Friday Squid Blogging: Squid and Efficient Solar Tech

Researchers are trying to use squid color-changing biochemistry for solar tech.

This appears to be new and related research to a 2019 squid post.

As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.

Posted on April 11, 2025 at 7:06 AM45 Comments

Comments

Mr. Peed Off April 11, 2025 11:54 AM

The generative AI tools they used were built by the defense-tech company Vannevar Labs, which in November was granted a production contract worth up to $99 million by the Pentagon’s startup-oriented Defense Innovation Unit with the goal of bringing its intelligence tech to more military units. The company, founded in 2019 by veterans of the CIA and US intelligence community, joins the likes of Palantir, Anduril, and Scale AI as a major beneficiary of the US military’s embrace of artificial intelligence—not only for physical technologies like drones and autonomous vehicles but also for software that is revolutionizing how the Pentagon collects, manages, and interprets data for warfare and surveillance.

Though the US military has been developing computer vision models and similar AI tools, like those used in Project Maven, since 2017, the use of generative AI—tools that can engage in human-like conversation like those built by Vannevar Labs—represent a newer frontier.

https://www.technologyreview.com/2025/04/11/1114914/generative-ai-is-learning-to-spy-for-the-us-military/

Instead of using generative AI with it’s hallucinations, we need an analytical AI model that specializes in accuracy.

Jennifer April 11, 2025 5:29 PM

Sounds like a fascinating blend of biology and technology—who would’ve thought squids could inspire advances in solar panels? I’m curious whether their ability to dynamically change color could actually lead to more efficient or adaptive energy systems. And by the way—I’m looking forward to more posts on security topics that haven’t been covered yet!

Clive Robinson April 11, 2025 6:16 PM

AI no closer to the magic G spot…

Stanford University’s Institute for Human-Centered AI (HAI) has produced a weighty report on current AI LLM and ML systems that basically says for all that extra coal in the furnace and water in the boilers it’s realy not getting anywhere near close to the hyped up G spot.

Where there has been improvement it’s in benchmarks, and as we all should know by now… The LLM gets right what it has in it’s corpus… So in a way the LLM improvement is like a cheating student using somebody elses A+ paper.

To save people the strain of getting to grips with the report it’s self, The Register has what reads like a human generated synopsis,

https://www.theregister.com/2025/04/11/stanford_ai_report/

The important thing to note –other than it is not making returns– is,

“[T]he report also stresses that complex reasoning is still out of reach for AI models. Even with mechanisms such as chain-of-thought reasoning to boost their performance, large language models (LLMs) are unable to reliably solve problems for which a solution can be found using logical reasoning, making them unsuitable still for many applications.”

Thus where they will show returns is by automating “make work” and similar jobs that actually serve not much purpose other than needlessly increasing cost. But… as “make work” is what the “Return to Office” senior management commands are really all about… Perhaps it’s managers that should be most alarmed about “AI replacing workforce”.

Clive Robinson April 11, 2025 11:51 PM

As we are talking about squid and sunlight as a source of energy,

Ever wonder why insects might taste like prawns/shrimp?

https://www.smithsonianmag.com/science-nature/you-might-think-of-shrimp-as-bugs-of-the-sea-but-a-remarkable-discovery-shows-the-opposite-bugs-are-actually-shrimp-of-the-land-180986303/

And yes when younger and I used to travel to strange places and walk up mountains I used to try the local snack foods, including insects in sweet and sticky sauces and cooked on charcoal fires.

Much safer than eating the local pork etc.

ResearcherZero April 11, 2025 11:57 PM

Someone in the administration needs to stop and think very hard about the mistakes they are making – which will endanger national security, critical infrastructure and public safety.

Former CISA director Chris Krebs has been targeted in an order by Donald Trump, which side-steps due process. Along with Krebs, clearance holders at SentinelOne were also targeted.

‘https://www.crn.com/news/security/2025/what-trump-s-move-against-krebs-sentinelone-means-for-the-cybersecurity-industry-analysis

Retribution against people for doing their job will have very significant implications for both cybersecurity and national security – and public safety as a result!

https://www.csoonline.com/article/3958808/trump-revokes-security-clearances-for-chris-krebs-sentinelone-in-problematic-precedent-for-security-vendors.html

And as a simple matter of reference for example is the following piece of research…

Website comment sections are being spammed by AI advertising and possibly fake reviews.

‘https://www.sentinelone.com/labs/akirabot-ai-powered-bot-bypasses-captchas-spams-websites-at-scale/

ResearcherZero April 12, 2025 12:13 AM

@Clive Robinson

Along with AI performance not increasing despite the ever increasing financial splurge, its lack of reasoning and wide range of uses for malign activities, has some very serious implications for human society and cohesion.

Humans are lazy, they often do not look too far or investigate further, or will take things on face value without really understanding the detail. Humans also assume that what is being presented to them by a machine has been verified, allowing for conclusions to be reached which are not in fact backed by real evidence – and then making dangerous mistakes.

This propensity might allow AI to influence us to abandon or fundamental morals and beliefs.

‘https://edition.cnn.com/2025/04/02/tech/ai-future-of-humanity-2035-report/index.html

Winter April 12, 2025 2:01 AM

@Clive

[AI is] realy not getting anywhere near close to the hyped up G spot.

I think AGI in AI is up there with TRUTH in lie detectors. The problem is that the concepts of AGI in AI is utterly misunderstood like the concept of TRUTH in lying.

There is no Universal Intelligence. IQ is a flawed concept. People and animals have collections of skills that rely on brain circuits. IQ is a weighted sum of those skills that are important in school education. If you have a high IQ, all those different skills necessary for success in education are well developed.

You see that most often in people who had a healthy, well nourished and trauma free youth and good education. That is why all these different skills correlate so well in IQ.

But they are still all different skills that have to be used together. That holds for humans, animals, and AI.

A single AGI as such does not exist. You have to build any AI from a selection of required skills that collaborate. But every effective and efficient selection will leave out some skills.

Somersaulting might be a useful skill in a robot, but is utterly useless in an AI that has no limbs.

Current AIs are built around language and images. They are becoming pretty good at it. But we did find out pretty early that good proze is not the same as well informed proze. And a well designed image does not have to represent anything logical.

ResearcherZero April 12, 2025 6:25 AM

@Winter

There are plenty of sources they could learn from about human actions that do not require a body to produce and perhaps one day, many areas we are unlikely to imagine.

Legal somersaults for example. But the question to ask is, can it plead the 5th?

Election security systems are now being dismantled across America..

