Wednesday, March 4, 2026


TECH


Apple MacBook Neo: Wi-Fi 7, MagSafe charging, two USB-C ports and A18 Pro hardware base

Apple has been unstoppable with product announcements this week, but the most talked-about launch just happened in a way the Cupertino company certainly didn't plan. Before the highly anticipated budget laptop even had an official introduction on a brightly lit stage, Apple itself let slip its name in a small slip-up on its website.

The mix-up occurred on a regulatory compliance page on the brand's European website, where an unreleased device under the name "MacBook Neo" was briefly listed, sporting the model number A3404. The error did not go unnoticed by the internet's watchful eyes. MacRumors managed to detect and save the connection, which appeared framed within the 2026 Mac notebook lineup, before Apple's webmaster team could pull the plug and delete the evidence. Although the associated PDF document described only a generic “Laptop” running the macOS system, the text of the link itself left no room for doubt: the name is indeed MacBook Neo.

This error on the website did much more than just confirm the name under which the device will arrive in stores. According to MacRumors' detailed analysis, the submitted documents revealed physical hardware details that had not yet been confirmed so categorically.

We learned that the MacBook Neo will maintain modern convenience and include two USB-C ports, accompanied by the beloved and secure MagSafe charging port. In addition, the device will be future-proof, supporting the Wi-Fi 7 standard. However, there is one detail that clearly highlights Apple's cost-cutting strategy for this model: instead of using its own sophisticated proprietary N1 network chip, which you find in the new MacBook Air and MacBook Pro, the Neo will rely on a component manufactured by MediaTek to ensure network and Bluetooth connections.

The most interesting product Apple announced this week was its cheapest and least powerful laptop, the MacBook Neo. It’s just fascinating to see the company tackle an entirely new category — it’s not a premium ultraportable like the MacBook Air, and it’s not a computing powerhouse like the MacBook Pro. It’s simply an affordable $599 laptop. And after spending some time with it at Apple’s spring launch event today, I’m convinced it’s going to be a huge hit for the company.

For a $599 system, the MacBook Neo doesn’t look or feel like a budget machine. Its colorful aluminum case looks even more attractive than the MacBook Air and Pro’s, and at 2.7 pounds (the same as the Air), it’s easy to carry. I need to spend more time with its 13-inch screen, but at first glance it looks decently vibrant as well. It’s a shame Apple didn’t include a MagSafe charging port, but hey, at least the headphone jack is still around. And for many people, two USB-C ports should be plenty, but just keep in mind only one of those is USB-C 3 (DisplayPort, charging and speeds up to 10Gb/s) and the other is USB-C 2 (charging and speeds up to up to 480Mb/s).

The downsides to the MacBook Air became more apparent as I used it. Its keyboard feels a bit flimsy — it’s almost reminiscent of the old-school butterfly keyboards. And while its touchpad feels smooth and responsive, it lacked the sturdiness from the company’s more expensive haptic touchpads. And then there are the starting specs: For $599, the MacBook Neo comes with 8GB of RAM and 256GB of storage. Bumping up to $699 gets you 512GB of storage and a Touch ID button, but you’re still stuck with 8GB of RAM.

For a basic productivity machine, I suppose 8GB of RAM can work. But when coupled with the slower performance of the A18 Pro mobile chip, it’s unclear if the MacBook Neo will hold up over time. At the very least, the MacBook Neo serves an important role as Apple’s cheapest laptop. It’s an inexpensive way to bring people into the world of macOS, and it could be a great option for schools who want something a bit more sturdy than your average Chromebook.

Looking beyond this official leak and piecing together the puzzle provided by months of rumors, the picture of this computer becomes quite clear and appealing. The emerging image points to a 12.9-inch screen, making it incredibly portable and perfect for carrying in a backpack. The real trump card, however, will be its "engine." Everything indicates that it will be powered by the A18 Pro processor — yes, the same powerful chip that powers the iPhone 16 Pro line — ensuring that, despite being "cheap," this computer will not be slow in everyday tasks.

As for aesthetics, the MacBook Neo promises to be a breath of fresh air. Rumors suggest that it will be available in a vibrant color palette, including shades like pink, blue, yellow, and green, clearly setting itself apart from the more sober, corporate, and metallic design of the current MacBook Air line.

