Day: November 2, 2024

Apple @ Work: Fresh FIDO Standards Aim to Remove Passkey Vendor Lock-In

# Improving Passkey Usability: New Standards from the FIDO Alliance

In the constantly changing realm of digital security, conventional passwords are becoming progressively susceptible to breaches and phishing schemes. In response to these threats, passkeys have surfaced as a more secure and user-centric solution. Nevertheless, the existing use of passkeys has encountered criticism due to vendor lock-in, complicating users’ ability to transition between platforms. To counter this problem, the FIDO Alliance has unveiled two new draft specifications: the Credential Exchange Protocol (CXP) and the Credential Exchange Format (CXF). These initiatives are intended to improve the usability of passkeys, especially within organizational contexts.

## Comprehending Passkeys

Passkeys employ cryptographic techniques like Face ID and Touch ID for user authentication, thereby eliminating the necessity for conventional passwords. This novel method not only bolsters security by rendering passkeys resistant to phishing but also streamlines the user experience. However, the present condition of passkey technology presents a notable limitation: users are frequently confined to particular platforms or password managers. Switching from one service to another usually requires users to erase their passkeys from the previous platform and manually reconfigure them on the new one, which can be laborious and time-consuming.

## The Significance of CXP and CXF

The recently proposed CXP and CXF specifications are formulated to address the issues linked to passkey portability.

– **Credential Exchange Protocol (CXP)**: This protocol enables the secure transfer of credentials among various password managers. It permits users to migrate their passkeys without jeopardizing security or involving tedious manual procedures.

– **Credential Exchange Format (CXF)**: This format guarantees that passkeys are readable and operable across different services, fostering interoperability among diverse platforms.

Collectively, these specifications strive to establish a seamless experience for users wishing to switch between password managers, thereby minimizing the friction currently involved with passkey management.

## Collaboration in the Industry

Leading firms in the password management sector, including Dashlane and 1Password, have already started working with the FIDO Alliance to implement these new standards. This collaboration is vital for promoting the widespread use of passkeys by making them more user-friendly and widely accessible. By standardizing the management and transfer of passkeys, the FIDO Alliance’s specifications will enable businesses and consumers to select the best tools for their requirements without being confined to a single ecosystem.

## Effects on Businesses and Consumers

The launch of CXP and CXF is anticipated to have significant implications for both businesses and consumers. By streamlining the process of migrating passkeys, these specifications will motivate more organizations to embrace passkeys as a secure authentication method. This transition will ultimately contribute to a wider departure from traditional passwords, which have long been viewed as the weakest aspect of security protocols.

## Final Thoughts

Although passkeys signify a notable progress in authentication security, the obstacle of vendor lock-in has impeded their widespread adoption. The FIDO Alliance’s introduction of the Credential Exchange Protocol and Credential Exchange Format signifies a crucial advancement in enhancing the usability of passkeys. By allowing seamless transitions between platforms, these specifications aim to render passkeys more accessible and user-friendly, paving the way for a future where passwords become obsolete. As both organizations and consumers embrace this change, the landscape of digital security is destined to become more resilient and secure.

Read More
Fungi Do Not Have Cognitive Skills Yet Have the Ability to Communicate

# Fungi Develop Unique Networks Based on the Arrangement of Food Sources

Fungi are remarkable life forms that often function in ways that appear almost surreal. Although mushrooms or other visible entities may emerge above ground, the true activity transpires beneath it. Here, a sophisticated network of filaments known as hyphae composes the mycelium, an extensive, interlinked system that enables fungi to grow, obtain nutrients, and even interact. Even without a brain, fungi can process environmental information and adjust their behavior accordingly.

Recent findings from Tohoku University and Nagaoka College in Japan have illuminated how fungi react to various configurations of food sources. The study particularly examined the mycelial network of *Phanerochaete velutina*, a fungus that consumes decaying wood. The researchers found that the manner in which mycelium spreads and decomposes wood is influenced by the arrangement of the food sources (specifically, wood blocks). This implies that fungi might possess a form of communication, enabling them to “detect” where the richest nutrients lie and grow strategically in those regions.

## The Experiment: Investigating Fungal Networks

To examine how *P. velutina* reacts to different food source layouts, the researchers incubated wood blocks with the fungus, positioning them in moist soil. The blocks were organized in two different configurations: a circle and an X. Over a span of 116 days, the researchers monitored the mycelium’s growth and the extent of wood decay.

