Anker charging accessories are up to half off right now

If you're racking your brain trying to find a last-minute gift or a stocking stuffer for a loved one, bear in mind that you can rarely go wrong with charging accessories. As it happens, many of Anker's products are on sale on Amazon right now, with discounts of up to 50 percent. Some of the discounts are available via a coupon and for others you'll need to be a Prime member. First up, the Anker 735 Charger will run you $30.39, which is 40 percent off the usual price of $56.

This is a 65W charger with two USB-C ports and one USB-A slot. When you have multiple devices connected, the charger can direct power to where it's most needed. It'll charge several devices at the same time, such as your laptop, Steam Deck and earphones. While Anker says this model is capable of giving a 13-inch 2020 MacBook Pro a 65W charge, other MacBook models have different wattage needs.

That's where Anker's MacBook Pro Charger could come in handy. It's capable of 100W USB-C charging. That'd be overkill for many devices, but not so for a power-hungry MBP. Of course, it's capable of charging other devices via USB-C. It comes with a five-foot cable. The charger is on sale for $24, which is $14 off the usual price of $38.

In some cases, USB chargers might not cut it. Many devices need the full power of an outlet and if you're running out of space, a power strip might be what you need. Not only does Anker's Surge Protector Power Strip have 12 outlets, you can plug in one USB-C and two USB-A cables too. There's surge protection as well. The power strip, which has a five-foot extension cord, is 17 percent off at $30.

If you're an iPhone user who hasn't upgraded to the latest generation yet, there's no harm in having a spare Lightning cable or two kicking around. As it happens, Anker sells Lightning cables, and one that's six feet long will currently cost you $10, $2 less than usual. The cable is MFi certified, meaning that it meets Apple's standards. It has a nylon exterior, which might make it more durable than Apple's own cables.

Of course, this being Anker, there are power banks on sale too. The Anker Nano Power Bank is 20 percent off the usual price of $30 (i.e. $6 off) when you apply a coupon. This is a small power bank with a built-in USB-C connector, so you can plug it straight into your phone or tablet to charge it up without having to carry a separate cable. There's a separate USB-C port too. Anker notes that the device won't fully charge an iPhone 15, but it will top up the battery by around 80 percent.

Last but not least, the Anker 737 Power Bank is for those who need plenty of extra juice with them when they're on the go. This model has a capacity of 24,000mAh, which Anker says is good for nearly five full charges of an iPhone 13 or 1.3 charges of a 12.9-inch 2021 iPad Pro. A smart display will show you the remaining battery percentage as well as how much wattage the charger is delivering to the connected devices (it has one USB-A port and dual USB-C ports). The 737 Power Bank, which is capable of delivering a 140W charge, is currently $58 off at $92.

Follow @EngadgetDeals on Twitter and subscribe to the Engadget Deals newsletter for the latest tech deals and buying advice.

This article originally appeared on Engadget at https://www.engadget.com/anker-charging-accessories-are-up-to-half-off-right-now-123523752.html?src=rss

Watch an AI robot learn how to demolish humans at a marble maze game

Researchers have developed an AI-powered robot they claim can beat the physical marble game Labyrinth faster than humans are capable of. Thomas Bi and Raffaello D’Andrea of ETH Zurich created CyberRunner, which combines model-based reinforcement with the dexterity required to beat a game that requires physical skill, coordination and precision.

For the uninitiated, the aim of the game is to guide a marble through a maze without falling into any holes. The player controls the movement of the ball by rotating two dials, which tilt the board.

CyberRunner learns through experience. A camera observes the game and an algorithm learns more about it from each attempt. "Based on its understanding of the game it recognizes which strategies and behaviors are more promising," the researchers say. As such, the robot kept getting better at the game.

The researchers gave CyberRunner and several humans around six hours of practice with the game. While the humans by and large struggled to beat Labyrinth after that time, CyberRunner was able to conquer it in just under 14.5 seconds. The researchers claim that's faster than any previously recorded time.

