Tuesday, March 3, 2026

 

DIGITAL LIFE


AI videos and video game senes: X flooded with misinformation after US and Israeli attack on Iran

Minutes after US President Donald Trump announced that Americans and Israelis had launched a “major combat operation” against Iran, the social network X was flooded with misleading content about the attacks and Tehran's supposed response.

Old videos repurposed, images attributed to the wrong locations, content generated by artificial intelligence, and even video game scenes circulated as if they showed events in real time. Many of these posts garnered millions of views within hours of the official announcement.

According to a report by WIRED, which analyzed hundreds of posts on the platform, much of the viral content promoted false or distorted claims about the scale and targets of the attacks.

The publication points out that virtually all of the most popular posts were from accounts with a blue checkmark, paying users of the premium service, who can receive remuneration based on the engagement generated.

Among the examples cited is a video that claimed to show ballistic missiles over Dubai, but which actually depicted Iranian strikes against Tel Aviv in October 2024.

Another widely shared clip claimed to show the downing of an Israeli fighter jet by Iran's air defense system, without any official confirmation that Israeli aircraft were shot down on Saturday.

Out-of-context images also circulated to support supposedly successful attacks against Israel. A pro-Iran profile published a photo of Dubai as if it were a missile impact on Tel Aviv. The Tehran Times, a media outlet aligned with the Iranian government, shared what analysts pointed out as an AI-generated image, claiming the complete destruction of an American radar in Qatar, something that has not been confirmed by independent reports.

In another case, a pro-Trump account published images that it said showed the "before and after" of the palace of the Iranian supreme leader, Ali Khamenei. The later image appeared authentic, but the earlier one actually showed the mausoleum of Ruhollah Khomeini, located in another area of ​​Tehran.

The platform did not respond to requests for comment from Wired's report. Under Elon Musk's management, X had already been criticized by experts for moderation failures during major news events. According to the report, although some posts received notes from the community correcting false information, the content remained online, without clarity on how many people were impacted before the corrections.

Record day...The escalation of the conflict in the Middle East caused X to hit a historic engagement record. On February 28, the date on which Israel and the United States launched joint attacks against Iran, the platform recorded the highest level of usage ever recorded since its creation.

The information was released by Elon Musk, owner of X, who posted on the network: "Highest usage of 𝕏 ever".

Nikita Bier, the company's head of product, explained that the date marked "the biggest day in Xbox history in terms of user active seconds," a metric that measures the total number of seconds users were active on the platform.

mundophone 

Monday, March 2, 2026


TECH


Brain-like chips and LIDAR sensors may enable safer human-robot teamwork

Robotics technology that not only performs simple tasks but also supports humans in all their tasks is among the key technologies in industrial manufacturing. But this requires that robots be able to master complex movements, execute commands and maintain a safe distance from humans at all times. Fraunhofer researchers have now made this form of collaboration between humans and machines possible in the NeurOSmart flagship project.

The researchers are combining several technologies: a sensor system with LIDAR lasers that continuously monitors the work area shared by humans and robots; AI-supported chips that evaluate signals directly in the sensor system; and neuromorphic chip technology that functions like the human brain and is therefore highly energy efficient.

In addition to the Fraunhofer Institute for Silicon Technology ISIT, project participants also include the Fraunhofer Institute for Photonic Microsystems IPMS, the Fraunhofer Institute for Microelectronic Circuits and Systems IMS, the Fraunhofer Institute for Machine Tools and Forming Technology IWU and the Fraunhofer Institute for Intelligent Analysis and Information Systems IAIS.

NeurOSmart was coordinated by Fraunhofer ISIT. "Together with our project partners, we have further developed the technologies and integrated them in an overall system. Collaboration with the machine is risk-free for humans," says Shanshan Gu-Stoppel, Head of Optical Systems at Fraunhofer ISIT and honorary professor of microtechnology at the FH Westküste University of Applied Sciences in Heide.