The findings were captivating. Initially, the mycelium extended outward from each block in both configurations, but distinctions surfaced over time. In the circular setup, the mycelium spread relatively uniformly, and the decay activity remained consistent across all blocks. Conversely, in the X arrangement, the outer blocks demonstrated more decay and stronger hyphal connections compared to the inner blocks. This implies that the fungus was favoring certain areas for growth and nutrient uptake.

## Communication via Mycelium

The researchers propose that this behavior signifies a form of communication within the fungal network. Prior investigations have indicated that electrical signals can be conveyed through hyphae, much like neurons operate in a brain. These signals may facilitate the fungus in processing environmental information and determining where to extend growth. In the scenario of the X formation, the outer blocks possibly acted as “outposts” for foraging and nutrient absorption, which were then communicated throughout the mycelium.

This capacity to adjust to various food source arrangements suggests that fungi possess the ability for a form of basic cognition, or fundamental information processing. Although fungi lack brains, their mycelial networks can operate similarly to neural networks in more complex life forms. This provokes intriguing inquiries about how fungi “think” and make choices regarding their growth and resource allocation.

## Acropetal Growth and Nutrient Focus

A primary outcome of the study was that fungal mycelium undergoes acropetal growth, meaning it extends outward from a central point in all directions. Nonetheless, this growth pattern can shift depending on the nutrient availability. In the X configuration, the fungus appeared to prioritize growth towards the outer blocks, despite nutrients being evenly spread throughout the soil and wood blocks. This indicates that the fungus may have identified areas with slightly elevated nutrient concentrations and steered its growth accordingly.

The researchers speculate that the fungus was relaying information across its mycelial network through electrical signals, allowing it to “detect” where the most nutrients were located and grow in those zones. This flexibility in responding to varying environmental conditions contributes to the success of fungi across diverse ecosystems.

## Implications for Fungal Cognition

The notion that fungi might possess a form of cognition is truly intriguing. Although fungi lack brains or nervous systems, their mycelial networks exhibit the capability to process information and adapt to their environments in a way that mirrors brain functions. This raises the potential that fungi have developed a kind of decentralized intelligence, enabling them to survive and prosper in intricate ecosystems.

However, it’s crucial to recognize that fungi do not “think” as humans or other animals do. Their behaviors are governed by chemical and electrical signals rather than conscious deliberation. Nevertheless, the capacity of fungi to process information and adjust to their surroundings showcases a striking example of how life can evolve complex behaviors in the absence of a brain.

## Conclusion: The Hidden Intelligence of Fungi

The investigation of *Phanerochaete velutina* and its reaction to varied food source configurations offers a window into the concealed intelligence of fungi. Although they may lack brains, fungi are capable of processing environmental information and modifying their behavior as needed. This proficiency to communicate and prioritize growth based on nutrient availability implies that fungi have evolved a form of decentralized intelligence, enabling them to thrive in a variety of environments.

As scientific inquiry into fungi progresses, we may discover even more about how these enigmatic life forms operate.

Read More
US Space Force Warns of Swift Growth in Chinese Space Abilities

### The Escalating Menace of Space Conflict: Advancements in Space Militarization by Russia and China

In recent times, the militarization of outer space has emerged as a critical issue for international security, with Russia and China positioning themselves as dominant forces in this struggle for control over the cosmos. U.S. Space Force Chief General B. Chance Saltzman has voiced concerns regarding the swift development of military capabilities in space, particularly highlighting China’s rapid progress. Together with Russia’s own enhancements, this has markedly elevated the danger of conflict in orbit—a realm previously viewed as serene and untouched by warfare.

#### China’s Swift Space Militarization

During a European tour aimed at heightening awareness of potential conflicts in space, General Saltzman characterized China’s advancement in space weaponry as “astounding.” He pointed out that both the speed and diversity of the space weapons developed by China are particularly alarming. “The sheer variety of space weapon types that

Read More
“Dystopika: An Aesthetically Pleasing Cyberpunk City Builder with Breathtaking Visuals”

**Dystopika: An Eerie, Futuristic City Creator That Empowers You to Design Your Own Cyberpunk Horizon**

In the realm of city-building games, management, resource distribution, and strategic oversight are typically at the forefront. But what if a game eliminated all that complexity and presented you with a single goal: to construct visually captivating skylines in a shadowy, dystopian metropolis? Introducing *Dystopika*, an innovative city creator that adopts a streamlined approach to gameplay, enabling players to concentrate exclusively on creativity and visual appeal.