The weight of the name and the expectation of the price...The choice of the name "Neo" is, in itself, a fascinating subject. This is an unusual break from Apple's naming traditions, which tend to favor simplicity. The vast majority of analysts expected the company to opt for something safe, like "MacBook SE" (following the logic of the iPhone and Apple Watch), or simply "MacBook". Choosing "Neo" suggests that Apple wants this computer to have its own identity, emphasizing that it is a distinct and new line, and not just a stripped-down and impoverished version of the MacBook Air.

The main attraction will undoubtedly be the entry price, which should be between $599 and $799 (which should translate into highly competitive prices in the European market). This positioning could finally open the door to the macOS ecosystem for students and consumers who, until now, felt financially excluded by the brand's premium prices. Stay tuned for news, because the official announcement of the device and its capabilities is just hours away, even if the surprise of the name has already been spoiled.

by mundophone

Tuesday, March 3, 2026


TECH


Power producers have financial incentives to block market integration despite cost savings, says study

Renewable energy is lowering electricity costs in some parts of the country, but those benefits aren't being seen by consumers everywhere because they're typically placed far away from demand centers. Better integrating electricity transmission networks across regions could significantly reduce generation costs, new research from the University of Michigan shows—at the expense of generation companies' profits. The study is published in the journal Proceedings of the National Academy of Sciences.

Economist Catherine Hausman, associate professor at the Ford School of Public Policy, and colleagues found that improving interregional connectivity could have saved anywhere from $5.8 billion to $7.1 billion in electricity generation costs in 2022, and $3.4 billion to $5 billion in 2023.

At the same time, investing in regional connectivity could cost some power plants over $20 million in annual net revenue—giving them financial incentives to block or delay transmission network improvements.

"I was really struck by how the same parts of the country have seen the biggest jumps in electricity prices. The coasts, especially the Northeast, are the parts of the country that would most benefit from long-distance transmission, according to our model," Hausman said.

She notes that we must look to the past to understand why we have the transmission grid we have.

"It was built up at a time when vertically integrated companies served local demand centers, largely with nearby power plants and fairly short-distance transmission lines," Hausman said. "That's not well-matched to today's world, in which very cheap, very green power is being produced in the middle of the United States, keeping prices and greenhouse gas emissions down. At the same time, prices are spiking on the coasts.

"It would be great to transport more of that wind power to the East Coast, but that will require more long-distance lines, crossing multiple states."

The study gives policymakers a better understanding of why electric companies across the country may be hesitant to embrace regional integration despite associated generation cost reductions. Hausman hopes policymakers can find smart ways to accelerate long-distance transmission build-out to leverage low-cost resources like solar and wind farms.

"Power producers in the Great Lakes and Great Plains states would see significant revenue increases from increased market integration, and those in the Northeast, Southeast and California would see lower revenues," Hausman said. "As analysts and policymakers propose reforms, it will be important to consider the incentives of suppliers and therefore the critical role of grid governance."

Provided by University of Michigan 

 

DIGITAL LIFE


AI videos and video game senes: X flooded with misinformation after US and Israeli attack on Iran

Minutes after US President Donald Trump announced that Americans and Israelis had launched a “major combat operation” against Iran, the social network X was flooded with misleading content about the attacks and Tehran's supposed response.

Old videos repurposed, images attributed to the wrong locations, content generated by artificial intelligence, and even video game scenes circulated as if they showed events in real time. Many of these posts garnered millions of views within hours of the official announcement.

According to a report by WIRED, which analyzed hundreds of posts on the platform, much of the viral content promoted false or distorted claims about the scale and targets of the attacks.

The publication points out that virtually all of the most popular posts were from accounts with a blue checkmark, paying users of the premium service, who can receive remuneration based on the engagement generated.

Among the examples cited is a video that claimed to show ballistic missiles over Dubai, but which actually depicted Iranian strikes against Tel Aviv in October 2024.

Another widely shared clip claimed to show the downing of an Israeli fighter jet by Iran's air defense system, without any official confirmation that Israeli aircraft were shot down on Saturday.

Out-of-context images also circulated to support supposedly successful attacks against Israel. A pro-Iran profile published a photo of Dubai as if it were a missile impact on Tel Aviv. The Tehran Times, a media outlet aligned with the Iranian government, shared what analysts pointed out as an AI-generated image, claiming the complete destruction of an American radar in Qatar, something that has not been confirmed by independent reports.