CyberRunner became so adept at the game that it was able to use some unintended shortcuts. The researchers had to step in and instruct the AI to follow the maze's correct path.

We've seen AI models outperform humans in other games, such as chess, Go and Dota 2. However, we haven't seen too many instances of AI performing better than humans in games that require a physical skill component.

Meanwhile, the researchers are open-sourcing CyberRunner. Maybe I can help train it to be better at Screwball Scramble than I ever was as a kid.

This article originally appeared on Engadget at https://www.engadget.com/watch-an-ai-robot-learn-how-to-demolish-humans-at-a-marble-maze-game-161554199.html?src=rss

Researchers found child abuse material in the largest AI image generation dataset

Researchers from the Stanford Internet Observatory say that a dataset used to train AI image generation tools contains at least 1,008 validated instances of child sexual abuse material. The Stanford researchers note that the presence of CSAM in the dataset could allow AI models that were trained on the data to generate new and even realistic instances of CSAM.

LAION, the non-profit that created the dataset, told 404 Media that it "has a zero tolerance policy for illegal content and in an abundance of caution, we are temporarily taking down the LAION datasets to ensure they are safe before republishing them." The organization added that, before publishing its datasets in the first place, it created filters to detect and remove illegal content from them. However, 404 points out that LAION leaders have been aware since at least 2021 that there was a possibility of their systems picking up CSAM as they vacuumed up billions of images from the internet. 

According to previous reports, the LAION-5B dataset in question contains "millions of images of pornography, violence, child nudity, racist memes, hate symbols, copyrighted art and works scraped from private company websites." Overall, it includes more than 5 billion images and associated descriptive captions (the dataset itself doesn't include any images but rather links to scraped images and alt text). LAION founder Christoph Schuhmann said earlier this year that while he was not aware of any CSAM in the dataset, he hadn't examined the data in great depth.

It's illegal for most institutions in the US to view CSAM for verification purposes. As such, the Stanford researchers used several techniques to look for potential CSAM. According to their paper, they employed "perceptual hash‐based detection, cryptographic hash‐based detection, and nearest‐neighbors analysis leveraging the image embeddings in the dataset itself." They found 3,226 entries that contained suspected CSAM. Many of those images were confirmed as CSAM by third parties such as PhotoDNA and the Canadian Centre for Child Protection.

Stability AI founder Emad Mostaque trained Stable Diffusion using a subset of LAION-5B data. The first research version of Google's Imagen text-to-image model was trained on LAION-400M, but that was never released; Google says that none of the following iterations of Imagen use any LAION datasets. A Stability AI spokesperson told Bloomberg that it prohibits the use of its test-to-image systems for illegal purposes, such as creating or editing CSAM.“This report focuses on the LAION-5B dataset as a whole,” the spokesperson said. “Stability AI models were trained on a filtered subset of that dataset. In addition, we fine-tuned these models to mitigate residual behaviors.”

Stable Diffusion 2 (a more recent version of Stability AI's image generation tool) was trained on data that substantially filtered out 'unsafe' materials from the dataset. That, Bloomberg notes, makes it more difficult for users to generate explicit images. However, it's claimed that Stable Diffusion 1.5, which is still available on the internet, does not have the same protections. "Models based on Stable Diffusion 1.5 that have not had safety measures applied to them should be deprecated and distribution ceased where feasible," the Stanford paper's authors wrote.

Correction, 4:30PM ET: This story originally stated that Google's Imagen tool used a subset of LAION-5B data. The story has been updated to note that Imagen used LAION-400M in its first research version, but hasn't used any LAION data since then. We apologize for the error.

This article originally appeared on Engadget at https://www.engadget.com/researchers-found-child-abuse-material-in-the-largest-ai-image-generation-dataset-154006002.html?src=rss

Pornhub and XVideos will be subject to the same strict EU rules as social media sites

The European Union says three porn sites are now subject to stricter rules under the Digital Services Act (DSA). The bloc has designated Pornhub, Stripchat and XVideos as "very large online platforms" (VLOPs) after determining that they each have an average of more than 45 million monthly users in the EU. As such, the three sites are subject to the same stringent rules as the likes of Facebook, Instagram, X and TikTok.