### A Stress-Free City Creator

*Dystopika* (accessible on Steam for Windows) revolutionizes the city-building genre. Crafted by indie developer Matt Marshall, the game is characterized by its motto of “No goals, no management, just creativity and dark cozy vibes.” This straightforward yet compelling concept distinguishes it from conventional city-building games that often overwhelm players with economic oversight, resource limitations, and citizen contentment.

Within *Dystopika*, there are no inhabitants to oversee, no financial plans to manage, and no crises to prevent. Instead, the game offers a sandbox realm where your sole mission is to construct a visually striking urban landscape. The game’s cyberpunk theme, adorned with neon illumination, soaring skyscrapers, and advanced vehicles, sets an ideal stage for players to unleash their design flair.

### The Interface: Engaging Yet Simplistic

The user interface is refreshingly uncomplicated. A compact toolbar located on the left side of the screen allows you to choose “Building,” which assigns a random shape to your cursor. You can right-click to modify the shape, but specific building selection is not an option. Once placed, you can alter the height of the structure by hovering your cursor at the top. Notably, elevating one building will lead to nearby smaller ones rising as well, creating a lively skyline that transforms as you construct.

As you advance, specific actions—whether it’s achieving certain heights, densities, or other unspecified conditions—unlock new buildings, landmarks, and decoratives. However, the game doesn’t explicitly outline how to access these items, encouraging you to uncover them naturally during gameplay.

### Props and Personalization

In addition to the primary structures, *Dystopika* provides a range of “Props” for you to distribute across your city. These include roads, trams, billboards, holograms, and even aerial parking structures. Just like the buildings, the game does not impose restrictions on how you utilize these props. You’re free to position, remove, expand, and connect them as you wish. This unrestricted approach fosters experimentation and innovation, allowing players to design a city that embodies their unique vision.

### A Visual Extravaganza

A notable highlight of *Dystopika* is its dedication to visual intricacy. The game features a comprehensive photo mode, offering an array of sliders that enable you to tweak various visual effects, such as lens dirt, glare, fog, and aerial traffic. You can even introduce distant mountains to your skyline, enhancing the dystopian ambiance. The photo mode allows for high-resolution image exports (up to 4K), making it simple to capture and share your creations.

The game’s dark, cyberpunk style is accompanied by an atmospheric synth soundtrack, further enriching the immersive experience. Whether you’re actively engaged in building or simply letting the game play in the background, the music and visuals cultivate a soothing, nearly meditative atmosphere.

### A Comfortable Dystopia

While “comfortable” might not be the first term associated with bleak city landscapes, *Dystopika* successfully crafts a cozy experience in its unique manner. The absence of pressure to fulfill objectives or manage resources permits players to enjoy the game at their own pace. There’s no urgency to complete tasks or optimize your city’s arrangement. Instead, you can leisurely explore various designs and relish the construction process.

This relaxed style makes *Dystopika* ideal for those looking to unwind and unleash their creativity. You can devote hours refining your city’s skyline, adding new props, and fine-tuning the lighting to establish an ideal cyberpunk vibe.

### A Game in Development

Although *Dystopika* is not classified as an Early Access title, it is constantly advancing. Developer Matt Marshall provides regular updates and roadmaps, alongside an active player community that shares their creations and proposes new features on the game’s

Read More
“Samsung Teases Significant Innovations for 2025, Upgrades to Google Maps, Integration of ChatGPT in Search, and Additional Important Updates”

# A Summary of the Most Noteworthy Google/Android-Related News from This Week

Welcome to **Android Central’s Weekly News**, your ultimate destination for updates on the key happenings in the Google and Android realm. This week has been filled with thrilling announcements, ranging from Samsung’s upcoming plans to enhancements in Google Maps, along with OpenAI’s latest initiatives, and much more. Let’s explore the major stories that influenced the tech scene this week.

## Samsung’s Vision for 2025: Affordable Foldables and XR Glasses?

Samsung’s earnings report for Q3 2024 provided insight into the company’s aspirations for 2025, promising an exciting year ahead. The tech behemoth confirmed that the **Galaxy S25** will be launched in early 2025, likely in January, consistent with past release patterns. But that’s just the beginning—Samsung also teased a **more affordable foldable** device, which could revolutionize the foldable market by making it more attainable for a wider audience. This represents a notable change, as Samsung had previously rejected the notion of a budget-friendly foldable model.