In another case, a pro-Trump account published images that it said showed the "before and after" of the palace of the Iranian supreme leader, Ali Khamenei. The later image appeared authentic, but the earlier one actually showed the mausoleum of Ruhollah Khomeini, located in another area of ​​Tehran.

The platform did not respond to requests for comment from Wired's report. Under Elon Musk's management, X had already been criticized by experts for moderation failures during major news events. According to the report, although some posts received notes from the community correcting false information, the content remained online, without clarity on how many people were impacted before the corrections.

Record day...The escalation of the conflict in the Middle East caused X to hit a historic engagement record. On February 28, the date on which Israel and the United States launched joint attacks against Iran, the platform recorded the highest level of usage ever recorded since its creation.

The information was released by Elon Musk, owner of X, who posted on the network: "Highest usage of 𝕏 ever".

Nikita Bier, the company's head of product, explained that the date marked "the biggest day in Xbox history in terms of user active seconds," a metric that measures the total number of seconds users were active on the platform.

mundophone 

Monday, March 2, 2026


TECH


Brain-like chips and LIDAR sensors may enable safer human-robot teamwork

Robotics technology that not only performs simple tasks but also supports humans in all their tasks is among the key technologies in industrial manufacturing. But this requires that robots be able to master complex movements, execute commands and maintain a safe distance from humans at all times. Fraunhofer researchers have now made this form of collaboration between humans and machines possible in the NeurOSmart flagship project.

The researchers are combining several technologies: a sensor system with LIDAR lasers that continuously monitors the work area shared by humans and robots; AI-supported chips that evaluate signals directly in the sensor system; and neuromorphic chip technology that functions like the human brain and is therefore highly energy efficient.

In addition to the Fraunhofer Institute for Silicon Technology ISIT, project participants also include the Fraunhofer Institute for Photonic Microsystems IPMS, the Fraunhofer Institute for Microelectronic Circuits and Systems IMS, the Fraunhofer Institute for Machine Tools and Forming Technology IWU and the Fraunhofer Institute for Intelligent Analysis and Information Systems IAIS.

NeurOSmart was coordinated by Fraunhofer ISIT. "Together with our project partners, we have further developed the technologies and integrated them in an overall system. Collaboration with the machine is risk-free for humans," says Shanshan Gu-Stoppel, Head of Optical Systems at Fraunhofer ISIT and honorary professor of microtechnology at the FH Westküste University of Applied Sciences in Heide.

LIDAR laser sensor system...The sensor system monitors the area in which humans and robots move from a bird's eye view. The researchers make use of a LIDAR (light detection and ranging) laser. This type of laser emits short pulses in the near-infrared range and uses the reflections to measure distances in 3D.

Movable MEMS (microelectromechanical systems) mirrors project the laser across the entire work area and generate a high-resolution 3D image. The researchers have succeeded in improving the performance and energy efficiency of the mirrors. "We use piezoelectric aluminum scandium nitride (AlScN) with a layer thickness of only 1 micrometer for the MEMS mirrors," explains Gu-Stoppel.

A key feature of NeurOSmart is the direct integration of data processing into the sensor system. The large amount of image data generated by the sensor's wide field of view is first preprocessed. AI-based algorithms developed by Fraunhofer IMS bundle the incoming signals and identify areas of special interest in the scene. The sensor can then be precisely aligned for subsequent analyses, saving power and reducing the data rate.

With intelligent sensor technology and AI-supported data processing, NeurOSmart technology enables close collaboration between humans and robots. Credit: Fraunhofer IWU

Neuromorphic computing...The next step, comprising actual evaluation of the data that serves as the basis for controlling the robot, is also performed directly in the sensor system. Under the direction of Thomas Kämpfe, Business Unit Head at the Center Nanoelectronic Technologies (CNT), researchers at Fraunhofer IPMS are focusing on the concept of neuromorphic computing. They have developed a special accelerator chip. The processor consists of many small computing units that are interconnected on a wafer in a matrix.

Each chip acts as a thinking cell and makes its own decisions. This technology is based on the way the human brain works—hence the term neuromorphic computing.

Fraunhofer IAIS is developing the highly specialized AI models required for this. Only a few milliseconds elapse between signal reception, evaluation and the mechanical response of the robot arm. This enables safe collaboration even with heavy-duty robots, which the AI slows down or stops when a person comes too close. By simulating the entire robot cell, Fraunhofer IAIS was able to simulate hazardous situations for training purposes that cannot be replicated in real life.

