboard feels a bit flimsy — it’s almost reminiscent of the old-school butterfly keyboards. And while its touchpad feels smooth and responsive, it lacked the sturdiness from the company’s more expensive haptic touchpads. And then there are the starting specs: For $599, the MacBook Neo comes with 8GB of RAM and 256GB of storage. Bumping up to $699 gets you 512GB of storage and a Touch ID button, but you’re still stuck with 8GB of RAM.

For a basic productivity machine, I suppose 8GB of RAM can work. But when coupled with the slower performance of the A18 Pro mobile chip, it’s unclear if the MacBook Neo will hold up over time. At the very least, the MacBook Neo serves an important role as Apple’s cheapest laptop. It’s an inexpensive way to bring people into the world of macOS, and it could be a great option for schools who want something a bit more sturdy than your average Chromebook.

Looking beyond this official leak and piecing together the puzzle provided by months of rumors, the picture of this computer becomes quite clear and appealing. The emerging image points to a 12.9-inch screen, making it incredibly portable and perfect for carrying in a backpack. The real trump card, however, will be its "engine." Everything indicates that it will be powered by the A18 Pro processor — yes, the same powerful chip that powers the iPhone 16 Pro line — ensuring that, despite being "cheap," this computer will not be slow in everyday tasks.

As for aesthetics, the MacBook Neo promises to be a breath of fresh air. Rumors suggest that it will be available in a vibrant color palette, including shades like pink, blue, yellow, and green, clearly setting itself apart from the more sober, corporate, and metallic design of the current MacBook Air line.

The weight of the name and the expectation of the price...The choice of the name "Neo" is, in itself, a fascinating subject. This is an unusual break from Apple's naming traditions, which tend to favor simplicity. The vast majority of analysts expected the company to opt for something safe, like "MacBook SE" (following the logic of the iPhone and Apple Watch), or simply "MacBook". Choosing "Neo" suggests that Apple wants this computer to have its own identity, emphasizing that it is a distinct and new line, and not just a stripped-down and impoverished version of the MacBook Air.

The main attraction will undoubtedly be the entry price, which should be between $599 and $799 (which should translate into highly competitive prices in the European market). This positioning could finally open the door to the macOS ecosystem for students and consumers who, until now, felt financially excluded by the brand's premium prices. Stay tuned for news, because the official announcement of the device and its capabilities is just hours away, even if the surprise of the name has already been spoiled.

by mundophone

Tuesday, March 3, 2026


TECH


Power producers have financial incentives to block market integration despite cost savings, says study

Renewable energy is lowering electricity costs in some parts of the country, but those benefits aren't being seen by consumers everywhere because they're typically placed far away from demand centers. Better integrating electricity transmission networks across regions could significantly reduce generation costs, new research from the University of Michigan shows—at the expense of generation companies' profits. The study is published in the journal Proceedings of the National Academy of Sciences.

Economist Catherine Hausman, associate professor at the Ford School of Public Policy, and colleagues found that improving interregional connectivity could have saved anywhere from $5.8 billion to $7.1 billion in electricity generation costs in 2022, and $3.4 billion to $5 billion in 2023.

At the same time, investing in regional connectivity could cost some power plants over $20 million in annual net revenue—giving them financial incentives to block or delay transmission network improvements.

"I was really struck by how the same parts of the country have seen the biggest jumps in electricity prices. The coasts, especially the Northeast, are the parts of the country that would most benefit from long-distance transmission, according to our model," Hausman said.

She notes that we must look to the past to understand why we have the transmission grid we have.

"It was built up at a time when vertically integrated companies served local demand centers, largely with nearby power plants and fairly short-distance transmission lines," Hausman said. "That's not well-matched to today's world, in which very cheap, very green power is being produced in the middle of the United States, keeping prices and greenhouse gas emissions down. At the same time, prices are spiking on the coasts.

"It would be great to transport more of that wind power to the East Coast, but that will require more long-distance lines, crossing multiple states."