‘https://edition.cnn.com/2025/04/09/politics/election-security-systems-trump-invs/index.html

Law will allow taxpayers too meet the costs of those convicted of breaking the law.
https://www.atlantanewsfirst.com/2025/04/07/georgia-bill-would-compensate-wrongfully-convicted-allow-trump-recover-costs-election-case/

Racketeer Influenced and Corrupt Organizations Act (RICO)
https://nul.org/news/what-georgia-grand-jury-report-trumps-election-interference-doesnt-reveal-most-revealing

What is racketeering?
https://www.cbsnews.com/news/trump-georgia-indictment-what-are-rico-charges/

MrSmith April 12, 2025 6:43 PM

So I saw this inexpensive computer on Amazon sale, linked from a deals website. Impressive specs. Ryzen 9, 32GB Ram, for $367. Good price. Too good! Comments indicated it comes with malware pre-installed. Back doored, stealing passwords to banking & crypto, stealing web-browser credentials, etc. Some folks claimed you had to reinstall Windows. Others claimed it now has malware pre-installed IN THE FIRMWARE! Reinstalling Windows doesn’t help. Brand name was ACEMAGICIAN. Reddit, Tom’s Hardware, & others corroborated this story.

I’m wondering if you all might know how commonplace this is? Seems like a number of unknown brands are affected, and have been for over a year.

With Microsoft end-of-life’ing Windows 10 next October, and such a large percentage of computers unable to upgrade to Windows 11, a lot of folks are looking for an inexpensive new computer. Predators & easy prey. Scary times!

.

Also: That question about cell-phones & traveling abroad a while back? HSN sells Tracfones for $40-$50 WITH MINUTES (1200-1500) & TEXTS & DATA. Given the price of airfare & travel, $50 is a rounding error. Take only the data you need. Throw the phone away afterwards. And check if you have call forwarding on your regular phone.

Clive Robinson April 12, 2025 10:35 PM

@ Who?, ALL,

“The only reason I see to declare these technologies “legal” is that they are sponsored by the government.”

It rather depends on what you mean by “legal”, “sponsored”, and “government”.

Developing such systems based on statistics are not “unlawful” just about anywhere in the world where there are people with the technical capability.

This “nonsense” has almost always be developed initially as “anti-terrorist” etc and is in response to the likes of PIRA and other long term groups being sufficiently good at Fieldcraft and OpSec that traditional investigating techniques really don’t work.

Why do I say “nonsense” well it’s all based on the idea that,

“All such problems can be solved with more data…”

They can not for reasons a high school student should get taught, but for some reason gets forgotten when “Money comes a’knocking”.

Put simply the fact that a group of people all get classified by their actions as “undesirables” and are found to all have certain common traits… In no way means anyone with those traits is an “undesirable” or that all future “undesirables” will have these traits.

Such is the nature of “freewill” and “agency” breaking observed “cause and effect”.

There is even a quite old expression with respect to it,

“A wolf in sheep’s clothing.”

Basically as an “undesirable” with the capability of reasoned thought you look to “hide tells” that you are aware your opponents may be looking for, so as to render much of the quite limited investigative resources wasted.

Thus you get into the “secret sauce” mindset as an investigator, where you try to keep “the tells” you use secret. When you think about it given time and picking people up what ever your “tells” are they become known to the undesirables.

So what as an undesirable do you do?

The simplist thing is to not just make the tells act against the opponent but actually be incorrect or worthless.

There are two ways as an undesirable you to do this,

1, Not have the tells.
2, Make the tells to general.

It’s the premise behind the statistical game known incorrectly as “signal to noise ratio” taken from communications and information theory.

The primary assumptions behind “signal to noise ratio” is that

1, The noise has a known profile.
2, The source of the noise does not change.

There is a kind of hint to this by the use of the term “AWGN” that stands for,

“Additive white Gaussian noise”

https://en.m.wikipedia.org/wiki/Additive_white_Gaussian_noise

I could go down the rabbit hole of “statistical mechanics” but there is a simple experiment that nearly every high school student sees atleast once to demonstrate amongst other things “Brownian Motion”.

You start off with a quantity of water and divide it into two lots. To one you add a quantity of potassium permanganate that turns it a very deep purple hue.

You have a simple thermal still arrangement using two large round bottom flasks the bottom of which holds the now purple water and the top the still clear water.

You apply heat to the bottom flask and some warm purple water ascends into the top flask and some cool clear water descends into the bottom flask. It looks very pretty and is thus quite memorable.

The eventual result is a near equal mixing of the two samples of water.

The experiment is easy to make go in this forward direction… But ask yourself how you would get it to go in the opposite direction. That is how you get the well mixed in potassium permanganate to unmix into just the bottom flask but importantly remain well mixed there…

Practically it’s impossible, as it is in effect a physical “one way function”.

Now consider those molecules of potassium permanganate as being a model of “the tells” behaviour mixed in a general population…

There is a thought experiment called “Maxwell’s Demon Paradox” from a series of letters from physicist James Clerk Maxwell to Lord Kelvin back in 1867 to in effect violate the second law of thermodynamics,

https://en.m.wikipedia.org/wiki/Maxwell%27s_demon

“Lot’s of Demon’s have been proposed and so far they have all been deposed”.

The thing is “probability” says that you do not even need a Demon there is some very small but finite chance the molecules will spontaneously rearrange back to the starting conditions. But it probably won’t happen in your life time or the lifetime of the universe.

But the trick that the people rely on to sell such systems is,

“If you reduce the target population the probability comes up in any given period.”

Consider the case of just one molecule of potassium permanganate, it can only ever be in one of the two flasks. Therefore simple thermal circulation will pull it around from one to the other and back again much like those 1960’s “lava lamps”.

Thus if you rig the experiment with hidden heat sink/sources you can change the flask the molecule is in at which point like all good magicians and con artists you throw back the curtain and cry “Ahha”, collect your performance fee and scuttle off into the night before the audience works it out and forms a lynch mob or just pretends “they knew all along but did not want to spoil the fun for others”. Either way the money is over the hill and far far away.

Why do I know this… If you look back on this blog quite a few years now you will find me telling of how I inadvertantly got mixed up in such nonsense in the 1990’s in a University close to London, that were doing early “behaviour analysis” by CCTV to spot “undesirables” –beggars– loitering on London Underground Platforms.

It worked sort of because “beggars” can not really change the way they ask people for money so it stands out as a behaviour. But they could change where they asked for it… So the beggars moved from the platforms onto the trains, where they still are three decades later.