The European Commission (the EU's executive arm) says VLOPs have until February 17 to comply with the DSA's general requirements. Those include making it easy for users to flag illegal content, prioritizing reports from "trusted flaggers," providing a means of appeal for content moderation decisions, publishing an annual transparency report detailing content moderation processes and bolstering their systems to "ensure a high level of privacy, security and safety of minors."

The three porn sites also have four months to comply with additional obligations. For instance, they're required to have mitigation measures in place to prevent the spread of illegal content. This, according to the Commission, includes "child sexual abuse material and content affecting fundamental rights, such as the right to human dignity and private life in case of non-consensual sharing of intimate material online or deepfake pornography." The three sites must also offer researchers publicly available data and be subject to an annual external independent audit. The Commission says these measures will "empower and protect users online, including minors, and duly assess and mitigate any systemic risks stemming from their services."

The Commission says it will keep a close eye on the three porn sites to make sure they comply with the rules, "especially concerning the measures to protect minors from harmful content and to address the dissemination of illegal content." 

When asked for comment, Pornhub directed Engadget to a statement claiming that "as of July 31, 2023, Pornhub has 33 million average monthly recipients of the service in the European Union, calculated as an average over the period of the past six months." As such, Pornhub disputes the EU's claim that it has more that 45 million monthly users in the bloc. Engadget has also asked XVideos and Stripchat for comment.

The penalties for failing to comply with the DSA's requirements are severe. Platform holders can be fined up to six percent of their annual global revenue. The Commission may also issue penalties of up to five percent of average daily worldwide revenue for each delayed day that VLOPs fail to abide by remedies, interim measures or commitments. In extreme cases, the EC can also ask national courts to temporarily block access to a given service.

The Commission, which designated its first 19 Very Large Online Platforms and Search Engines under the DSA in April, is already holding some VLOPs to account. Earlier this week, the EU opened formal infringement proceedings into X over potential violations of the DSA. Among other things, investigators are looking into whether the platform is doing enough to mitigate risks to "civic discourse and electoral processes." They're also examining the "suspected deceptive design" of features such as paid checkmarks. In October, the EU said it was looking into Meta's and TikTok's handling of the conflict between Israel and Hamas under the DSA.

Update 12/20 8:38AM ET: Added Pornhub's statement.

This article originally appeared on Engadget at https://www.engadget.com/pornhub-and-xvideos-will-be-subject-to-the-same-strict-eu-rules-as-social-media-sites-123922469.html?src=rss

Volkswagen, Audi and Porsche are finally switching to Tesla’s charging standard

Volkswagen is the latest automaker to embrace Tesla's North American Charging Standard (NACS) in electric vehicles. Subsidiaries Audi, Porsche and Scout Motors will implement the NACS in their North American EVs starting in 2025 as well.

The VW brands are also looking into providing owners of existing models with adapters so they can tap into Tesla's Supercharger network. There are more than 15,000 Supercharger stations in North America. VW's EVs will be able to charge at those in addition to more than 3,800 DC fast charging outlets run by Electrify America and Electrify Canada.

With so many carmakers adopting the NACS, Tesla's charging solution is becoming a de facto standard. GM, Volvo, Polestar, Mercedes, Honda, BMW, Lucid and others have all pledged to support NACS charging within the next couple of years.

On the other hand, ChargePoint started rolling out support for the NACS across its EV charging network in October. Electrify America plans to offer the NACS connector at its stations by 2025 as well.