The study gives policymakers a better understanding of why electric companies across the country may be hesitant to embrace regional integration despite associated generation cost reductions. Hausman hopes policymakers can find smart ways to accelerate long-distance transmission build-out to leverage low-cost resources like solar and wind farms.

"Power producers in the Great Lakes and Great Plains states would see significant revenue increases from increased market integration, and those in the Northeast, Southeast and California would see lower revenues," Hausman said. "As analysts and policymakers propose reforms, it will be important to consider the incentives of suppliers and therefore the critical role of grid governance."

Provided by University of Michigan 

 

DIGITAL LIFE


AI videos and video game senes: X flooded with misinformation after US and Israeli attack on Iran

Minutes after US President Donald Trump announced that Americans and Israelis had launched a “major combat operation” against Iran, the social network X was flooded with misleading content about the attacks and Tehran's supposed response.

Old videos repurposed, images attributed to the wrong locations, content generated by artificial intelligence, and even video game scenes circulated as if they showed events in real time. Many of these posts garnered millions of views within hours of the official announcement.

According to a report by WIRED, which analyzed hundreds of posts on the platform, much of the viral content promoted false or distorted claims about the scale and targets of the attacks.

The publication points out that virtually all of the most popular posts were from accounts with a blue checkmark, paying users of the premium service, who can receive remuneration based on the engagement generated.

Among the examples cited is a video that claimed to show ballistic missiles over Dubai, but which actually depicted Iranian strikes against Tel Aviv in October 2024.

Another widely shared clip claimed to show the downing of an Israeli fighter jet by Iran's air defense system, without any official confirmation that Israeli aircraft were shot down on Saturday.

Out-of-context images also circulated to support supposedly successful attacks against Israel. A pro-Iran profile published a photo of Dubai as if it were a missile impact on Tel Aviv. The Tehran Times, a media outlet aligned with the Iranian government, shared what analysts pointed out as an AI-generated image, claiming the complete destruction of an American radar in Qatar, something that has not been confirmed by independent reports.

In another case, a pro-Trump account published images that it said showed the "before and after" of the palace of the Iranian supreme leader, Ali Khamenei. The later image appeared authentic, but the earlier one actually showed the mausoleum of Ruhollah Khomeini, located in another area of ​​Tehran.

The platform did not respond to requests for comment from Wired's report. Under Elon Musk's management, X had already been criticized by experts for moderation failures during major news events. According to the report, although some posts received notes from the community correcting false information, the content remained online, without clarity on how many people were impacted before the corrections.

Record day...The escalation of the conflict in the Middle East caused X to hit a historic engagement record. On February 28, the date on which Israel and the United States launched joint attacks against Iran, the platform recorded the highest level of usage ever recorded since its creation.

The information was released by Elon Musk, owner of X, who posted on the network: "Highest usage of 𝕏 ever".

Nikita Bier, the company's head of product, explained that the date marked "the biggest day in Xbox history in terms of user active seconds," a metric that measures the total number of seconds users were active on the platform.

mundophone 

Monday, March 2, 2026


TECH


Brain-like chips and LIDAR sensors may enable safer human-robot teamwork

Robotics technology that not only performs simple tasks but also supports humans in all their tasks is among the key technologies in industrial manufacturing. But this requires that robots be able to master complex movements, execute commands and maintain a safe distance from humans at all times. Fraunhofer researchers have now made this form of collaboration between humans and machines possible in the NeurOSmart flagship project.

The researchers are combining several technologies: a sensor system with LIDAR lasers that continuously monitors the work area shared by humans and robots; AI-supported chips that evaluate signals directly in the sensor system; and neuromorphic chip technology that functions like the human brain and is therefore highly energy efficient.

In addition to the Fraunhofer Institute for Silicon Technology ISIT, project participants also include the Fraunhofer Institute for Photonic Microsystems IPMS, the Fraunhofer Institute for Microelectronic Circuits and Systems IMS, the Fraunhofer Institute for Machine Tools and Forming Technology IWU and the Fraunhofer Institute for Intelligent Analysis and Information Systems IAIS.