"Neuromorphic computing is a major step towards a hardware architecture for processing resource-intensive AI applications that is not only fast but is also highly energy-efficient," says Kämpfe.

Fraunhofer ISIT researcher Gu-Stoppel adds, "NeurOSmart's technologies not only make industrial production more agile and efficient, they also make the factory floor a safe, creative and human-friendly place for all employees."

Customized applications for industry...The NeurOSmart components and methods form a standardized technology platform. Industrial customers could develop their own applications for their individual scenarios. In the future, NeurOSmart's energy-efficient technologies and the resulting longer battery life could also find applications in drones or sensor systems for agriculture.

Provided by Fraunhofer-Gesellschaft 


DIGITAL LIFE


AirSnitch attack shows hackers can easily intercept encrypted Wi‑Fi traffic

AirSnitch is a newly-revealed attack on Wi-Fi networks that work across all major router brands and firmwares, including DD-WRT and OpenWrt. In an alarming turn for cybersecurity, researchers revealed a form of Wi-Fi attack that can entirely bypass client isolation on Wi-Fi, which is typically the only thing preventing attackers from intercepting data sent from your router to your device. There are caveats we'll discuss, but the sheer applicability of the attack across Wi-Fi providers is staggering, and makes the prospect of relying on public or shared Wi-Fi access points truly nightmarish, particularly for any sensitive data you may be handling on those networks. That warning doesn't just apply for coffee shops or other common access points—schools and universities and even some enterprise networks could be compromised by AirSnitch attacks.

Lead author of the related research paper (AirSnitch: Demystifying and Breaking Client Isolation in Wi-Fi Networks) Xin'an Zhou stated in an interview with Ars Technica that "AirSnitch breaks worldwide Wi-Fi encryption and it might have the potential to enable advanced attacks. Advanced attacks can build on our primitives to [perform] cookie stealing, DNS and cache poisoning. Our research physically wiretaps the wire altogether so these sophisticated attacks will work. It's really a threat to worldwide network security." He elaborated later that while some router manufacturers have already released mitigation updates and that more are expected to come, a few manufacturers have stated that "some weaknesses can only be addressed through changes in the underlying chips they buy from silicon makers." The lack of standardization in client isolation methods across manufacturers also throws a wrench into defending against AirSnitch, since solutions may end up being vendor-specific.

It's not all doom and gloom, thankfully. Co-author of the research paper Mathy Vanhoef also stated that AirSnitch is better described as an encryption bypass "in the sense that we can bypass client isolation. We don't break Wi-Fi authentication or encryption. Crypto is often bypassed instead of broken, and we bypass it. People who don't rely on client or network isolation are safe."

That last bit is the most important piece of information for most readers despite not being stated in the original paper and only mentioned after the Ars Technica piece's initial publication. Are you running a Wi-Fi access point with a dedicated Guest network? If so, it's essential that separate SSIDs are on separate VLANs if you want to protect your network from these attacks. If such options aren't available to you, you may be vulnerable until appropriate firmware patches are released or new router releases fix the underlying isolation vulnerabilities entirely.

A number of enterprise networks already separate SSIDs into their own VLANs, so the vulnerability there is less severe. But for networks with less-secured Guest access, especially public Wi-Fi networks, the danger is greatly increased. It's particularly problematic for those who use ISP-provided routers from providers like Comcast, whose Xfinity routers double as Guest access points for other Xfinity customers within range. As always, a fully-private network access point is best to protect yourself from attackers—though other, more commonplace attacks like "evil twin" attacks are still a concern.

AirSnitch bypasses the so-called "client isolation," a feature offered by router manufacturers to prevent devices connected to the same access point from communicating directly with each other. The method works even when encryption is enabled.

This opens the possibility of a bidirectional "man-in-the-middle" attack, in which the attacker can intercept and modify the victim's traffic. In practice, this can enable the theft of cookies, passwords, and credit card data, as well as DNS poisoning.

In tests, 11 devices from manufacturers such as Netgear, D-Link, TP-Link, ASUS, Ubiquiti, and Cisco showed vulnerability to at least one variation of AirSnitch. Some of the flaws can be mitigated through firmware updates, but some manufacturers reported that certain vulnerabilities can only be corrected by modifying the hardware of the chips used.

Despite its severity, AirSnitch requires the attacker to already have some type of access to the Wi-Fi network or associated infrastructure, which raises the practical barrier to exploitation.