This article originally appeared on Engadget at https://www.engadget.com/volkswagen-finally-confirms-itll-switch-its-evs-to-teslas-charging-standard-101517391.html?src=rss

Watch Blue Origin’s first launch in 15 months here at 11:37AM ET

Blue Origin is taking another stab at its first launch in 15 months as New Shepard's 24th mission is scheduled to take flight on Tuesday. The company had to scrub a planned launch on Monday due to a ground system issue. Today's launch window opens at 11:37AM ET and the webcast starts 20 minutes beforehand. You can watch the launch below.

The uncrewed science mission has 33 payloads, more than half of which were developed by NASA, Blue Origin says. The other payloads are from K-12 schools, universities and STEAM-centric organizations. The manifest also includes 38,000 student postcards from the Club for the Future initiative.

The Federal Aviation Administration grounded New Shepard after an uncrewed launch attempt in September 2022 didn't go as planned. The booster failed after takeoff but it was able to separate successfully from the capsule. Although the capsule made a safe parachute landing, the booster was destroyed when it hit the ground in a designated hazard area.

This article originally appeared on Engadget at https://www.engadget.com/watch-blue-origins-first-launch-in-15-months-here-at-1137am-et-160030131.html?src=rss

Xfinity suffered a data breach but doesn’t know quite how bad it was

Xfinity says a data breach likely led to attackers obtaining customers' usernames and hashed passwords. Other personal information may have been exposed, such as names, contact information, the last four digits of social security numbers, dates of birth and secret questions and answers. The company added that its analysis of the attack is ongoing, which may explain why it hasn't disclosed the number of customers who have been affected. Xfinity also notes that it informed law enforcement about the incident.

On October 10, Citrix disclosed a vulnerability in software that Xfinity and many other businesses use. It provided guidance on how to mitigate the vulnerability on October 23 and Xfinity said it swiftly patched the problem. However, while carrying out a routine cybersecurity check two days later, Xfinity spotted suspicious activity in its systems. It later determined that bad actors accessed its internal network between October 16 and 19.

Xfinity says it's informing customers of the incident via its website, email and by other means. It's urging them to change their passwords, to make sure they don't use the same passwords on different accounts and to enable two-factor or multi-factor authentication. Xfinity also suggested that folks who use the same login credentials on other accounts change their passwords on those.

This isn't the first security incident Xfinity has had to deal with. Back in 2018, it emerged there was a bug in a Comcast website used to activate Xfinity routers. The issue led to some customers' home addresses being exposed, along with the name and password for their Wi-Fi networks.

This article originally appeared on Engadget at https://www.engadget.com/xfinity-suffered-a-data-breach-but-doesnt-know-quite-how-bad-it-was-100711214.html?src=rss

Xfinity suffered a data breach but doesn’t know quite how bad it was

Xfinity says a data breach likely led to attackers obtaining customers' usernames and hashed passwords. Other personal information may have been exposed, such as names, contact information, the last four digits of social security numbers, dates of birth and secret questions and answers. The company added that its analysis of the attack is ongoing, which may explain why it hasn't disclosed the number of customers who have been affected. Xfinity also notes that it informed law enforcement about the incident.

On October 10, Citrix disclosed a vulnerability in software that Xfinity and many other businesses use. It provided guidance on how to mitigate the vulnerability on October 23 and Xfinity said it swiftly patched the problem. However, while carrying out a routine cybersecurity check two days later, Xfinity spotted suspicious activity in its systems. It later determined that bad actors accessed its internal network between October 16 and 19.

Xfinity says it's informing customers of the incident via its website, email and by other means. It's urging them to change their passwords, to make sure they don't use the same passwords on different accounts and to enable two-factor or multi-factor authentication. Xfinity also suggested that folks who use the same login credentials on other accounts change their passwords on those.

This isn't the first security incident Xfinity has had to deal with. Back in 2018, it emerged there was a bug in a Comcast website used to activate Xfinity routers. The issue led to some customers' home addresses being exposed, along with the name and password for their Wi-Fi networks.