NeurOSmart was coordinated by Fraunhofer ISIT. "Together with our project partners, we have further developed the technologies and integrated them in an overall system. Collaboration with the machine is risk-free for humans," says Shanshan Gu-Stoppel, Head of Optical Systems at Fraunhofer ISIT and honorary professor of microtechnology at the FH Westküste University of Applied Sciences in Heide.

LIDAR laser sensor system...The sensor system monitors the area in which humans and robots move from a bird's eye view. The researchers make use of a LIDAR (light detection and ranging) laser. This type of laser emits short pulses in the near-infrared range and uses the reflections to measure distances in 3D.

Movable MEMS (microelectromechanical systems) mirrors project the laser across the entire work area and generate a high-resolution 3D image. The researchers have succeeded in improving the performance and energy efficiency of the mirrors. "We use piezoelectric aluminum scandium nitride (AlScN) with a layer thickness of only 1 micrometer for the MEMS mirrors," explains Gu-Stoppel.

A key feature of NeurOSmart is the direct integration of data processing into the sensor system. The large amount of image data generated by the sensor's wide field of view is first preprocessed. AI-based algorithms developed by Fraunhofer IMS bundle the incoming signals and identify areas of special interest in the scene. The sensor can then be precisely aligned for subsequent analyses, saving power and reducing the data rate.

With intelligent sensor technology and AI-supported data processing, NeurOSmart technology enables close collaboration between humans and robots. Credit: Fraunhofer IWU

Neuromorphic computing...The next step, comprising actual evaluation of the data that serves as the basis for controlling the robot, is also performed directly in the sensor system. Under the direction of Thomas Kämpfe, Business Unit Head at the Center Nanoelectronic Technologies (CNT), researchers at Fraunhofer IPMS are focusing on the concept of neuromorphic computing. They have developed a special accelerator chip. The processor consists of many small computing units that are interconnected on a wafer in a matrix.

Each chip acts as a thinking cell and makes its own decisions. This technology is based on the way the human brain works—hence the term neuromorphic computing.

Fraunhofer IAIS is developing the highly specialized AI models required for this. Only a few milliseconds elapse between signal reception, evaluation and the mechanical response of the robot arm. This enables safe collaboration even with heavy-duty robots, which the AI slows down or stops when a person comes too close. By simulating the entire robot cell, Fraunhofer IAIS was able to simulate hazardous situations for training purposes that cannot be replicated in real life.

"Neuromorphic computing is a major step towards a hardware architecture for processing resource-intensive AI applications that is not only fast but is also highly energy-efficient," says Kämpfe.

Fraunhofer ISIT researcher Gu-Stoppel adds, "NeurOSmart's technologies not only make industrial production more agile and efficient, they also make the factory floor a safe, creative and human-friendly place for all employees."

Customized applications for industry...The NeurOSmart components and methods form a standardized technology platform. Industrial customers could develop their own applications for their individual scenarios. In the future, NeurOSmart's energy-efficient technologies and the resulting longer battery life could also find applications in drones or sensor systems for agriculture.

Provided by Fraunhofer-Gesellschaft 


DIGITAL LIFE


AirSnitch attack shows hackers can easily intercept encrypted Wi‑Fi traffic

AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can entirely bypass client isolation on Wi-Fi, which is typically the only thing preventing attackers from intercepting data sent from your router to your device. There are caveats we'll discuss, but the sheer applicability of the attack across Wi-Fi providers is staggering, and makes the prospect of relying on public or shared Wi-Fi access points truly nightmarish, particularly for any sensitive data you may be handling on those networks. That warning doesn't just apply for coffee shops or other common access points—schools and universities and even some enterprise networks could be compromised by AirSnitch attacks.