LIDAR laser sensor system...The sensor system monitors the area in which humans and robots move from a bird's eye view. The researchers make use of a LIDAR (light detection and ranging) laser. This type of laser emits short pulses in the near-infrared range and uses the reflections to measure distances in 3D.

Movable MEMS (microelectromechanical systems) mirrors project the laser across the entire work area and generate a high-resolution 3D image. The researchers have succeeded in improving the performance and energy efficiency of the mirrors. "We use piezoelectric aluminum scandium nitride (AlScN) with a layer thickness of only 1 micrometer for the MEMS mirrors," explains Gu-Stoppel.

A key feature of NeurOSmart is the direct integration of data processing into the sensor system. The large amount of image data generated by the sensor's wide field of view is first preprocessed. AI-based algorithms developed by Fraunhofer IMS bundle the incoming signals and identify areas of special interest in the scene. The sensor can then be precisely aligned for subsequent analyses, saving power and reducing the data rate.

With intelligent sensor technology and AI-supported data processing, NeurOSmart technology enables close collaboration between humans and robots. Credit: Fraunhofer IWU

Neuromorphic computing...The next step, comprising actual evaluation of the data that serves as the basis for controlling the robot, is also performed directly in the sensor system. Under the direction of Thomas Kämpfe, Business Unit Head at the Center Nanoelectronic Technologies (CNT), researchers at Fraunhofer IPMS are focusing on the concept of neuromorphic computing. They have developed a special accelerator chip. The processor consists of many small computing units that are interconnected on a wafer in a matrix.

Each chip acts as a thinking cell and makes its own decisions. This technology is based on the way the human brain works—hence the term neuromorphic computing.

Fraunhofer IAIS is developing the highly specialized AI models required for this. Only a few milliseconds elapse between signal reception, evaluation and the mechanical response of the robot arm. This enables safe collaboration even with heavy-duty robots, which the AI slows down or stops when a person comes too close. By simulating the entire robot cell, Fraunhofer IAIS was able to simulate hazardous situations for training purposes that cannot be replicated in real life.

"Neuromorphic computing is a major step towards a hardware architecture for processing resource-intensive AI applications that is not only fast but is also highly energy-efficient," says Kämpfe.

Fraunhofer ISIT researcher Gu-Stoppel adds, "NeurOSmart's technologies not only make industrial production more agile and efficient, they also make the factory floor a safe, creative and human-friendly place for all employees."

Customized applications for industry...The NeurOSmart components and methods form a standardized technology platform. Industrial customers could develop their own applications for their individual scenarios. In the future, NeurOSmart's energy-efficient technologies and the resulting longer battery life could also find applications in drones or sensor systems for agriculture.

Provided by Fraunhofer-Gesellschaft 


DIGITAL LIFE


AirSnitch attack shows hackers can easily intercept encrypted Wi‑Fi traffic

AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can entirely bypass client isolation on Wi-Fi, which is typically the only thing preventing attackers from intercepting data sent from your router to your device. There are caveats we'll discuss, but the sheer applicability of the attack across Wi-Fi providers is staggering, and makes the prospect of relying on public or shared Wi-Fi access points truly nightmarish, particularly for any sensitive data you may be handling on those networks. That warning doesn't just apply for coffee shops or other common access points—schools and universities and even some enterprise networks could be compromised by AirSnitch attacks.

Lead author of the related research paper (AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks) Xin'an Zhou stated in an interview with Ars Technica that "AirSnitch breaks worldwide Wi-Fi encryption and it might have the potential to enable advanced attacks. Advanced attacks can build on our primitives to [perform] cookie stealing, DNS and cache poisoning. Our research physically wiretaps the wire altogether so these sophisticated attacks will work. It's really a threat to worldwide network security." He elaborated later that while some router manufacturers have already released mitigation updates and that more are expected to come, a few manufacturers have stated that "some weaknesses can only be addressed through changes in the underlying chips they buy from silicon makers." The lack of standardization in client isolation methods across manufacturers also throws a wrench into defending against AirSnitch, since solutions may end up being vendor-specific.