It’s just one of the reasons I’ve pointed out over the years here and in numerous other places that “CCTV for Crime Prevention” has a predictable curve of failure. First it works as it is intended because street crime “there” goes down as the criminals get caught and the smarter ones move out to where there is no CCTV. But then the crime goes back up again… the reason is CCTV is static in it’s capabilities, successful street criminals are quite dynamic in their behaviours and so effectively evolve around the CCTV in various ways so it becomes useless.

Eventually the authorities “caught on” to what I was saying, hence such systems are made not just “hidden” but highly mobile. Thus trying to be more dynamic than the criminals. Unfortunately there are ways that criminals can out evolve that. I won’t go into details of “flash attacks” and “steaming gangs” you can look them up or study medieval warfare techniques.

It’s one of the reasons London’s Met Police were accessing “mobile phone” data around the time of “The Croydon Riots” and later they took it up a notch or ten with EncroChat phones. As did the US FBI, and Australian, French, Swedish and many other Nations equivalents.

The thing is the Police unlike the Intelligence Services are limited in what they can do. To succeed they have to get successful “criminal convictions” which means two things,

1, The evidence has to be within Court Rules.
2, The “sources and methods” have to become “known” by lawful useage.

Which means smart criminals can stay ahead on the evolution curve…

It’s in part why I talk about,

1, Data : The message.
2, Meta-data : Message routing.
3, Meta-meta-data : User behaviour.

All are amenable to statistical pattern recognition be it cryptography, Traffic Analysis, Contact tracing, etc by the use of exponentially increasing levels of technology. As for the criminal “flattening the statistics” gets harder and harder as long as they remain within the technology constraints.

Eventually successful criminals will find ways to “use technology” beyond the constraints of consumer/commercial” technology use, where “billing” and “profit” by technology operators means user usage is auditable thus traceable.

One aspect of this was to use “burner phones” but whilst they stopped “Meta-data” analysis they did not stop “Meta-meta-data” analysis.

There are ways around Meta-meta-data analysis and I’ve mentioned one or two in the past. The problem with “communications” is,

“They are used by humans, and to err is human, and that provides the cracks, and it takes only one crack with collect it all.”

The thing is that technology does not have to operate in the consumer/commercial “technology sphere” where every thing is recorded… A look at the use of technology over at the Eastern edge of Europe tells you that there is much room for the more agile participants to stay well ahead. And yes I’ve mentioned some of this in the recent past.

It does not take a genius to realise that the agile party will always exist and when based on “smart behaviour” will out evolve the less agile party. Thus the only thing that will stop it is when the costs become to prohibitive for one side, giving a default win to the other.

Some authorities have realised this so have changed legislation such that a 3rd “commercial” party picks up their bill. It’s what CALEA and other legislation is all about.

But the price that is payed is that commercial interests are like “factory fishing” that very nealy made wales extinct and is now making all other edible fish stocks endangered.

Society is the sea humans swim in, and “commercial phishing” by corporates are destroying not just society as we know it, but mankind as well…

Clive Robinson April 13, 2025 1:34 AM

@ MrSmith,

You say,

<

blockquote>”Some folks claimed you had to reinstall Windows. Others claimed it now has malware pre-installed IN THE FIRMWARE! Reinstalling Windows doesn’t help. Brand name was ACEMAGICIAN.”

I remember the issue a little over a year ago… As at the time it reminded me of the Lenovo debacle from a few years back around the time of BadBIOS.

In the case you mention, the hardware manufacturer blamed a “supply chain attack” through one of it’s suppliers and Google Chrome having malware loaded by them.

Well it appears there might be more than “some truth” to the Google Chrome being loaded with signed malware bad extensions,

https://arstechnica.com/security/2025/04/researcher-uncovers-dozens-of-sketchy-chrome-extensions-with-4-million-installs/

Clive Robinson April 13, 2025 7:04 AM

@ Bruce, ALL,

Heads up : DragonFly BSD now has native DM-Crypt Disk Encryption.

[M]erged this past week was dm_target_crypt_ng, a next-generation implementation of their DM-crypt code for disk encryption.

DragonFlyBSD developer Michael Neumann re-engineered the DM-crypt code for this BSD operating system as this transparent disk encryption implementation compatible with Linux’s dm-crypt.

https://www.phoronix.com/news/DragonFlyBSD-DM-Crypt-NG

It now contains some of our host @Bruces crypto algorithms,

“Follow-up patches have refactored the crypto ciphers, improved the crypto cipher API, and introducing Twofish/Serpent CBC/XTS ciphers. Some nice improvements for those wanting to make use of disk encryption with DragonFlyBSD.”

Steve April 13, 2025 11:31 AM

@MrSmith:

[. . .] Given the price of airfare & travel, $50 is a rounding error. Take only the data you need. Throw the phone away afterwards. [. . .]

Because the world needs more e-waste.

MrSmith April 13, 2025 7:55 PM

@Steve “Because the world needs more e-waste.”

E-waste supposedly has 10 to 100 times more gold per ton than gold ore.

That aside, would anyone notice? Batteries turn into SpicyPillows right after the warranty expires to boost sales. Otherwise I’d have suggested saving the phone for the next trip.

Clive Robinson April 14, 2025 6:09 AM

@ Bruce, ALL,

New method of no gradient AI ML

This is one to watch, but I’m not yet sure if you should do so with a bowl of popcorn or not (though it can’t hurt 😉

As some may remember, some years ago the “transformer” gave rise to the current AI hype bubble, that is now deflating for various reasons.

Not least is that it does not deliver in certain respects, nor is it ever likely to do so, outside of it’s current known capabilities.

I’ve previously described the DNN as being a DSP network that forms an “adaptive filter” and whilst some bristled at this, it’s now a more accepted view point.

The general use of DSP adaptive filters is to “reduce noise and distortion” thus increase the “perceived signal to noise ratio”. An associated term for this is “denoise” (it’s simple enough to understand but long winded to explain so I won’t do so for now).

Any way a new AI method and thus name as a term of art has popped up in a paper where the title gives it,

“NoProp: Training Neural Networks without Back-propagation or Forward-propagation”

The authors in at the start of the introduction describe the current ML method based on the transformer as,

“The canonical deep learning approach for learning requires computing a gradient term at each layer by back-propagating the error signal from the output towards each learnable parameter. Given the stacked structure of neural networks, where each layer builds on the representation of the layer below, this approach leads to hierarchical representations.”

As can be appreciated this method is not efficient and so consumes a lot of CPU cycles by the repetition involved with the backward and forward feedback to propagate changes to the network weights. In effect a laborious smoothing or low pass integration based process returning less and less with each cycle.

Not immediately obvious but nether the less true, is that such propagation can not exist in known biological systems. So the transformer or other back propagation methods are not representative of known biological learning systems.