Beyond smartphones, Samsung hinted at its goals in the **XR (Extended Reality) sector**, with intentions to incorporate its **Samsung Health** platform into upcoming XR devices. Is it possible we’ll see **Samsung Glasses** or the much-awaited **Galaxy Ring** soon? Only time will reveal, but 2025 is expected to be a remarkable year for Samsung.

[Discover more about Samsung’s 2025 vision here](https://www.androidcentral.com/phones/samsung-confirms-galaxy-s25-teases-cheaper-foldable-xr-device-2025).

## Google Maps to Feature Enhancements You’ll Appreciate

Google Maps is set to enhance its navigation capabilities. An upcoming update scheduled for this month will simplify identifying the correct lane to be in, featuring a **zoomed-in view** during navigation. This enhancement will initially roll out in 30 cities across the U.S., with plans for broader availability on other platforms, like **Android Auto** and **Carplay**.

But that’s not everything—Google’s **Gemini AI** is being incorporated into Maps, providing users with recommendations for activities and locations based on reviews and overviews. Additional updates consist of improved parking guidance, expanded user reporting, and more. These upgrades will be launched through November, making Google Maps an even more essential tool for travelers and commuters alike.

[Find out more about the Google Maps improvements here](https://www.androidcentral.com/apps-software/game-changing-google-maps-enhanced-navigation-update-arrives-next-month).

## ChatGPT Ventures into Google’s Domain

OpenAI is elevating its offerings with the launch of **ChatGPT Search**, enabling users to explore the web directly via the ChatGPT interface. This advancement positions OpenAI as a direct rival to Google Search, a market that Google has ruled for years. ChatGPT Search will sift through the web for relevant information and present it in a user-friendly format, complete with clickable references.

Initially, this feature will be offered to **ChatGPT Plus**, **Team users**, and those in the **SearchGPT waitlist**, with plans for a broader rollout to all users later on. This innovation could dramatically reshape our interaction with search engines by introducing a conversational approach to traditional web searches.

[Learn more about ChatGPT’s new search capability here](https://www.androidcentral.com/apps-software/openai-chatgpt-search-feature-rollout).

## OnePlus 13: A Strong Contender in the Smartphone Arena

The **OnePlus 13** has officially debuted in China, and it’s already capturing attention. The device features a **6.8-inch 2K OLED display** with a 120Hz refresh rate and a remarkable **4500 nit peak brightness**. The camera suite consists of three 50MP sensors, addressing ultrawide and telephoto requirements.

Fueled by **Qualcomm’s Snapdragon 8 Elite** and with up to 24GB of RAM, the OnePlus 13 is prepared for the AI-driven age. It also incorporates a substantial **6,000mAh battery** with 100W wired charging and 50W wireless charging. While the phone is currently exclusive to China, a global launch is anticipated soon, and it appears to be a formidable player in the flagship market.

Read More
iPod Fans Circumvent Apple’s DRM to Rescue 54 Classic Clickwheel Games from Becoming Obsolete

# Safeguarding iPod Clickwheel Games: A Virtual Machine Approach

In the early to mid-2000s, prior to the iPhone transforming mobile gaming, Apple dabbled in gaming on its iPod devices. These games, tailor-made for the iPod’s distinctive clickwheel interface, marked a special era in Apple’s exploration of the gaming landscape. However, as time progressed, accessibility to these games diminished, with Apple halting support and removing them from the iTunes store. Currently, a passionate community of fans is dedicated to preserving these games, ensuring their playability for future audiences. Thanks to a novel workaround utilizing Virtual Machines, many of these games, previously hard to reach, are being restored.

## The Ascent and Decline of iPod Clickwheel Games

From 2006 to 2009, Apple collaborated with prominent gaming companies such as Sega, Square Enix, and Electronic Arts to launch 54 unique games for the iPod. Priced at $7.49 each, these titles utilized the iPod’s clickwheel, a circular touch-sensitive control that enabled users to navigate menus and make selections. Although the games never reached widespread popularity, they were a significant part of Apple’s initial ventures into gaming.

However, by 2011, the emergence of iOS gaming on the iPhone and iPad rendered these clickwheel games outdated. Apple removed them from the iTunes store, and by 2014, the classic iPod line was completely phased out. With these titles no longer available for purchase or download, they became a type of “lost media” — accessible only to a handful of individuals who had backed up their original files.