It's not all doom and gloom, thankfully. Co-author of the research paper Mathy Vanhoef also stated that AirSnitch is better described as an encryption bypass "in the sense that we can bypass client isolation. We don't break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken, and we bypass it. People who don't rely on client or network isolation are safe."

That last bit is the most important piece of information for most readers despite not being stated in the original paper and only mentioned after the Ars Technica piece's initial publication. Are you running a Wi-Fi access point with a dedicated Guest network? If so, it's essential that separate SSIDs are on separate VLANs if you want to protect your network from these attacks. If such options aren't available to you, you may be vulnerable until appropriate firmware patches are released or new router releases fix the underlying isolation vulnerabilities entirely.

A number of enterprise networks already separate SSIDs into their own VLANs, so the vulnerability there is less severe. But for networks with less-secured Guest access, especially public Wi-Fi networks, the danger is greatly increased. It's particularly problematic for those who use ISP-provided routers from providers like Comcast, whose Xfinity routers double as Guest access points for other Xfinity customers within range. As always, a fully-private network access point is best to protect yourself from attackers—though other, more commonplace attacks like "evil twin" attacks are still a concern.

AirSnitch bypasses the so-called "client isolation," a feature offered by router manufacturers to prevent devices connected to the same access point from communicating directly with each other. The method works even when encryption is enabled.

This opens the possibility of a bidirectional "man-in-the-middle" attack, in which the attacker can intercept and modify the victim's traffic. In practice, this can enable the theft of cookies, passwords, and credit card data, as well as DNS poisoning.

In tests, 11 devices from manufacturers such as Netgear, D-Link, TP-Link, ASUS, Ubiquiti, and Cisco showed vulnerability to at least one variation of AirSnitch. Some of the flaws can be mitigated through firmware updates, but some manufacturers reported that certain vulnerabilities can only be corrected by modifying the hardware of the chips used.

Despite its severity, AirSnitch requires the attacker to already have some type of access to the Wi-Fi network or associated infrastructure, which raises the practical barrier to exploitation.

Tested models(below):

Netgear Nighthawk x6 R8000

Tenda RX2 Pro

D-LINK DIR-3040

TP-LINK Archer AXE75

ASUS RT-AX57

DD-WRT v3.0-r44715

OpenWrt 24.10

Ubiquiti AmpliFi Alien Router

Ubiquiti AmpliFi HD Router

LANCOM LX-6500

Cisco Catalyst 9130


by mundophone

Sunday, March 1, 2026


TECH


Google brings quantum-hardened HTTPS to Chrome in major security upgrade

Traditional cryptographic signatures that underpin HTTPS can be broken by a sufficiently powerful quantum computer using algorithms like Shor's, threatening the trust model of secure connections. To help protect against this threat, Google is rolling out a major upgrade to Secure HTTP in its Chrome browser. In a blog post published yesterday, the Chrome Secure Web and Networking Team outlined a new program to make TLS certificates resistant to future quantum attacks without imposing significant performance penalties on the web ecosystem.

The central innovation in Google's approach is the adoption of Merkle Tree Certificates (MTCs), a structure that replaces the long chain of signatures found in classic X.509 certificates with compact proofs that a given certificate is included in a public Merkle tree. Under this model, a Certification Authority signs a single "Tree Head" representing "potentially millions of certificates," and the browser verifies inclusion using a lightweight proof rather than downloading bulky cryptographic material. This cuts down the data sent during a TLS handshake while maintaining verifiable trust.