They authors go on to say,

“[W]e introduce a new learning method named NoProp, which does not rely on either forward or backwards propagation. Instead, NoProp takes inspiration from diffusion and flow matching methods, where each layer independently learns to denoise a noisy target. We believe this work takes a first step towards introducing a new family of gradient-free learning methods, that does not learn hierarchical representations — at least not in the usual sense.

https://arxiv.org/abs/2503.24322

It needs be said this is not the first ML method that does not use back propagation, but it certainly appears more efficient.

It will be interesting to see what effect this has on current AI ML transformer method based systems and the companies that are so reliant on them…

Victor Morel April 14, 2025 7:25 AM

With two academic colleagues working on cryptography and cybersecurity in Sweden, we drafted an open letter (https://epagnin.github.io/open_letter.pdf) against the recent law proposal to introduce backdoors in E2EE communications in Sweden (which trigger a comment from Signal’s CEO https://www.svt.se/nyheter/inrikes/signal-lamnar-sverige-om-regeringens-forslag-pa-datalagring-klubbas).

Our letter has been signed by over 85 academics, and popularized as a short article in a national Swedish newspaper (https://www.svd.se/a/OoJ4x3/darfor-ar-bakdorrar-in-till-sakra-appar-en-dalig-ide-skriver-forskare).

d30 April 14, 2025 9:13 AM

why is everyone here so serious; guess ill get some popcorn

@Victor Morel can you sign on my behalf? im not used to using github ;-;

not importnant April 15, 2025 5:57 PM

Does Your Mind Shape Reality?
https://www.psychologytoday.com/us/blog/psychology-in-society/202504/does-your-mind-shape-reality

=Now, a new theory from my lab may finally bring clarity to this mystery by putting the
observer back at the center of physics. It’s called the N-Frame model, and it offers a
striking proposal: your conscious mind doesn’t just observe reality — it shapes it.

The N-Frame model [1] draws from physics, neuroscience, and psychology to present a bold idea: Our conscious experience arises from, and simultaneously feeds back into, the quantum fabric of reality.

Like the lens of a camera, your internal state — your beliefs, your focus, your intentions — determines what kind of world you experience.

We are not detached observers. We are embedded, entangled participants to the universe in a reality that is context-sensitive, relational, and interactive.

Functional contextualism holds that thoughts, behaviors, and interpretations are always
shaped by context — both the external setting and the internal perspective of the individual.

!!!Artificial Intelligence: If consciousness has causal power, then designing AGI systems that simply mimic logic or learning isn’t enough. We must build systems capable of contextual awareness, self-reflective updates, and intention-driven adaptation — not just computation.=

Clive Robinson April 15, 2025 8:25 PM

@ MrSmith, ALL,

What gets burnt with a burner?

With regards an article in The Register that says,

“The European Commission is giving staffers visiting the US on official business burner laptops and phones to avoid espionage attempts, according to the Financial Times.”

You say,

“Apparently I’m not the only one with this idea to use “disposable” phones.”

Using burner phones is not a good idea these days nor has it been for around two decades.

There is a special kind of “OpSec” you have to follow with them and most people really can not do it reliably even if they know their very own life might well depend on it.

Look at it this way, diplomats and their non-intelligence diplomatic staff are very easy to locate by the “Mark One Eyeball” or CCTV images during their normal activities. Likewise when abroad their social activities.

Cross corelating the eyeball sightings with traffic info freely available via “Signalling System Seven”(SS7) is very trivial.

As I found in the early to mid 2000’s when developing “traffic census systems” it’s actually very hard bordering on impossible to anonymize phones. Put simply they have two unique identifiers which you can view as a unique SIM ID and a unique Phone ID, along with Service Provider IDs, that you can trivially track in a whole number of ways including the cell site pass over protocols.

Thus the likes of the CIA/NSA will have a list of fairly valid identifiers of the burner phones within an hour or two of them being turned on. Especially if the Service Provider ID is “non-native” or one known to be “favoured” by a diplomatic station administration.

They are “100% Painted” the moment they contact any other service, phone or SMS provider. Or if the phone is supposedly Smart and uses the Data Network to do “chat” etc (think Apple and Android OS’s).

These days all Smart Phones have way to much easily identifiable Meta-Data and untrained or tired staff generate far to much easy Meta-Meta-Data.

Further as the CALEA interface gives Data in the form of audio and messaging “back haul” in “plaintext” form that will be easily obtained from “Collect it all” NSA or even FBI surveillance.

The diplomatic staff were actually safer when they could use “phone boxes and DTMF codes” and as they were still around back then broadcast based “pagers” that did not give away a persons location.

Yes there are ways you can use both dumb and smart mobile phones but you need much heightened OpSec.

As the CIA found out the hard way, trying to “get smart with the Internet” probably got something well over 20 Chinese Agents they had recruited executed or worse by Chinese counterintelligence services back in 2010 and things only went down hill from there for a couple of years till they changed handler methods sufficiently…

Dancing on thin ice April 15, 2025 8:36 PM

“after DOGE accessed the NLRB’s systems, someone with an IP address in Russia started trying to log in [with] the correct username and password”
NLRB has proprietary info on Elon Musk’s competitors.

Several security related issues here:
* basic security safeguards and practices are being ignored
* a guy being investigated has access to delete records on agencies investigating his companies

https://www.npr.org/2025/04/15/nx-s1-5355895/doge-musk-nlrb-takeaways-security

ResearcherZero April 16, 2025 12:25 AM

As soon as a new burner phone is started up – it pops up like dog balls. If a group of them start up together, it is an awful lot of balls all moving together in the same direction and a fantastic target to both track and monitor, or possibly throw darts at.

IPX is used by hundreds of mobile networks in countries all over the world.

‘https://citizenlab.ca/2023/10/finding-you-teleco-vulnerabilities-for-location-disclosure/

Legacy systems provide opportunities to collect unencrypted identifiers.
https://www.wired.com/story/5g-more-secure-4g-except-when-not/

GTP (GPRS Tunneling Protocol) is still used as a bridge between old and new technologies.

An IMP4GT attack is also possible in the range of 2km from the target device.
https://montsecure.com/research/imp4gt-attacks/

There are an awful lot of other methods for tracking and monitoring mobile devices.
https://www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/

Poor timing to randomly change security procedures – while at the same time announcing that offensive operations are going to be stepped-up.

The agencies that must manage US cyber posture are under an unprecedented attack.