Lead author of the related research paper (AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks) Xin'an Zhou stated in an interview with Ars Technica that "AirSnitch breaks worldwide Wi-Fi encryption and it might have the potential to enable advanced attacks. Advanced attacks can build on our primitives to [perform] cookie stealing, DNS and cache poisoning. Our research physically wiretaps the wire altogether so these sophisticated attacks will work. It's really a threat to worldwide network security." He elaborated later that while some router manufacturers have already released mitigation updates and that more are expected to come, a few manufacturers have stated that "some weaknesses can only be addressed through changes in the underlying chips they buy from silicon makers." The lack of standardization in client isolation methods across manufacturers also throws a wrench into defending against AirSnitch, since solutions may end up being vendor-specific.

It's not all doom and gloom, thankfully. Co-author of the research paper Mathy Vanhoef also stated that AirSnitch is better described as an encryption bypass "in the sense that we can bypass client isolation. We don't break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken, and we bypass it. People who don't rely on client or network isolation are safe."

That last bit is the most important piece of information for most readers despite not being stated in the original paper and only mentioned after the Ars Technica piece's initial publication. Are you running a Wi-Fi access point with a dedicated Guest network? If so, it's essential that separate SSIDs are on separate VLANs if you want to protect your network from these attacks. If such options aren't available to you, you may be vulnerable until appropriate firmware patches are released or new router releases fix the underlying isolation vulnerabilities entirely.

A number of enterprise networks already separate SSIDs into their own VLANs, so the vulnerability there is less severe. But for networks with less-secured Guest access, especially public Wi-Fi networks, the danger is greatly increased. It's particularly problematic for those who use ISP-provided routers from providers like Comcast, whose Xfinity routers double as Guest access points for other Xfinity customers within range. As always, a fully-private network access point is best to protect yourself from attackers—though other, more commonplace attacks like "evil twin" attacks are still a concern.

AirSnitch bypasses the so-called "client isolation," a feature offered by router manufacturers to prevent devices connected to the same access point from communicating directly with each other. The method works even when encryption is enabled.

This opens the possibility of a bidirectional "man-in-the-middle" attack, in which the attacker can intercept and modify the victim's traffic. In practice, this can enable the theft of cookies, passwords, and credit card data, as well as DNS poisoning.

In tests, 11 devices from manufacturers such as Netgear, D-Link, TP-Link, ASUS, Ubiquiti, and Cisco showed vulnerability to at least one variation of AirSnitch. Some of the flaws can be mitigated through firmware updates, but some manufacturers reported that certain vulnerabilities can only be corrected by modifying the hardware of the chips used.

Despite its severity, AirSnitch requires the attacker to already have some type of access to the Wi-Fi network or associated infrastructure, which raises the practical barrier to exploitation.

Tested models(below):

Netgear Nighthawk x6 R8000

Tenda RX2 Pro

D-LINK DIR-3040

TP-LINK Archer AXE75

ASUS RT-AX57

DD-WRT v3.0-r44715

OpenWrt 24.10

Ubiquiti AmpliFi Alien Router

Ubiquiti AmpliFi HD Router

LANCOM LX-6500

Cisco Catalyst 9130


by mundophone

Sunday, March 1, 2026


TECH


Google brings quantum-hardened HTTPS to Chrome in major security upgrade

Traditional cryptographic signatures that underpin HTTPS can be broken by a sufficiently powerful quantum computer using algorithms like Shor's, threatening the trust model of secure connections. To help protect against this threat, Google is rolling out a major upgrade to Secure HTTP in its Chrome browser. In a blog post published yesterday, the Chrome Secure Web and Networking Team outlined a new program to make TLS certificates resistant to future quantum attacks without imposing significant performance penalties on the web ecosystem.

The central innovation in Google's approach is the adoption of Merkle Tree Certificates (MTCs), a structure that replaces the long chain of signatures found in classic X.509 certificates with compact proofs that a given certificate is included in a public Merkle tree. Under this model, a Certification Authority signs a single "Tree Head" representing "potentially millions of certificates," and the browser verifies inclusion using a lightweight proof rather than downloading bulky cryptographic material. This cuts down the data sent during a TLS handshake while maintaining verifiable trust.