Post-quantum cryptographic algorithms such as ML-DSA (and others standardized by NIST, the National Institute of Standards and Technology) generate signatures and keys that are orders of magnitude larger than classical equivalents. Embedding these larger primitives directly in every HTTPS certificate would balloon certificate sizes from the current ~64-byte footprint to multiple kilobytes, drastically slowing connections and increasing bandwidth use. Merkle Tree proofs sidestep this by decoupling the size of strong cryptography from in-flight handshake data, keeping performance closer to today's web.

Google has already integrated preliminary MTC support into Chrome and is conducting feasibility studies with partners such as Cloudflare in a phased rollout. In the first phase, MTC-enabled connections are backed by traditional certificates to ensure a safe fallback while measuring real-world performance and reliability. The plan calls for broader bootstrapping with Certificate Transparency log operators and the eventual establishment of a Chrome Quantum-resistant Root Store alongside the existing root program by 2027.

This effort is part of a broader industry push to harden internet security ahead of quantum computing's maturation, with groups like the IETF's PKI, Logs, And Tree Signatures (PLANTS) working on standards for these new certificate paradigms. By investing early in scalable quantum-safe TLS mechanisms, Google aims to future-proof critical web trust infrastructure without fracturing compatibility or degrading performance. If only every development team were so dedicated.

Why MTCs? MTCs enable the adoption of robust post-quantum algorithms without incurring the massive bandwidth penalty of classical X.509 certificate chains. They also decouple the security strength of the corresponding cryptographic algorithm from the size of the data transmitted to the user. By shrinking the authentication data in a TLS handshake to the absolute minimum, MTCs aim to keep the post-quantum web as fast and seamless as today’s internet, maintaining high performance even as we adopt stronger security. Finally, with MTCs, transparency is a fundamental property of issuance: it is impossible to issue a certificate without including it in a public tree. This means the security properties of today’s CT ecosystem are included by default, and without adding extra overhead to the TLS handshake as CT does today.

Chrome’s MTC Propagation Plan...Chrome is already experimenting with MTCs with real internet traffic, and we intend to gradually build out our deployment such that MTCs provide a robust quantum-resistant HTTPS available for use throughout the internet.

Broadly speaking, our rollout spans three distinct phases:

Phase 1 (UNDERWAY): In collaboration with Cloudflare, we are conducting a feasibility study to evaluate the performance and security of TLS connections relying on MTCs. To ensure a seamless and secure experience for Chrome users who might encounter an MTC, every MTC-based connection is backed by a traditional, trusted X.509 certificate during this experiment. This "fail safe" allows us to measure real-world performance gains and verify the reliability of MTC issuance without risking the security or stability of the user's connection.

Phase 2 (Q1 2027): Once the core technology is validated, we intend to invite CT Log operators with at least one “usable” log in Chrome before February 1, 2026 to participate in the initial bootstrapping of public MTCs. These organizations have already demonstrated the operational excellence and high-availability infrastructure required to run global security services that underpin TLS connections in Chrome. Since MTC technology shares significant architectural similarities with CT, these operators are uniquely qualified to ensure MTCs are able to get off the ground quickly and successfully.

Phase 3 (Q3 2027): Early in Phase 2, we will finalize the requirements for onboarding additional CAs into the new Chrome Quantum-resistant Root Store (CQRS) and corresponding Root Program that only supports MTCs. This will establish a modern, purpose-built trust store specifically designed for the requirements of a post-quantum web. The Chrome Quantum-resistant Root Program will operate alongside our existing Chrome Root Program to ensure a risk-managed transition that maintains the highest levels of security for all users. This phase will also introduce the ability for sites to opt in to downgrade protections, ensuring that sites that only wish to use quantum-resistant certificates can do so.

This area is evolving rapidly. As these phases progress, we will continue our active participation in standards bodies such as the IETF and C2SP, ensuring that insights gathered from our efforts flow back towards standards, and that changes in standards are supported by Chrome and the CQRS.

https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html

mundophone


DOSSIER


DIGITAL LIFE


Google hosts illegal casino app in Brazil

Google hosts apps in its online stores that, under the guise of purely entertainment-focused online games, conceal illegal online casinos and platforms that border on illegality, either by offering withdrawals in points convertible into physical products and services or even cryptocurrencies.