‘https://observer.com/2025/04/trump-cybersecurity-firings-cisa-nsa-china-threats/

The attack is not from overseas, it has been directed instead from the very top.
https://www.nytimes.com/2025/04/05/us/politics/trump-loomer-haugh-cyberattacks-elections.html

“When critical functions that serve the needs of society are at issue, some things are just not discretionary.” (It could be that this plan too landed on the chopping block.)

https://www.technologyreview.com/2022/03/18/1047395/inside-the-plan-to-fix-americas-never-ending-cybersecurity-failures/

ResearcherZero April 16, 2025 12:55 AM

Given the pace that information is fed into AI systems, you might be able to ask ChatGPT where Pete Hegseth is at any given time and what he is saying or typing. Given enough information over enough time, ML chat bots could give you a rough enough approximation.

It would hallucinate a few details which never happened. Could you tell though?

You could litigate after your own private details were absorbed and leaked by integrated AI solutions, again after your private data has already been breached or erroneously revealed.

As the public’s memories and history, imagination and invention, knowledge and skills are transferred into private hands, who does this information belong to? Those agreements are vague and change at any time. If it is your work or property, or their work and property, your legal budget is considerably smaller, your importance significantly less noticeable and publicly or privately secured.

You could access your own life and works at a premium, for a monthly subscription price if you wish, but you will have to agree to the binding restrictions within the fine print.

Clive Robinson April 16, 2025 6:49 AM

@ Bruce, ALL,

This has become dummer than dum.

I mentioned not that long ago that those behind PKI Certs were likely to take things to ever shorter renewal periods…

Well even I was shocked to see this,

https://www.digicert.com/blog/tls-certificate-lifetimes-will-officially-reduce-to-47-days

It’s less than seven weeks and realistically when you add in likely snafu delays you will have to plan on the reality of just about a month… Even with “automation” it will be tight, without it will just go wrong due to winter maladies and summer breaks.

But “autonation” as a rule of thumb makes an attackers life easier…

So if anything, this change is going to create more security failings than it might potentially stop…

Bob Paddock April 16, 2025 9:00 AM

@not important

“Does Your Mind Shape Reality?
A radical new quantum cognitive theory says yes.”

“New”? Not at all. This research is almost 50 years old.
Some related research is nearly 130 years old.

Watch “Inside the Princeton Engineering Anomalies Research Lab with
Brenda Dunne (1944 – 2022)”:

‘https://www.youtube.com/watch?v=P8CjT9QhlRA

For 28 years the Princeton Engineering Anomalies Research (PEAR) Lab in the
basement of Princenton’s Engineering building was a lab that studied
this. Mostly via Random Event Generators (REGs) and how they could be
influenced with the Mind.

In that link the late lab manager Brenda Dunne discusses the labs
findings such as Consciousness creates Quantum Physics (Convention
says it is the other way around). She also mentions something that I
find Interesting. They found a gender bias between men and women on
the effects that they could have on the REGs. I don’t know of any
research even today that has explained that.

The equipment Brenda speaks of is now located at Broughton Sanctuary
in Yorkshire UK. Sadly I did not have time to invite @Clive Robinson
to join me when I was there to work with the equipment. I hope he can
pay the place a visit.

‘https://gowyrd.org/visit/

The International Consciousness Research Laboratories (ICRL)
is the legal successor to PEAR run by Brenda’s son Jeff.

‘https://icrl.org

Related are “The Global Consciousness Project Meaningful Correlations
in Random Data” and GCP 2.0:

‘https://noosphere.princeton.edu

‘https://gcp2.net

There is also Heartmath’s “Global Coherence Initiative Live Data”:

‘https://www.heartmath.org/gci/gcms/live-data/

All of this is based on science and measurements, not Woo-Woo.
Do not discount that the Mind might be influencing the generation of
cryptography keys…

Clive Robinson April 16, 2025 12:09 PM

@ Bruce, and those who like poison pills.

Adversarial noise as pill to kill AI theft

As a few already know AI does not see or for that matter hear the world the way we humans do.

A decade to a decade and a half ago AI had hit up against this as an exponentially expensive problem. If you look at current AI ML it still is they just found a way to “shift and scale” the curve, but not as far as some would like you to believe…

So it was found back then that such issues could be exploited to make the algorithm hit the end stop long before it achieved very much. So an anti-AI “Poison Pill” notion arose…

And yet again it has come up,

https://cdm.link/benn-jordan-ai-poison-pill/

“I have interest in generative sound, algorithmic music, machine learning. It’s not about being pro- or anti-AI like this is a sport. We’re talking about the critical examination of a technology that is sucking up a huge amount of resources and reshaping the world around us. What these techniques do – even if the generative models find ways to circumvent them – is reveal something about how the technology works. It busts some of the myth-making at a time when the world needs transparency, not another Wizard of Oz trick.”

Which is a fairly solid objective, and conceptually not that hard you basically use a “Markov Chain Monte Carlo”(MCMC) or similar method. Think of it being not a “Drunkards Walk” but a “Happy drunks dance”.

Overly simply you make what is statistical noise focused on disrupting the ML system but not being objectional to humans (though you can use the tech to focus sound in a way to target individuals in groups etc).

Back in the 1990’s similar ideas were used to make “Digital Watermarks” for “Digital Rights Management” so there is a certain irony that artists can now protect themselves against the latest groups of rapacious investors and psychotic management who claim what is yours is theirs but what they think is theirs can not be yours even if you were the originator…

The linked to Benn Jordan YouTube vid is short on the details –unsprisingly– but importantly long on the history of Why he is doing it… And his reasons I suspect any creative type including programmers 😉 would understand if not be sympathetic with.

not important April 16, 2025 7:43 PM

@Bob Paddock – thank you for the links provided. I’ll take no rush look at them.

lurker April 16, 2025 8:10 PM

How much redundancy do you need?

But, c’mon, rats chewing thru the cable? So 20th century ..

‘https://www.rnz.co.nz/news/national/558351/south-island-back-online-after-contractor-and-rodents-cut-through-fibre-cables

ResearcherZero April 16, 2025 10:35 PM

@Dancing on thin ice

Both US internal and external security is being consecutively decapitated.

It’s dangerous and stupid, along with the proposed 50% reduction in the State Department budget. Nearly 30 embassies and consulates may close along with further staffing and service cuts. People are already being told to prepare to leave.

The US is deliberately retreating from the world, and as its footprint is shrinking, so is America’s influence. This leaves the United States with a much weaker hand.

Power is not wielded purely through force, rather force is sign of vulnerability and an option of last resort, when the actor has lost the ability of constructive negotiation and influence. It is a sign of an irrational and unhealthy obsession with control.

‘https://www.cnn.com/2025/04/15/politics/closing-embassies-consulates-document/index.html

In case anyone works at a consulate or embassy.