## The DRM Conundrum

The main hurdle in preserving iPod clickwheel games is Apple’s Fairplay DRM (Digital Rights Management). This DRM not only linked the games to specific iTunes accounts but also to the hardware identifiers of the computers used to synchronize them. Consequently, even if someone had backed up the game files, they could only sync to an iPod if the original iTunes account and hardware were still on hand.

For years, this DRM effectively confined the games, making it impossible for new users to access them. While a limited selection of games was patched to function on certain iPod Video devices with modified firmware, the majority remained unplayable for most classic iPod users.

## A Virtual Approach Materializes

In recent times, a solution has surfaced that enables iPod owners to sync these games to their devices through a Virtual Machine (VM). The procedure entails re-authorizing iTunes accounts via Apple’s servers, facilitating multiple users to sync their games to a communal iTunes installation. This “master library” can then distribute the games to several iPods without requiring additional authorization from Apple.

A significant contributor to this preservation initiative is Reddit user Olsro, who initiated the

Read More
MediaTek’s Dimensity 9400 Surfaces as Top Rival to Qualcomm

# MediaTek is Gradually Making Headway in the Premium Segment

For several years, MediaTek has excelled in the budget and mid-range smartphone categories, yet it struggled to penetrate the high-end market typically dominated by Qualcomm’s Snapdragon 8 series. However, recent progress suggests that MediaTek is now making noteworthy advancements in the premium smartphone sector, challenging Qualcomm’s supremacy and establishing a presence in this profitable segment.

## A Change in the Landscape

Up until just a few years ago, the high-end Android smartphone arena was almost entirely driven by Qualcomm’s Snapdragon 8 series. Qualcomm maintained a stronghold on flagship devices, with the majority of manufacturers opting for its chipsets due to their established performance and reliability. In contrast, MediaTek was mainly recognized for its budget-friendly chipsets that powered economical and mid-range smartphones.

Nevertheless, this landscape is gradually shifting. MediaTek has executed a series of strategic initiatives, including the launch of its Dimensity 9200 and 9300 chipsets, which have enabled the company to attain significant design victories in the premium segment. These chipsets have garnered positive reception, providing MediaTek with a crucial advantage in the high-end market.

### Dimensity 9200 and 9300: A Revolutionary Shift

The Dimensity 9200 and 9300 chipsets have played a critical role in MediaTek’s advancement into the high-end market. These chipsets are able to directly compete with Qualcomm’s Snapdragon 8 series, showcasing similar performance and efficiency. Even more notably, MediaTek has surpassed Qualcomm in various significant aspects, achieving design victories with leading smartphone manufacturers.

A key factor behind MediaTek’s success is its emphasis on performance cores. While Qualcomm has only recently integrated performance cores throughout its Snapdragon 8 Elite platform, MediaTek has been implementing them for over a year. Both the Dimensity 9300/9300+ and the forthcoming Dimensity 9400 are fully powered by performance cores, granting MediaTek-equipped devices an advantage in multi-core performance.

### Performance Results: A Robust Challenger

In practical evaluations, devices driven by MediaTek’s Dimensity 9300/9300+ chipsets, such as the **Vivo X100 Pro** and **Xiaomi 14T Pro**, have achieved some of the highest scores in Geekbench’s multi-core assessments. While these devices may not yet rival the performance of Apple’s A18 Pro chip found in the **iPhone 16 Pro Max**, they outperform the majority of Android devices, including those equipped with Qualcomm’s Snapdragon 8 series.

This performance enhancement has enabled MediaTek to establish itself as a credible alternative to Qualcomm in the high-end segment. The ability of MediaTek’s chipsets to compete with Qualcomm’s flagship offerings serves as a clear indication of the company’s advancements in this domain.

## Samsung’s Endorsement: A Significant Achievement

One of the most substantial endorsements of MediaTek’s endeavors in the high-end segment stems from Samsung. The South Korean technology leader has opted to exclusively utilize the Dimensity 9300+ chipset in its **Galaxy Tab S10** series tablets worldwide. While Samsung’s high-end tablets don’t achieve the same sales volume as its flagship **Galaxy S24** series smartphones, the decision to adopt MediaTek hardware across all regions, including North America, reflects considerable confidence.

This decision by Samsung illustrates that MediaTek’s chipsets are now perceived as reliable and robust enough for deployment in premium devices, even in markets where Qualcomm has historically dominated.