After being contacted by Radar Big Tech, the company removed one of the apps that, without authorization, promoted betting with real money and had already been downloaded more than 500,000 times.

Other apps operate as social games of online casinos, but players report that the games force them to pay to play. And, despite officially not allowing withdrawals of the amounts, they create or promote parallel systems that convert virtual chips into real money, say experts in the field.

The situation represents a behind-the-scenes battle between big tech companies, regulators, and legalized betting houses. An executive in the sector described the actions of large technology companies as "a slap in the face to those who want to do the right thing."

"When we identify apps that violate our policies or are not authorized by Brazilian law, we act by removing them from the store. Any user can report violations through our official channels," says Google.

Since June 2025, Google has allowed legalized betting apps in its store, while Apple still bans these platforms. In addition to these services, Radar Big Tech located at least 162 apps that emulate online casinos on Google Play and another 15 on the App Store. They are not illegal, since:

Not all are classified as fixed-odds betting sites or online casinos. Most operate as "social casinos," that is, games that emulate casino games, such as roulette and slot machines. Within them, what is wagered and received as a reward are virtual coins, which cannot be converted into any financial value or product in the real world. Another characteristic of these platforms is that they do not require the player to buy these virtual coins with real money to continue playing.

This characterizes these games as "sweeptakes," which, broadly speaking, are prizes given to consumers at random and without charging an entry fee to win or participate.

In the US, "sweeptake casinos" have become the alternative for those who want to gamble online but live in states that prohibit online casinos.

There, there is even a law for sweeptakes, which obliges these platforms to allow some form of free play -- they can even charge for additional coins, but they must supply players with free chips. Some states also require a dual currency exchange system. With this, players bet with one type of virtual currency, but receive another type of chip, made available in special packages and which can be exchanged for money when a certain amount is reached by the platform.

In Brazil, there is no formal definition. But a 2024 presidential decree that reorganized the portfolio subordinated "sweeptakes" to the SPA (Secretariat of Prizes and Bets) of the Ministry of Finance, but there is no legal obligation to register with the ministry.

"Tiger Drop," however, had nothing to do with "sweeptaking" and explicitly offered conversion of prizes into cash, which characterizes it as an online casino. This was the app removed by Google. In Brazil, online casinos or betting houses need authorization from the SPA, through payment of a grant and compliance with a series of rules - legalized sites have ".bet.br" in the website address.

Other services, detected only on Google Play, are "social casinos" that adopt creative ways of making winnings tangible within their platforms. "Big Time - Ganhei dinheiro" exchanges virtual chips for cryptocurrencies, such as Iota and Solana, while "Hard Rock Jackpot Planet" exchanges them for virtual points on its own platform that can be converted into products.

Many of these "social casinos" state that they do not allow betting with real money, but sell virtual currency for the player to continue betting. Purchases of items start at R$ 2.49 and can go up to R$ 5,200. This dynamic leads bettors to believe that, in return, they will be able to withdraw the virtual coins they have received.

"We earn in-game virtual coins that initially suggest we can convert them into money, but that's a lie. There's no withdrawal option; the developers make money from downloads. This app is deceptive, and we fell for it"... said Adrian Botelho, in a comment on Google Play about the game "Lucky Spin Slot: slot machines"

Another common complaint is that the free coins run out quickly, and it's only possible to continue playing if there's a payment. Many games are in English, but when buying coins, the language changes to Portuguese. This is the case with "Xtreme Slots Vegas Casino Game".

There are also those who buy credits, have the money debited, but don't receive the virtual coins, as in "HighRoller Vegas: Casino Slots". "Tigrinho 777" allows donations between players, which opens the door for transactions outside the platform.