Upgraded backdoor delivered imitating the European Ministry of Foreign Affairs.
https://research.checkpoint.com/2025/apt29-phishing-campaign/

Current US policy is not only counter productive, it’s nuts!
https://www.cbc.ca/news/world/trump-foreign-policy-

Everyone should understand why running government like a business is not a good idea.

https://www.deseret.com/opinion/2025/03/15/purpose-of-government-is-general-welfare-not-good-business/

@lurker

Once the earphones go in and you start digging – it’s hard to stop.

People regularly put a backhoe through the fiber around here. Usually outside of built up areas, so it typically only affects the little town sites and communities.

There are regular signs along the cable route warning people not to dig there, often very close to where they do dig – and within easy view.

Those rats in New Zealand are pretty big though. They are abnormal rats, which do not carry shivs, they carry hatchets and machetes and beat up the dogs and cats. They also qualify as earth moving machines themselves, and dig big underground warrens and bases to launch their attacks from.

@Clive

And speaking of bulldozers and backhoes, K6 is a processor. That road/firebreak we pushed through the bush was named KTC Road, KTC being a type of bulldozer. Not bloody K6 Rd.

[slaps self in forehead]

MrSmith April 16, 2025 10:59 PM

@ Clive “What gets burnt with a burner?”

We have a large surface to track people. Cameras are everywhere, even on buses, trains, planes. Car license plate cameras. Credit Cards. Even cash (bills) are unique and can be tracked with enough effort. Cell phones are merely one aspect.

The issue I sought to address was all my private date, my entire life, being downloaded whenever I cross a border; Coupled with the issue of spyware or malware being installed.

A “Burner” or disposable cell phone solves these issue. (Ideally coupled with a chromebook in guest mode, or a wiped computer & Linux or Tails downloaded & installed on-site.) Yes I’m compromised during the trip. Anything I chose to bring with me has been taken. But so what? They had that anyway. Meanwhile, when I get back home, I can switch to my real cell and I’m secure again. No malware. They didn’t get all my photos, contacts, etc.

Wasn’t it 17th-century French statesman Cardinal Richelieu who said “Give me six lines written by the hand of the most honest man, I will find something in them which will hang him.” Imagine what folks can do today after they download your entire life?

This isn’t something new. Folks here have talked about web-businesses and toxic data; Deleting data you don’t need to avoid legal liability if or when it gets stolen. This is the same concept. Don’t take data you don’t need with you when you travel. Don’t use the same phone you crossed the border with for your everyday life, as you don’t know what malware was installed on it.

The “trick” here was that HSN sells really cheap Tracfones with MINUTES/Texts/Data. That makes burner (or disposable) cell phones affordable, and they will likely only get cheaper. Someday we’ll get paper cell phones from a vending machine, that we fold together to make a call.

Clive Robinson April 16, 2025 11:26 PM

@ ALL,

How many balls has Microsoft to drop?

Basically Microsoft’s various “Cloud Services” are failing repeatedly to deficient Microsoft work practices.

If this is in consequence of the Microsoft “Mega Surveillance” push of,

“AI Phone Home, with everything”

Or not is yet to be determined but the answer is likely in all probability to be in the affirmative.

So Microsoft appear to be reverting to “habits of old” of push out crap fast and maybe fix it before the next major release (or probably not).

The latest Yesterday –just one of several major SNAFUs recently– hit file sharing in Teams…

https://www.theregister.com/2025/04/16/microsoft_teams_file_sharing/

To some a “who cares” and they might not even have even seen the Microsoft ball drop.

To others however their production work flow came crashing down… Thus they were left scrabbling around trying to find emergency mitigations to the significant Microsoft “Ball Drop”. That as is the nature of such “Quick Hacks” would have effected not just the work flow, but the “security” of not just the emergency mitigation, but the down the road security of the organisational systems and data.

Apparently Microsoft are claiming they’ve “rolled it back”, but should we believe them?

That is, is the “roll back”,

“In whole or part?”

Something tells me it will at best be “in part” just enough to make things “look right” again at the surface… But with deep changes left hanging for “Certain more enterprising types” to “find and exploit” to their advantage not the Microsoft SaaS customers (think “Malware as a Service”)

Interestingly “The Register” article takes a similar,

“Don’t put all your eggs in the Microsoft basket!”

View point, listing some of the recent major Microsoft “Cloud SNAFUs” and then some “Microsoft PR guff/nonsense” befor as the last two paragraphs,

‘Matthew Hodgson, CEO of the [–Org name removed–], told The Register: “The Microsoft outage once again highlights the risks of relying heavily on centralised cloud services.”

He noted that going down the centralized route can create single points of failure. In this case, a back-end changed borked the files experience in Teams for many users. Hodgson suggested that companies could mitigate such risks by reducing reliance on any single provider through distributing data and workloads over multiple nodes.”

So the advice some of us were giving “long long ago” when “SaaS” was just a sparkle in a marketing droids eye. Back when we were saying “Service Level Agreements” were worth the bumf (toilet paper) they were printed on…

Clive Robinson April 17, 2025 12:34 AM

@ ALL,

Opps I left of a link about the scary Microsoft plan for AI to run your computer by Co-Pilot,

https://www.theregister.com/2025/04/16/microsoft_copilot_computer_use/

Which might be the reason for all Microsoft’s back end SNAFUs.

The gist of which is,

“[Microsoft Marketing] said it plans to enable computer use from within Copilot Studio – Microsoft’s platform for building and deploying AI agents. This will spare employees from having to click buttons and fill forms themselves, while still keeping enterprise data corralled inside Microsoft’s cloud – Redmond insists none of it is used to train its models.”

So they will tell an agent on your computer to click that “I agree” button on the draconian service agreement button… That should prove fun in Court…

But the real point is Microsoft have invested so much money in fairly useless “current AI LLM and ML systems” that they are putting every effort they can to “ram AI down your throat”. Just so they can “fudge the figures” for the SEC and Investors whilst switching over to a “Chocolate Factory” style “Privacy stealing surveillance” business model.

The thing is “current AI LLM and ML systems” are without doubt “a busted flush” that “don’t deliver” and are never likely to in a cost effective manner. The costs are going up exponentially, but the capability improvements are now at best linear and clearly not scaling, thus “profit” is not likely (nor would you expect them to be for what is effectively “a drunkards dance”).

Sadly as I’ve indicated in the past I saw this “steal everything you can” business model coming back in the 1990’s when doing research into how to “viably earn money” on the Internet by “Information Product” Service Providers when doing the MSc. I concluded that it would have to be by either,

1, Closed Subscription Service.
2, Information stealing.