## The Dimensity 9400: MediaTek’s Flagship Competitor

Looking forward, MediaTek’s upcoming **Dimensity 9400** chipset is poised to compete directly with Qualcomm’s **Snapdragon 8 Elite**. The Dimensity 9400 includes the latest **Cortex X925** core along with **Cortex X4** and **A720** cores, indicating potential for enhanced performance and efficiency.

The Dimensity 9400 will drive flagship devices from prominent manufacturers like **OPPO** and **Vivo**, such as the **OPPO Find X8** and **Vivo X200** series. Although these devices may not yet have a strong footprint in Western markets, they are anticipated to achieve substantial sales in China and other areas. OPPO and Vivo are also gaining traction in the premium segment in countries such as India, further broadening MediaTek’s influence in the high-end market.

## Customizability: A Notable Advantage

One of the motivations behind some manufacturers opting for MediaTek over Qualcomm lies in the level of customizability that MediaTek provides. Industry insiders reveal that MediaTek enables smartphone makers to customize its Dimensity platform according to their unique requirements. This adaptability has attracted brands like **OnePlus**, which has successfully utilized MediaTek’s chipsets in its mid-range products.

Read More
“Researcher Creates Robotic Duplicate to Present Lectures and Answer Audience Inquiries”

# A Scientist Created a Robot Doppelgänger to Deliver Lectures and Respond to Audience Inquiries

In the rapidly advancing field of robotics and artificial intelligence, one scientist has made a significant leap toward enhancing human-robot interaction. Hiroshi Ishiguro, a renowned Japanese roboticist celebrated for his creation of lifelike androids, has developed a series of robot doubles, termed “Geminoids,” that are modeled after himself. His latest innovation, the **Geminoid HI-6**, is capable of delivering lectures and responding to audience inquiries, positioning it as one of the most sophisticated humanoid robots developed thus far.

## The Journey of Hiroshi Ishiguro

For over 35 years, Hiroshi Ishiguro has been at the forefront of robotics. His passion for creating human-resembling robots has led him to craft six distinct android versions of himself in the past 18 years. These robots, referred to as Geminoids, are engineered to mimic his looks, gestures, and even his vocal patterns. The newest iteration, Geminoid HI-6, represents the pinnacle of his work, featuring advanced conversational functionality.

Ishiguro’s drive to create these robots arises from a wish to simplify his life. In a **CNBC** interview, he mentioned that the robot was created to handle tasks he can no longer perform due to time constraints, such as giving lectures. By assigning these duties to his robotic counterpart, Ishiguro can concentrate on different areas of his research.

## The Capabilities of Geminoid HI-6

A notable aspect of the Geminoid HI-6 is its ability to converse. Ishiguro and his engineering team have equipped the robot with a **large language model** (LLM), akin to the technology employed by popular AI chatbots like OpenAI’s GPT. To bolster the robot’s conversational skills, Ishiguro fed the model a comprehensive array of information, incorporating all of his media interviews and ten of his authored books.

This expansive knowledge base enables the robot to respond to inquiries regarding Ishiguro’s work nearly as effectively as the scientist himself. Initially, the robot was solely dedicated to delivering lectures when Ishiguro was preoccupied. However, thanks to the integration of the LLM, the Geminoid HI-6 can now engage with audiences, providing real-time answers to their questions.

In a video interview, Ishiguro showcased the robot’s abilities, illustrating its competence in responding to intricate questions about his research and inventions. Although the robot still displays a somewhat mechanical appearance, its capacity to mimic Ishiguro’s facial expressions and gestures lends an unsettling degree of realism.

## The Future of Humanoid Robots

Despite its remarkable features, the Geminoid HI-6 has its drawbacks. For example, the robot is currently unable to walk, but Ishiguro aspires to incorporate a **biped mechanism** soon, enabling it to move more autonomously. This advancement would bring the robot closer to functioning as a fully autonomous humanoid.

While Ishiguro’s endeavors focus on the creation of lifelike androids for educational and research objectives, other innovators are investigating diverse applications for robotics. For instance, certain companies are designing **armed robots** and even **flamethrower-equipped robotic dogs** for military and industrial applications.

As technological progress continues, the distinction between humans and robots may increasingly blur. Ishiguro’s work with the Geminoid series exemplifies the potential of humanoid robots—not merely as tools but as interactive beings capable of executing intricate tasks and engaging deeply with humans.