Other games like "Huuuge Casino Slots Vegas 777" adopt a curious tactic to attract users: players reach them through services like Cointiply and Cashzine, which promise remuneration in exchange for performing certain tasks in the digital world.

In the case of the game, it's about reaching high levels, which, users say, doesn't happen without buying virtual currency with real money.

According to Fábio Augusto Macorin, Undersecretary of Monitoring and Inspection at SPA, illegal bets pose risks to bettors due to fraud (difficulty in withdrawing prizes, biased algorithms), insecurity (lack of access control and management of personal data), and lack of customer service. (In the case of legal bets, it's even possible to complain to consumidor.gov.)

Add to this the open access for minors, since many applications identified by Radar Big Tech had a "free" rating and no age check for players.

According to research by the Locomotiva Institute from June 2025, 8 out of 10 players report difficulty distinguishing between legalized and illegal platforms. Three-quarters of bettors reported having played on irregular betting sites or casinos – the proportion is higher among young people and those who are part of families with an income of up to two minimum wages.

He states regarding Google and Apple that "a priori, they are also responsible in relation to these applications." According to the Betting Law (14.790/2023), it is the duty of digital platforms not to offer illegal games. "The illegal exploitation of gambling is a criminal offense. It is not exactly a crime, but, depending on its repercussions, it can lead to crimes such as money laundering and gang formation."

According to Macorin, SPA operates on four fronts to combat illegal online betting and gambling, such as cyber (detection and blocking of illegal activities, an action that has already resulted in 25,000 suspensions), financial (Brazilian banks are instructed to open accounts only for legalized betting), advertising (removal of advertising for irregular services), and regulatory (improvement of standards).

Of these lines of action, two involve big tech companies directly. This is evidenced by cooperation agreements with CONAR (National Council for Advertising Self-Regulation) for advertisements and promotions, and with the Digital Council, an association that represents the interests of Discord, Google, Kwai, Meta, OpenAI, and TikTok.

Representatives of legal betting companies criticize the actions of big tech companies behind the scenes, saying they are slow to remove illegal betting and advertising from the air. "We want to – and believe we should – pay taxes. Then Apple or Android comes along and puts an illegal betting app in the store. Damn…it's a slap in the face to anyone who wants to do the right thing," said an executive from a legal betting company, speaking on condition of anonymity. There are even insinuations that they profit from illegal betting…

Illegal betting is no small problem. According to LCA's calculations, the illegal market accounts for a share ranging from 41% to 51% of the entire betting sector in Brazil. This represents an annual revenue of R$ 26 billion to R$ 40 billion, which means that the amount of R$ 7.2 billion to R$ 10.8 billion that does not go to public coffers is lost.

For Leonardo Benites, communications director of ANJL (National Association of Games and Lotteries), much of what is done to curb the operation of illegal betting is "a futile effort."

"No regulation will have the speed of creativity or technology of the illegal. You need to starve it out. How? Payment methods and marketing. Because if they don't make money and can't transfer that money, the operation isn't worth it." It becomes an internal executive decision for him instead of a fight''…said Leonardo Benites, from ANJL

Besides that, there are gray areas in which various platforms operate. This is the case with "sweepstakes casinos". Google itself changed its internal rules at the end of last year to frame these games with the same rigor applied to online casinos and bets. Even so, it left room for platforms to be classified only as "social casinos".

For Benites, there is not much doubt. "The 'social casino' is nothing more than the 'sweepstakes' and falls under the same regulations that we have, which makes these applications illegal, yes. However, the platforms still don't understand this very well."


Reporter: Helton Simões Gomes (columnist for the digital magazine Tilt, Brazil)

Saturday, February 28, 2026


TECH


Can smart cameras improve evacuations? A new approach to smarter crowd mapping

Emergency evacuations during natural disasters like earthquakes and tsunamis increasingly rely on advanced technology to effectively assess real-time crowd movement and points of congestion. Disaster-preparedness involves the development of an optimized technology that is easy to use and interpret.