It would have to be by “closed” with “information locking” to almost the point of making it useless. Because “micro-charging” of “per record fee” could only “maybe work” under the “Telecom Charging Model” and that was unlikely to work across borders.

But I could not see a way to get “information locking” to work so a “race to the bottom” market would default as information was stolen and repackaged at ever decreasing value.

The only real “value” was what others were searching for “information for” ie surveillance to work out what say a drugs company etc were starting to research, or by who and what individual people were doing in law/finance/investment firms and the really seamy side of things such as “personal profiles” of people to be used to screen people for employment, insurance, taxation, etc.

I was working at the time for the worlds most established “Citation Database Publisher” and “all the business value” –which could not be protected legally or otherwise– was in “building the database” and “search tools” (so I was not popular with the owners who had spent considerable effort in building up the company and who dropped a fairly heavy hint I needed to do something else for my thesis as it would be “published electronically” as a public document).

Clive Robinson April 17, 2025 3:11 AM

@ Bruce, ALL,

This ARS Tech article superficially looks like it is “political”. But it’s actually not in the sense of “Trump Tariffs” that are just,

“Slapping a sticking plaster on for broken bones”

What it tells you is importantly why the bones got broken in the first place,

https://arstechnica.com/tech-policy/2025/04/14-reasons-why-trumps-tariffs-wont-bring-manufacturing-back/

I’ve worked in Engineering & Design one way or another for much of my working life, Manufacturing appears greatly in both disciplines.

That is from “one off” prototypes or art pieces through mass manufacturing of “Fast Moving Consumer Goods”(FMCG) where tens of thousands at a minimum of identical products have to be made in minimum time at acceptable minimal cost.

Surprisingly few in the West actually have the first clue about the process that produces everything that surrounds them every day of their lives.

Even if you live entirely “off grid” growing your own food whilst wearing homespun clothes, the tools you use that “force multiply” your efforts will have been manufactured[1]. By you or someone else, and the materials used sourced via a supply chain[2].

Even a basic nod to understanding the complexities involved in manufacturing is necessary for people to protect themselves from small or major events in their lives.

[1] The word “manufactured” originally ment “made by hand” by someone who was artisanal thus skilled and you “paid” them rather than do it yourself.

[2] Be if Cheese for food or casin plastic for buttons and knife handles, the start of the supply chain is difficult to see. In part because it’s so intertwined. Casin is a milk protein and you get it from mammals by husbandry and milking. Part of the husbandry is giving them food such as a bucket of grain and the likes of beets both of which are grown in enriched or fertilised ground. The soil enrichment obviously has it’s own supply chain, part of which is herbivore products such as waste and bones. So you in effect have no start to the supply chain.

lurker April 17, 2025 2:34 PM

@Clive Robinson

The one person who needs to read that Ars article, will not. He rants about Asia stealing US jobs and factories, when he should be asking his own captains of industry why they sold those jobs and factories to Asia.

Clive Robinson April 17, 2025 3:52 PM

@ ALL Windows 10 users,

Resistance is futile you will be upgraded to 11

Due to a “pre-emptive” cods-up Microsoft have revealed that they can force a Win-11 upgrade on a user, despite all admin settings saying it should not be done!

We’ve seen Microsoft force unwanted upgrades in the past such as with the early Win-10 nonsense. Which not only upset a lot of people it also cost others –on “pay for mobile data plans” that were both common and expensive or were abroad– more than it would have cost to buy a then top of the line large screen laptop…

It would appear Microsoft is trying to talk it’s way out by saying,

“The problem, according to the mega-corp’s advisory on the issue, is that “a recent service change uncovered a latent code issue, causing impact.” Not all users are affected, but those who are will see an invitation to upgrade to Windows 11 regardless of how their IT admins have configured Intune, Microsoft’s own PC management tool.”

https://www.theregister.com/2025/04/16/windows_11_bypasses_admin_polices/

But is that honestly true?

I and others feel it’s very definitely not true, because it took Microsoft quite a few steps to enable what was “hidden functionality” built into their own management system…

“This latest SNAFU, which has yet another bit of dodgy code at its root, has taken Windows 11 as a feature update and bypassed Intune policies to prevent installation. Unlike the Windows Server 2025 fiasco, this appears to be going through Microsoft’s own management platform.”

Make of it what you will but I would not be surprised in the slightest if at or shortly after Win-10 going out of service you get hit with an enforced upgrade that may very well break your functioning system if not entirely “brick-it” beyond most peoples ability to repair (happened with the forced Win-10 upgrade).

Microsoft are sending out signals that you will not have any choice, you will have, forced on you,

1, Win-11
2, Microsoft “surveillance by AI”.

There are only a couple or three ways out…

The first is to stop using Microsoft entirely which all things considered would be the best option if you can.

The second if you can is to disconnect your computer from all external communications so it can not upgrade any part of it.

Thirdly is have a backup policy that lets you just overwrite the entire Microsoft OS and if necessary Apps. Likewise if necessary set the date back to “the last known good time”.

Fourthly if you have the ability go back before Win-10 or to the early versions of Win-10.

There is another option but potentially it’s not within Microsoft’s User Agreement…

Which is install say Linux with Wine, and then install Win XP, 2000, Win-8 compatible apps to run in it. This has the advantage of not needing an MS OS licence. However if you have an OS licence and CDs/DVDs then you can use a “virtual system”. Back a decade ago “Virtualbox” –from Oracle– was one such system, but best avoided where you can.

Last time I looked Wine had got just under 30,000 apps runing on it satisfactorily and more pop up on a regular basis, see,

https://appdb.winehq.org

And keep the link in your bookmarks 😉

If you are going to install Linux, a round up of various opinions is “Go with Mint (I’m an old school CLI user so have my own odd preferences).

However not all users are up to dealing directly with Wine, which due to it’s needed flexibility can appear a bit complicated. There is a way out of this 😉 When you buy real wine in a shop it usually comes in a glass bottle. Well theres a Linux tool / application which is a “visual wrapper” for Wine called bottles. This is the most recent article I could find that talks about it,

https://www.howtogeek.com/running-windows-apps-on-linux-with-bottles/

Where you can I’d advise against using virtual systems because commercial interests in that space are creating a lot of FUD and other nonsense at the moment. No doubt in a bid to extract large quantities of extra money to make their recent VC type investors happy as quickly as possible.

One way that uses a commercial backed VM offering is described in,

https://www.windowscentral.com/how-setup-windows-10-virtual-machine-linux

(Note the DRM work around given in the “Bypassing Windows 11 installation errors” section).