Post-quantum cryptographic algorithms such as ML-DSA (and others standardized by NIST, the National Institute of Standards and Technology) generate signatures and keys that are orders of magnitude larger than classical equivalents. Embedding these larger primitives directly in every HTTPS certificate would balloon certificate sizes from the current ~64-byte footprint to multiple kilobytes, drastically slowing connections and increasing bandwidth use. Merkle Tree proofs sidestep this by decoupling the size of strong cryptography from in-flight handshake data, keeping performance closer to today's web.

Google has already integrated preliminary MTC support into Chrome and is conducting feasibility studies with partners such as Cloudflare in a phased rollout. In the first phase, MTC-enabled connections are backed by traditional certificates to ensure a safe fallback while measuring real-world performance and reliability. The plan calls for broader bootstrapping with Certificate Transparency log operators and the eventual establishment of a Chrome Quantum-resistant Root Store alongside the existing root program by 2027.

This effort is part of a broader industry push to harden internet security ahead of quantum computing's maturation, with groups like the IETF's PKI, Logs, And Tree Signatures (PLANTS) working on standards for these new certificate paradigms. By investing early in scalable quantum-safe TLS mechanisms, Google aims to future-proof critical web trust infrastructure without fracturing compatibility or degrading performance. If only every development team were so dedicated.

Why MTCs? MTCs enable the adoption of robust post-quantum algorithms without incurring the massive bandwidth penalty of classical X.509 certificate chains. They also decouple the security strength of the corresponding cryptographic algorithm from the size of the data transmitted to the user. By shrinking the authentication data in a TLS handshake to the absolute minimum, MTCs aim to keep the post-quantum web as fast and seamless as today’s internet, maintaining high performance even as we adopt stronger security. Finally, with MTCs, transparency is a fundamental property of issuance: it is impossible to issue a certificate without including it in a public tree. This means the security properties of today’s CT ecosystem are included by default, and without adding extra overhead to the TLS handshake as CT does today.

Chrome’s MTC Propagation Plan...Chrome is already experimenting with MTCs with real internet traffic, and we intend to gradually build out our deployment such that MTCs provide a robust quantum-resistant HTTPS available for use throughout the internet.

Broadly speaking, our rollout spans three distinct phases:

Phase 1 (UNDERWAY): In collaboration with Cloudflare, we are conducting a feasibility study to evaluate the performance and security of TLS connections relying on MTCs. To ensure a seamless and secure experience for Chrome users who might encounter an MTC, every MTC-based connection is backed by a traditional, trusted X.509 certificate during this experiment. This "fail safe" allows us to measure real-world performance gains and verify the reliability of MTC issuance without risking the security or stability of the user's connection.

Phase 2 (Q1 2027): Once the core technology is validated, we intend to invite CT Log operators with at least one “usable” log in Chrome before February 1, 2026 to participate in the initial bootstrapping of public MTCs. These organizations have already demonstrated the operational excellence and high-availability infrastructure required to run global security services that underpin TLS connections in Chrome. Since MTC technology shares significant architectural similarities with CT, these operators are uniquely qualified to ensure MTCs are able to get off the ground quickly and successfully.

Phase 3 (Q3 2027): Early in Phase 2, we will finalize the requirements for onboarding additional CAs into the new Chrome Quantum-resistant Root Store (CQRS) and corresponding Root Program that only supports MTCs. This will establish a modern, purpose-built trust store specifically designed for the requirements of a post-quantum web. The Chrome Quantum-resistant Root Program will operate alongside our existing Chrome Root Program to ensure a risk-managed transition that maintains the highest levels of security for all users. This phase will also introduce the ability for sites to opt in to downgrade protections, ensuring that sites that only wish to use quantum-resistant certificates can do so.

This area is evolving rapidly. As these phases progress, we will continue our active participation in standards bodies such as the IETF and C2SP, ensuring that insights gathered from our efforts flow back towards standards, and that changes in standards are supported by Chrome and the CQRS.

https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html

mundophone

  DIGITAL LIFE Deepfakes, job losses, opaque models: Exploring the dark side of AI Artificial intelligence (AI) has become one of the defini...