This article originally appeared on Engadget at https://www.engadget.com/xfinity-suffered-a-data-breach-but-doesnt-know-quite-how-bad-it-was-100711214.html?src=rss

Xfinity breach may have affected as many as 35.8 million customers

Xfinity says a data breach likely led to attackers obtaining customers' usernames and hashed passwords. Other personal information may have been exposed, such as names, contact information, the last four digits of social security numbers, dates of birth and secret questions and answers. The company added that its analysis of the attack is ongoing and it has informed law enforcement about the incident.

In a filing with Maine's attorney general's office, Xfinity owner Comcast disclosed that the intrusion has impacted 35.8 million people. As TechCrunch points out, Comcast had 32.3 million broadband customers as of the end of September, indicating that the vast majority of Xfinity customers have been affected by the breach.

On October 10, Citrix disclosed a vulnerability in software that Xfinity and many other businesses use. It provided guidance on how to mitigate the vulnerability on October 23 and Xfinity said it swiftly patched the problem. However, while carrying out a routine cybersecurity check two days later, Xfinity spotted suspicious activity in its systems. It later determined that bad actors accessed its internal network between October 16 and 19.

Xfinity says it's informing customers of the incident via its website, email and by other means. It's urging them to change their passwords, to make sure they don't use the same passwords on different accounts and to enable two-factor or multi-factor authentication. Xfinity also suggested that folks who use the same login credentials on other accounts change their passwords on those.

This isn't the first security incident Xfinity has had to deal with. Back in 2018, it emerged there was a bug in a Comcast website used to activate Xfinity routers. The issue led to some customers' home addresses being exposed, along with the name and password for their Wi-Fi networks.

Update 12/19 8:00AM ET: Updated to note the number of people who were impacted by the breach.

This article originally appeared on Engadget at https://www.engadget.com/xfinity-suffered-a-data-breach-but-doesnt-know-quite-how-bad-it-was-100711214.html?src=rss

Nikola founder Trevor Milton sentenced to four years in prison

Trevor Milton, the disgraced founder of Nikola, was just sentenced to four years in prison on three counts of fraud. 

In October 2022, a jury found Milton guilty of one count of securities fraud and two counts of wire fraud. Milton faced up to 60 years in prison. Prosecutors asked the judge for an 11-year prison sentence and a $5 million fine, according to The New York Times, while the defense argued for probation. 

After announcing the sentence at a federal court hearing in New York City, U.S. District Judge Edgar Ramos spoke directly to Milton. "As difficult as it may be for you or your family to hear, I believe the jury got it right," Ramos said, as transcribed Reuters.

Milton addressed the court before sentencing was handed down, saying "I did not intend to harm anyone and I did not commit those crimes levied against me." He also spoke at length about his rural upbringing and recited biblical verse. 

Prosecutors claimed that Milton pumped up the value of the company's stock by lying to investors about "nearly all aspects" of Nikola's business. Among other things, Milton claimed his company had a fully functional electric truck. The company released a video that made it appear as though a Nikola One prototype was able to move by itself. However, an indictment alleged that the truck was actually rolling down a hill and that Milton was involved in the video's creation.

In addition, Milton was accused of lying about Nikola having billions of dollars worth of pre-order reservations and that it was producing hydrogen fuel at four times less than market rates. Prosecutors also said Milton falsely claimed Nikola had developed "game-changing" battery tech.

Nikola is still in business and it plans to resume deliveries of its battery electric truck in early 2024 following a recall over battery issues that cost around $61.8 million to resolve. In the nine months to September 30, Nikola produced 96 trucks and shipped 79.

The company's stock price has dropped by 99 percent since 2020 and investors are said to have lost more than $660 million. Milton sold around $100 million of his Nikola stock in 2020 and spent most of that on luxury goods such as a plane and real estate, according to the Times. It's likely that Milton will appeal this conviction, as he's already asked Ramos for a new trial following the jury's guilty verdict.

This article originally appeared on Engadget at https://www.engadget.com/nikola-founder-trevor-milton-sentenced-to-four-years-in-prison-192432136.html?src=rss