How LiDAR helps monitor crowds...A remote sensing technology, LiDAR, short for light detection and ranging, uses laser pulses to detect congestion or crowd density. The laser scans human targets and measures their distance based on the time taken for the reflected laser to bounce off the target and return. The reflected laser beams together create a 3D representation or point cloud image of the target.

Non-repetitive scanning LiDAR is an affordable version with a wide field of view compared to conventional high-density LiDAR systems, making it attractive for large-scale use in public spaces. However, the very advantage of wider coverage and low-power imaging results in sparse and irregular measurements. The retrieved images lack depth and continuity, limiting the practical utility of this system in reporting real-time crowd flow.

Simulation pipeline for mimicking non-repetitive LiDAR sampling. Credit: Transportation Research Interdisciplinary Perspectives (2026)

New color-guided depth completion method...To address this critical gap, doctoral student Zixuan Zhang from the Graduate School of Science and Engineering, Doshisha University, Japan, worked with senior colleagues Professor Nobutaka Tsujiuchi and Professor Akihito Ito from the Faculty of Science and Engineering, Doshisha University, and Professor Hirosuke Horii from the Faculty of Science and Engineering, Kokushikan University, to develop an improved color-guided depth completion method specifically designed for LiDAR images.

Explaining their motivation, Zhang, the lead author of the study, says, "This research originated from our work on dynamic evacuation guidance systems, where accurate real-time observation of crowd movement is critical. We hope to enhance evacuation safety through a reliable reconstruction of depth in human images generated by non-repetitive scanning LiDAR under realistic sensing constraints."

In this study, researchers developed an RGB (red, green, blue) color-guided depth recovery method specific to the unique sampling features of non-repetitive LiDAR.

Inside the new reconstruction technique...The method combines computational techniques like confidence-aware bilateral filtering and masked reconstruction. It also uses a self-consistent parameter optimization strategy that can function without dense actual-depth data. The combination of these steps allows the method to reconstruct continuous depth structures while preventing faulty over-smoothing and overfilling of gaps in the images.

A key highlight of this study is the creation of a simulated dataset mimicking the sparse and irregular non-repetitive scanning LiDAR measurements.

Zhang explains, "Until now, the lack of publicly available datasets that replicate the irregular sampling characteristics of non-repetitive scanning LiDAR, together with corresponding dense ground-truth depth maps and color images, has posed a major challenge for the accurate evaluation of depth recovery methods."

In this study, the authors used a 3D human motion dataset for dense true-depth images and paired color images. Next, they mimicked the LiDAR rotation and scanning method to generate sparse and irregular images from the true-depth images.

Sparse and irregular depth measurements from non-repetitive LiDAR (left) and the reconstructed dense depth map using the proposed RGB (red, green, blue)-guided completion framework (right). Credit: Zixuan Zhang / Doshisha University, Japan

Results, limitations, and future potential...The proposed method was tested on 30,000 simulated samples, and the results demonstrate improved depth accuracy and structural consistency compared to conventional filtering methods. The depth recovery framework could reconstruct coherent human silhouettes and structural depth patterns, and the lightweight computational framework makes it suitable for disaster-response applications.

However, the authors caution that reliance on color images makes the accuracy of depth recovery sensitive to changes in lighting, saturation, motion blur, or misalignment. The method would need to be evaluated against real-world data before drawing any firm conclusions regarding its superior efficiency in emergency evacuation guidance systems.

"As LiDAR sensors become more widely integrated into smart city infrastructure, robust depth reconstruction methods will become essential for public safety systems. Our research sets the foundation for the implementation of next-generation situational awareness systems in urban environments," explains Zhang.

Overall, this new method paints a fuller picture by improving the accuracy of depth perception in LiDAR images, thus advancing the reliability of crowd assessment for disaster management.