## The Uncanny Valley Effect

One of the most compelling aspects of the Geminoid HI-6 is its capacity to replicate Ishiguro’s facial expressions. Although this feature enhances the robot’s realism, it also evokes an unsettling phenomenon known as the **uncanny valley**, where a robot or animated figure appears almost human but not completely, leading to unease among viewers.

Nonetheless, Ishiguro remains hopeful regarding the future of humanoid robots. He posits that as technology advances, robots like the Geminoid HI-6 will evolve to become even more lifelike and proficient in performing a broader array of tasks.

## Conclusion

Hiroshi Ishiguro’s Geminoid HI-6 marks a significant advancement in the sphere of humanoid robots. With its sophisticated conversational skills and lifelike aesthetics, the robot is already being utilized for delivering lectures and engaging with audiences, allowing its human counterpart to save time. Even though there are still developments needed, particularly regarding mobility, the outlook for humanoid robots is optimistic.

As we delve deeper into the realms of artificial intelligence and robotics, innovations such as the Geminoid HI-6 provide a preview of a future where robots might not only assist us in our everyday activities but also interact with us in meaningful ways.

Read More
“10 Best Hallmark Christmas Films Currently Streamable on Netflix”

# Netflix Launches the Festive Season with 10 Hallmark Channel Holiday Films

As the eerie vibes of Halloween recede, Netflix is eager to welcome the holiday cheer. On November 1st, just hours after the last trick-or-treaters returned home, Netflix began its festive season by introducing 10 of Hallmark Channel’s most beloved 2023 Christmas films to its streaming library. For enthusiasts of heartwarming, festive romantic comedies, this is an offering you definitely want to experience.

Netflix has also established a **[Holiday Hub](https://www.netflix.com/browse/genre/81946034)**, making it easy for viewers to locate these Hallmark treasures as well as other holiday-themed titles. Whether you’re a lifelong Hallmark admirer or merely in search of cozy seasonal joy, there’s something available for everyone.

Here’s a list of the 10 Hallmark Channel films currently streaming on Netflix, along with short descriptions for each:

### 1. **[A Biltmore Christmas](https://www.netflix.com/title/81958389)**
A disillusioned screenwriter is tasked with remaking a cherished Christmas classic. While she visits the legendary filming site, she embarks on an enchanting journey through time, rediscovering the true essence of the holiday season.

### 2. **[A Merry Scottish Christmas](https://www.netflix.com/title/81958390)**
Two estranged siblings reluctantly agree to celebrate the holidays at a renowned Scottish castle at their mother’s urging. Amidst Highland dances and festive customs, they uncover a closely guarded family secret.

### 3. **[A Heidelberg Holiday](https://www.netflix.com/title/81958392)**
An artisan secures the chance to showcase her handcrafted ornaments at a famed Christmas market in Heidelberg, Germany. Throughout her journey, she discovers more than just her history — she may also find her future.

### 4. **[Christmas Island](https://www.netflix.com/title/81958394)**
A storm leaves a pilot and her private passengers stuck in a small Canadian town. As they await clearer skies, the pilot becomes captivated by the town’s enchantment and its holiday spirit.

### 5. **[Christmas on Cherry Lane](https://www.netflix.com/title/81958396)**
Three couples undergo transformative experiences during the holiday season, all linked by the same house they occupy over five decades. Their stories intertwine in this touching tale of love and family.

### 6. **[Christmas with a Kiss](https://www.netflix.com/title/81958400)**
A social media influencer, struggling in her romantic life, returns to her hometown for the annual Christmas celebration. There, she finds herself caught between two potential love interests, each capable of altering her future.

### 7. **[Miracle in Bethlehem, PA](https://www.netflix.com/title/81958401)**
Stranded in Bethlehem, Pennsylvania, on Christmas Eve, Mary Ann and her adopted child seek refuge with a generous stranger. What begins as a straightforward act of kindness quickly evolves into an unforeseen romance.

### 8. **[Christmas in Notting Hill](https://www.netflix.com/title/81958769)**
A renowned British football star, enjoying the perks of his fame, falls for an American educator who remains oblivious to his identity. Their unexpected love story unfolds in the picturesque streets of Notting Hill.

### 9. **[Haul Out the Holly](https://www.netflix.com/title/81959287)**
Following a breakup, an editor returns to her Christmas-loving hometown. Despite her initial hesitance, she becomes engulfed in the town’s intricately organized holiday celebrations, spearheaded by her childhood best friend.