Tested models(below):

Netgear Nighthawk x6 R8000

Tenda RX2 Pro

D-LINK DIR-3040

TP-LINK Archer AXE75

ASUS RT-AX57

DD-WRT v3.0-r44715

OpenWrt 24.10

Ubiquiti AmpliFi Alien Router

Ubiquiti AmpliFi HD Router

LANCOM LX-6500

Cisco Catalyst 9130


by mundophone

Sunday, March 1, 2026


TECH


Google brings quantum-hardened HTTPS to Chrome in major security upgrade

Traditional cryptographic signatures that underpin HTTPS can be broken by a sufficiently powerful quantum computer using algorithms like Shor's, threatening the trust model of secure connections. To help protect against this threat, Google is rolling out a major upgrade to Secure HTTP in its Chrome browser. In a blog post published yesterday, the Chrome Secure Web and Networking Team outlined a new program to make TLS certificates resistant to future quantum attacks without imposing significant performance penalties on the web ecosystem.

The central innovation in Google's approach is the adoption of Merkle Tree Certificates (MTCs), a structure that replaces the long chain of signatures found in classic X.509 certificates with compact proofs that a given certificate is included in a public Merkle tree. Under this model, a Certification Authority signs a single "Tree Head" representing "potentially millions of certificates," and the browser verifies inclusion using a lightweight proof rather than downloading bulky cryptographic material. This cuts down the data sent during a TLS handshake while maintaining verifiable trust.

Post-quantum cryptographic algorithms such as ML-DSA (and others standardized by NIST, the National Institute of Standards and Technology) generate signatures and keys that are orders of magnitude larger than classical equivalents. Embedding these larger primitives directly in every HTTPS certificate would balloon certificate sizes from the current ~64-byte footprint to multiple kilobytes, drastically slowing connections and increasing bandwidth use. Merkle Tree proofs sidestep this by decoupling the size of strong cryptography from in-flight handshake data, keeping performance closer to today's web.

Google has already integrated preliminary MTC support into Chrome and is conducting feasibility studies with partners such as Cloudflare in a phased rollout. In the first phase, MTC-enabled connections are backed by traditional certificates to ensure a safe fallback while measuring real-world performance and reliability. The plan calls for broader bootstrapping with Certificate Transparency log operators and the eventual establishment of a Chrome Quantum-resistant Root Store alongside the existing root program by 2027.

This effort is part of a broader industry push to harden internet security ahead of quantum computing's maturation, with groups like the IETF's PKI, Logs, And Tree Signatures (PLANTS) working on standards for these new certificate paradigms. By investing early in scalable quantum-safe TLS mechanisms, Google aims to future-proof critical web trust infrastructure without fracturing compatibility or degrading performance. If only every development team were so dedicated.

Why MTCs? MTCs enable the adoption of robust post-quantum algorithms without incurring the massive bandwidth penalty of classical X.509 certificate chains. They also decouple the security strength of the corresponding cryptographic algorithm from the size of the data transmitted to the user. By shrinking the authentication data in a TLS handshake to the absolute minimum, MTCs aim to keep the post-quantum web as fast and seamless as today’s internet, maintaining high performance even as we adopt stronger security. Finally, with MTCs, transparency is a fundamental property of issuance: it is impossible to issue a certificate without including it in a public tree. This means the security properties of today’s CT ecosystem are included by default, and without adding extra overhead to the TLS handshake as CT does today.

Chrome’s MTC Propagation Plan...Chrome is already experimenting with MTCs with real internet traffic, and we intend to gradually build out our deployment such that MTCs provide a robust quantum-resistant HTTPS available for use throughout the internet.

Broadly speaking, our rollout spans three distinct phases:

Phase 1 (UNDERWAY): In collaboration with Cloudflare, we are conducting a feasibility study to evaluate the performance and security of TLS connections relying on MTCs. To ensure a seamless and secure experience for Chrome users who might encounter an MTC, every MTC-based connection is backed by a traditional, trusted X.509 certificate during this experiment. This "fail safe" allows us to measure real-world performance gains and verify the reliability of MTC issuance without risking the security or stability of the user's connection.

Phase 2 (Q1 2027): Once the core technology is validated, we intend to invite CT Log operators with at least one “usable” log in Chrome before February 1, 2026 to participate in the initial bootstrapping of public MTCs. These organizations have already demonstrated the operational excellence and high-availability infrastructure required to run global security services that underpin TLS connections in Chrome. Since MTC technology shares significant architectural similarities with CT, these operators are uniquely qualified to ensure MTCs are able to get off the ground quickly and successfully.