Provided by Doshisha University  


TECH


What is causing the RAM shortage? Chip and supply chain experts explain

Pay any attention to the computer market these days and one thing becomes abundantly clear: RAM—or Random-Access Memory—has gotten pretty expensive. Memory prices have already surged approximately 90% in the first quarter of 2026 compared to the fourth quarter of 2025, according to research firm Counterpoint Technology Market Research.

This change largely stems from a change of focus by Samsung, SK Hynix and Micron, the three biggest RAM component makers in the world, comprising up to 93% of the market.

To accommodate the high computing demands of AI data centers, these companies have accelerated the production of high-bandwidth and high-capacity RAM to supply these centers, according to a market analysis report from the International Data Corporation, or IDC, a US-based market research intelligence firm.

As a result, "this has restricted the supply of general-purpose memory modules and driven up prices across the board," reads a summary of the report.

Matteo Rinaldi, a professor of electrical and computer engineering and the director of Northeastern University's Institute for NanoSystems Innovation, said this shortage is different in nature than the chip shortages the markets experienced during the COVID-19 pandemic.

"This is more structural," he said. "This is really an AI-driven memory demand shock."

RAM can be understood as a computer's short-term memory center, and it's essential in allowing for multiple applications to be run at once on a computing device. It is a foundational component of any modern computing device—from the cellphone in your pocket to your car's infotainment system.

But an AI data center requires significantly more high-performing memory than a typical consumer electronic device.

"Just to give you an idea, a single AI server can use as much advanced memory as a dozen or even hundreds of traditional laptops," he said. So when hyperscalers, known as massive cloud computing providers, build thousands or tens of thousands of these systems at once, they basically absorb a large fraction of global memory production, Rinaldi added.

RAM memory production is an extremely consolidated business, with the few global players making the majority of these components. For years, these companies have optimized their production cycles for steady consumer demand.

AI, however, has thrown a wrench in the equation, with major players in AI development now requiring extremely powerful components capable of processing massive amounts of data.

"What this really reveals is that modern AI workloads move an enormous amount of data continually," Rinaldi said. "Computing is becoming limited not so much by processors but by my memory bandwidth and data management."

Here’s what you need to know about the global RAM shortage. Credit: Modoono/Northeastern University

So what will the result of this disruption mean for consumers? Higher prices mostly, at least in the medium term, he said.

But it's not just hobbyist PC builders and gamers looking to upgrade their setups who are feeling the impact of this shortage. Nearly everyone planning to purchase a smartphone, desktop computer, laptop, or any computing device in the next few years will likely be impacted.

"Memory is a foundational component of almost every modern electrical system," the electrical and computer engineering expert said, noting that these days even consumer-grade devices are requiring more and more RAM to accommodate new AI features, camera upgrades and other state-of-the-art technologies.

Nada Sanders, a professor of supply chain management at Northeastern University, said this situation highlights exactly where the tech industry's priorities lie. If RAM memory could be considered fuel, in this scenario, the majority of the fuel is being consumed by large corporations operating AI data centers while consumers are left out in the cold, she explained.

"It's a story of the haves and have nots," she said.

Her advice to the average consumer? If you need to make a purchase of a new laptop or cell phone, it will probably be better to buy sooner than later.

"I would be buying new devices now because they are just going to get more expensive, and they are going to continue getting more expensive until this problem is addressed," Sanders said.

It will likely be years before the shortage truly ends because new fabrication facilities need to be built and operational to meet RAM production demands. Intel CEO Lip-Bu Tan has publicly acknowledged that there will likely be "no relief until 2028."

"It will ease gradually as both manufacturing and computing architectures evolve," Rinaldi said. "Memory manufacturing expands very slowly because new fabrication plants cost tens of billions of dollars and take several years to build and ramp up."

Provided by Northeastern University

  DIGITAL LIFE AI videos and video game senes: X flooded with misinformation after US and Israeli attack on Iran Minutes after US President ...