Thus avoiding a commercial VM is if you can do it probably preferable. I’ve used earlier versions of QEMU,

https://www.qemu.org

That I use as an “emulator” to run verisons of MS-DOS and Win3.x to run Borland or Small-C K&R compilers under. In either 32bit or 16bit x86 CPU emulation, to support some really really old software I developed last century that the “user” does not want to stop using because “his fathers factory needs…” (The things we do for friends and sometimes family 😉

Unlike many people I’ve got full “payed for” licence for those earlier MS OS’s and Apps not a “bought with pre-instaled” licence that most have. Importantly the printed licences that comes with them does not prevent running them in either a virtual system or under Wine.

Just to show what an old grumpy I am I still prefer Win XP or for some odd development software Win 2000.

I’ve been doing the equivalent of Wine since the mid 1990’s, it was with the Consensys version of AT&T Unix Sys5v4 and DosMerge. That as I’ve mentioned before enabled me to run multiple 8bit processor ICE development systems One a 486 with 8port serial card. The big problem was that Motorola had developed their software so that each ICE normally needed it’s own 286 or better MS-DOS machine, which when you need six at the same time… I had it setup “in the lab” that had “air con on chill” and talked to it via a network cable to do software development from the comfort of my pleasantly temperate office desk (I also ran test instruments that way as well).

The thing is people have been “brain washed” into “MS is the only way” nonsense and now Microsoft are clearly abusing it via “rent seeking SaaS Cloud” and “AI privacy destroying surveillance” –via CoPilot and Recall– neither of which people should be trapped into.

MrSmith April 17, 2025 5:55 PM

@Clive “Windows 10 users”

Point of information: Both WINE and Steam’s proton (I.e. “Add an external game to Steam”) work with BATCH (.BAT) files as well as executables (.EXE). Very helpful if you want to “start” an old DOS-style command line interface window.

Also don’t overlook DOSBox, which rocks for older (REALLY older) software.

For webbrowsing under Linux everyone thinks of Firefox. But Google Chrome also works. (Download from Google & install with “dpkg -i”.)

Linux has come a long way. The OS UI (settings) are roughly comparable to Windows XP or perhaps Windows 7. Graphics work well, even Nvidia. Libreoffice suffices for non-corporate (home,school) word processing, spreadsheets, etc. VLC to watch DVDs & videos. Valve’s Steam has most of their game catalog working under Linux. It’s all really quite remarkable.

I’m kinda curious to see how many people “upgrade” to Win11, and how many switch?

ResearcherZero April 18, 2025 12:40 AM

Windows 11 sucks (it sucks even more when you are fishing and you get called home early from your holiday to “fix things” because everyone else is incapable…), but basically you should know a bunch of stuff before installing it or upgrading to it.

Bypass Microsoft Account (Windows Hello) and make a Local Account:

During Windows 11 Setup, after selecting a language and keyboard layout but before connecting to a network, hit Shift+F10 to open the command prompt (depending on your keyboard, you may also need to hit the Fn key before pressing F10). Type OOBE\BYPASSNRO, hit Enter, and wait for the PC to reboot.

When it comes back, click “I don’t have Internet” on the network setup screen, and you’ll have recovered the option to use “limited setup” (aka a local account) again, like older versions of Windows 10 and 11 offered.

For Windows 11 Pro users, there’s a command-line-free workaround you can take advantage of.

Proceed through the Windows 11 setup as you normally would, including connecting to a network and allowing the system to check for updates. Eventually, you’ll be asked whether you’re setting your PC up for personal use or for “work or school.”

Select the “work or school” option, then “sign-in options,” at which point you’ll finally be asked whether you plan to join the PC to a domain. Tell it you are (even though you aren’t), and you’ll see the normal workflow for creating a “limited” local account.

‘https://arstechnica.com/gadgets/2025/02/what-i-do-to-clean-up-a-clean-install-of-windows-11-23h2-and-edge/

For an older Windows 11 install – When installing Windows 11 and you reach the screen asking, “Let’s connect you to a network,” you can use the Shift+F10 keyboard combination to open a Windows command prompt.

At this prompt, type start ms-cxh:localonly and press Enter on your keyboard to open a “Microsoft account” window where you can create a new local user for the Windows 11 install.

https://pureinfotech.com/bypass-microsoft-account-setup-windows-11/

You may also want to remove Recall and CoPilot during Windows 11 setup:
https://pureinfotech.com/uninstall-recall-windows-11/

or using the winget command

https://answers.microsoft.com/en-us/windows/forum/all/how-do-i-uninstall-co-pilot-and-recall-from-my/21e950b6-89d9-4dce-9ac6-305cde530a3e

Save files locally instead of OneDrive:

https://umatechnology.org/make-windows-save-documents-locally-instead-of-onedrive/

ResearcherZero April 18, 2025 12:54 AM

If you use Group Policy Editor to disable installation of CoPilot it must be disabled for both Local Machine and Current User. Alternatively you could do this via the Registry.

(ReCall can be uninstalled like a normal program thankfully)

Make sure you read the following link because it makes things easier if you want to remove useless junk like ReCall and CoPilot during the Windows setup process. CoPilot is also installed into Microsoft’s Edge Browser and Notepad where it also needs to be disabled.

https://pureinfotech.com/bypass-microsoft-account-setup-windows-11/

ResearcherZero April 18, 2025 5:33 AM

State sponsored actors employing ClickFix social engineering techniques used by criminals.

‘https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix

Malicious services have high throughput and have a wide reach.
https://www.silentpush.com/blog/smishing-triad/

NTLM hash disclosure is being exploiting through spoofing to obtain passwords.
https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/

Clive Robinson April 18, 2025 5:38 AM

@ ResearcherZero, ALL,

Your point that,

“CoPilot is also installed into Microsoft’s Edge Browser and Notepad where it also needs to be disabled.”

Has the issue that as those programs contain ReCall and CoPilot functionality, there must be executable code for ReCall and CoPilot either embedded in or accessed via hooks.

Thus the question arises of,

“What executables need to be removed?”

Because if they remain we know Microsoft will just re-enable ReCall and CoPilot at every opportunity.

I’m not sure what percentage of people use Edge or Notepad, but I suspect it’s not great so “shiving those off” your computer may not cause problems. I don’t know as I’ve said I never did Win10 and have no intention of giving Win11 house room so have no experience.

But as for ReCall and CoPilot and all that surrounds them, the old “Apocalypse Now” movie line of “Terminate with extreme prejudice” somehow feels appropriate.

Leave a comment

Blog moderation policy

Login

Allowed HTML <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre> Markdown Extra syntax via https://michelf.ca/projects/php-markdown/extra/

Sidebar photo of Bruce Schneier by Joe MacInnis.