Phase 3 (Q3 2027): Early in Phase 2, we will finalize the requirements for onboarding additional CAs into the new Chrome Quantum-resistant Root Store (CQRS) and corresponding Root Program that only supports MTCs. This will establish a modern, purpose-built trust store specifically designed for the requirements of a post-quantum web. The Chrome Quantum-resistant Root Program will operate alongside our existing Chrome Root Program to ensure a risk-managed transition that maintains the highest levels of security for all users. This phase will also introduce the ability for sites to opt in to downgrade protections, ensuring that sites that only wish to use quantum-resistant certificates can do so.

This area is evolving rapidly. As these phases progress, we will continue our active participation in standards bodies such as the IETF and C2SP, ensuring that insights gathered from our efforts flow back towards standards, and that changes in standards are supported by Chrome and the CQRS.

https://security.googleblog.com/2026/02/cultivating-robust-and-efficient.html

mundophone


DOSSIER


DIGITAL LIFE


Google hosts illegal casino app in Brazil

Google hosts apps in its online stores that, under the guise of purely entertainment-focused online games, conceal illegal online casinos and platforms that border on illegality, either by offering withdrawals in points convertible into physical products and services or even cryptocurrencies.

After being contacted by Radar Big Tech, the company removed one of the apps that, without authorization, promoted betting with real money and had already been downloaded more than 500,000 times.

Other apps operate as social games of online casinos, but players report that the games force them to pay to play. And, despite officially not allowing withdrawals of the amounts, they create or promote parallel systems that convert virtual chips into real money, say experts in the field.

The situation represents a behind-the-scenes battle between big tech companies, regulators, and legalized betting houses. An executive in the sector described the actions of large technology companies as "a slap in the face to those who want to do the right thing."

"When we identify apps that violate our policies or are not authorized by Brazilian law, we act by removing them from the store. Any user can report violations through our official channels," says Google.

Since June 2025, Google has allowed legalized betting apps in its store, while Apple still bans these platforms. In addition to these services, Radar Big Tech located at least 162 apps that emulate online casinos on Google Play and another 15 on the App Store. They are not illegal, since:

Not all are classified as fixed-odds betting sites or online casinos. Most operate as "social casinos," that is, games that emulate casino games, such as roulette and slot machines. Within them, what is wagered and received as a reward are virtual coins, which cannot be converted into any financial value or product in the real world. Another characteristic of these platforms is that they do not require the player to buy these virtual coins with real money to continue playing.

This characterizes these games as "sweeptakes," which, broadly speaking, are prizes given to consumers at random and without charging an entry fee to win or participate.

In the US, "sweeptake casinos" have become the alternative for those who want to gamble online but live in states that prohibit online casinos.

There, there is even a law for sweeptakes, which obliges these platforms to allow some form of free play -- they can even charge for additional coins, but they must supply players with free chips. Some states also require a dual currency exchange system. With this, players bet with one type of virtual currency, but receive another type of chip, made available in special packages and which can be exchanged for money when a certain amount is reached by the platform.

In Brazil, there is no formal definition. But a 2024 presidential decree that reorganized the portfolio subordinated "sweeptakes" to the SPA (Secretariat of Prizes and Bets) of the Ministry of Finance, but there is no legal obligation to register with the ministry.

"Tiger Drop," however, had nothing to do with "sweeptaking" and explicitly offered conversion of prizes into cash, which characterizes it as an online casino. This was the app removed by Google. In Brazil, online casinos or betting houses need authorization from the SPA, through payment of a grant and compliance with a series of rules - legalized sites have ".bet.br" in the website address.

Other services, detected only on Google Play, are "social casinos" that adopt creative ways of making winnings tangible within their platforms. "Big Time - Ganhei dinheiro" exchanges virtual chips for cryptocurrencies, such as Iota and Solana, while "Hard Rock Jackpot Planet" exchanges them for virtual points on its own platform that can be converted into products.

Many of these "social casinos" state that they do not allow betting with real money, but sell virtual currency for the player to continue betting. Purchases of items start at R$ 2.49 and can go up to R$ 5,200. This dynamic leads bettors to believe that, in return, they will be able to withdraw the virtual coins they have received.