### 10. **

Read More
Thousands of TP-Link Routers Breached in Extended Account Takeover Assaults

# The Emergence of Botnet-7777: An Increasing Danger in Password Spraying Incidents

Recently, cybersecurity experts and leading tech firms have been raising concerns about a new and highly stealthy botnet being deployed in password-spraying attacks. Named **Botnet-7777**, this nefarious network is mainly made up of compromised Internet of Things (IoT) devices, including routers and cameras, and is associated with cyberattacks carried out by state-sponsored actors from China. The botnet poses a substantial risk to organizations, especially those utilizing Microsoft’s Azure cloud services, as it facilitates extensive password-spraying operations that are hard to detect.

## What is Botnet-7777?

Botnet-7777 was initially discovered in October 2023 by cybersecurity researchers who found a network encompassing over 16,000 compromised devices, predominantly **TP-Link routers**. The botnet is named after the fact that it exposes its malicious malware on **port 7777**, a hallmark feature that has assisted researchers in monitoring its actions.

The botnet is distributed globally, meaning that affected devices are located in various regions, complicating efforts to identify and dismantle it. At its highest point, Botnet-7777 controlled more than 16,000 devices, but recent assessments indicate this number has fallen to around 8,000 devices. Nevertheless, this decrease in quantity does not signify a reduction in activity; rather, it seems the botnet is adapting and acquiring new infrastructure with altered fingerprints to bypass detection.

## What is Password Spraying?

Password spraying is a variant of brute-force attacks where cybercriminals seek to gain unauthorized access to accounts by testing a limited number of frequently used passwords across many accounts. Unlike standard brute-force attacks that target a single account with numerous password attempts, password spraying disperses the login attempts across various accounts to avoid activating security measures like account lockouts.

In the context of Botnet-7777, the botnet leverages its extensive network of compromised devices to send login attempts from diverse IP addresses. This distributed tactic makes it challenging for security systems to identify the attack, as each individual device only performs a few login attempts, remaining below the detection threshold of conventional intrusion detection systems.

## How Botnet-7777 Functions

Reports from **Microsoft** and other cybersecurity organizations indicate that Botnet-7777 is being utilized by several Chinese threat actors to target **Azure accounts**. The botnet’s capacity for avoiding detection hinges on several critical elements:

1. **Exploitation of Compromised SOHO IP Addresses**: The botnet primarily utilizes IP addresses from small office/home office (SOHO) devices, which are less prone to being marked as malicious by security systems.

2. **IP Address Rotation**: The botnet uses a rotating array of IP addresses, complicating efforts to block or blacklist particular IPs. Typically, a compromised device remains part of the botnet for about 90 days before being substituted with a new device.

3. **Minimal Attack Volume**: The password-spraying attacks conducted by the botnet are characterized by low volume, meaning each device executes only a few login attempts. This mitigates the likelihood of detection by systems that keep track of multiple failed login attempts from a single IP address.

These strategies enable the botnet to carry out large-scale password-spraying campaigns while staying undetected for prolonged durations. Microsoft has cautioned that the botnet’s operators can swiftly transfer compromised credentials to Chinese threat actors, allowing them to access multiple organizations rapidly.

## The Involvement of Chinese Threat Actors

One of the factions utilizing Botnet-7777 is monitored by Microsoft under the designation **Storm-0940**. This group has been connected to cyberattacks aimed at think tanks, governmental bodies, non-governmental organizations (NGOs), legal firms, and defense contractors in North America and Europe. Once they breach an Azure account, the attackers seek to navigate laterally within the network, exfiltrate sensitive information, and deploy remote access trojans (RATs) for sustained access.

Microsoft has documented several occurrences in which Storm-0940 secured valid credentials through Botnet-7777’s password-spraying initiatives. In some instances, the group employed compromised credentials on the same day they were obtained, highlighting a close operational relationship between the botnet operators and the threat actors.

## How Are Devices Being Exploited?

Although the precise method of infection for the devices in Botnet-7777 remains unclear, researchers have pinpointed a recurring pattern of actions taken post-infection. The following steps are generally noted:

1. **Acquisition of Telnet Binary**: The attackers procure a Telnet binary from a remote File Transfer Protocol (FTP) server to the infected device.

2. **Acquisition of xlogin Backdoor**: Subsequently, the attackers download an xlogin backdoor binary from the

Read More