"We earn in-game virtual coins that initially suggest we can convert them into money, but that's a lie. There's no withdrawal option; the developers make money from downloads. This app is deceptive, and we fell for it"... said Adrian Botelho, in a comment on Google Play about the game "Lucky Spin Slot: slot machines"

Another common complaint is that the free coins run out quickly, and it's only possible to continue playing if there's a payment. Many games are in English, but when buying coins, the language changes to Portuguese. This is the case with "Xtreme Slots Vegas Casino Game".

There are also those who buy credits, have the money debited, but don't receive the virtual coins, as in "HighRoller Vegas: Casino Slots". "Tigrinho 777" allows donations between players, which opens the door for transactions outside the platform.

Other games like "Huuuge Casino Slots Vegas 777" adopt a curious tactic to attract users: players reach them through services like Cointiply and Cashzine, which promise remuneration in exchange for performing certain tasks in the digital world.

In the case of the game, it's about reaching high levels, which, users say, doesn't happen without buying virtual currency with real money.

According to Fábio Augusto Macorin, Undersecretary of Monitoring and Inspection at SPA, illegal bets pose risks to bettors due to fraud (difficulty in withdrawing prizes, biased algorithms), insecurity (lack of access control and management of personal data), and lack of customer service. (In the case of legal bets, it's even possible to complain to consumidor.gov.)

Add to this the open access for minors, since many applications identified by Radar Big Tech had a "free" rating and no age check for players.

According to research by the Locomotiva Institute from June 2025, 8 out of 10 players report difficulty distinguishing between legalized and illegal platforms. Three-quarters of bettors reported having played on irregular betting sites or casinos – the proportion is higher among young people and those who are part of families with an income of up to two minimum wages.

He states regarding Google and Apple that "a priori, they are also responsible in relation to these applications." According to the Betting Law (14.790/2023), it is the duty of digital platforms not to offer illegal games. "The illegal exploitation of gambling is a criminal offense. It is not exactly a crime, but, depending on its repercussions, it can lead to crimes such as money laundering and gang formation."

According to Macorin, SPA operates on four fronts to combat illegal online betting and gambling, such as cyber (detection and blocking of illegal activities, an action that has already resulted in 25,000 suspensions), financial (Brazilian banks are instructed to open accounts only for legalized betting), advertising (removal of advertising for irregular services), and regulatory (improvement of standards).

Of these lines of action, two involve big tech companies directly. This is evidenced by cooperation agreements with CONAR (National Council for Advertising Self-Regulation) for advertisements and promotions, and with the Digital Council, an association that represents the interests of Discord, Google, Kwai, Meta, OpenAI, and TikTok.

Representatives of legal betting companies criticize the actions of big tech companies behind the scenes, saying they are slow to remove illegal betting and advertising from the air. "We want to – and believe we should – pay taxes. Then Apple or Android comes along and puts an illegal betting app in the store. Damn…it's a slap in the face to anyone who wants to do the right thing," said an executive from a legal betting company, speaking on condition of anonymity. There are even insinuations that they profit from illegal betting…

Illegal betting is no small problem. According to LCA's calculations, the illegal market accounts for a share ranging from 41% to 51% of the entire betting sector in Brazil. This represents an annual revenue of R$ 26 billion to R$ 40 billion, which means that the amount of R$ 7.2 billion to R$ 10.8 billion that does not go to public coffers is lost.

For Leonardo Benites, communications director of ANJL (National Association of Games and Lotteries), much of what is done to curb the operation of illegal betting is "a futile effort."

"No regulation will have the speed of creativity or technology of the illegal. You need to starve it out. How? Payment methods and marketing. Because if they don't make money and can't transfer that money, the operation isn't worth it." It becomes an internal executive decision for him instead of a fight''…said Leonardo Benites, from ANJL

Besides that, there are gray areas in which various platforms operate. This is the case with "sweepstakes casinos". Google itself changed its internal rules at the end of last year to frame these games with the same rigor applied to online casinos and bets. Even so, it left room for platforms to be classified only as "social casinos".

For Benites, there is not much doubt. "The 'social casino' is nothing more than the 'sweepstakes' and falls under the same regulations that we have, which makes these applications illegal, yes. However, the platforms still don't understand this very well."


Reporter: Helton Simões Gomes (columnist for the digital magazine Tilt, Brazil)

TECH Apple MacBook Neo: Wi-Fi 7, MagSafe charging, two USB-C ports and A18 Pro hardware base Apple has been unstoppable with product announc...