Most of the time, when kids accidentally gulp down a non-edible object, it travels toward the stomach. In the best-case scenarios for these unfortunate events, it’s a small, benign object that safely sees itself out in a day or two. But in the worst-case scenarios, it can go down an entirely different path.
That was the case for a poor teen in California, who somehow swallowed a quarter. The quarter didn’t head down the esophagus and toward the stomach, but veered into the airway, sliding passed the vocal cords like they were a vending-machine coin slot.
Enlarge/ Radiographs of the chest (Panel A, postero- anterior view) and neck (Panel B, lateral view). Removal with optical forceps (Panel C and Video 1), and reinspection of ulceration (Panel D, asterisks)
In a clinical report published recently in the New England Journal of Medicine, doctors who treated the 14-year-old boy reported how they found—and later retrieved—the quarter from its unusual and dangerous resting place. Once it passed the vocal cords and the glottis, the coin got lodged in the subglottis, a small region between the vocal cords and the trachea.
Luckily, when the boy arrived at the emergency department, his main symptoms were hoarseness and difficulty swallowing. He was surprisingly breathing comfortably and without drooling, they noted. But imaging quickly revealed the danger his airway was in when the vertical coin lit up his scans.
“Airway foreign bodies—especially those in the trachea and larynx—necessitate immediate removal to reduce the risk of respiratory compromise,” they wrote in the NEJM report.
The teen was given general anesthetic while doctors used long, optical forceps, guided by a camera, to pluck the coin from its snug spot. After grabbing the coin, they re-inspected the boy’s airway noting ulcerations on each side matching the coin’s ribbed edge.
After the coin’s retrieval, the boy’s symptoms improved and he was discharged home, the doctors reported.
We’ve come a long way since primitive AI music generators in 2022. Today, AI tools like Suno.ai allow any series of words to become song lyrics, including inside jokes (as you’ll see below). On Wednesday, prompt engineer Riley Goodside tweeted an AI-generated song created with the prompt “sad girl with piano performs the text of the MIT License,” and it began to circulate widely in the AI community online.
The MIT License is a famous permissive software license created in the late 1980s, frequently used in open source projects. “My favorite part of this is ~1: 25 it nails ‘WARRANTIES OF MERCHANTABILITY’ with a beautiful Imogen Heap-style glissando then immediately pronounces ‘FITNESS’ as ‘fistiff,'” Goodside wrote on X.
Suno (which means “listen” in Hindi) was formed in 2023 in Cambridge, Massachusetts. It’s the brainchild of Michael Shulman, Georg Kucsko, Martin Camacho, and Keenan Freyberg, who formerly worked at companies like Meta and TikTok. Suno has already attracted big-name partners, such as Microsoft, which announced the integration of an earlier version of the Suno engine into Bing Chat last December. Today, Suno is on v3 of its model, which can create temporally coherent two-minute songs in many different genres.
The company did not reply to our request for an interview by press time. In March, Brian Hiatt of Rolling Stone wrote a profile about Suno that describes the service as a collaboration between OpenAI’s ChatGPT (for lyric writing) and Suno’s music generation model, which some experts think has likely been trained on recordings of copyrighted music without license or artist permission.
It’s exactly this kind of service that upset over 200 musical artists enough last week that they signed an Artist Rights Alliance open letter asking tech companies to stop using AI tools to generate music that could replace human artists.
Considering the unknown provenance of the training data, ownership of the generated songs seems like a complicated question. Suno’s FAQ says that music generated using its free tier remains owned by Suno and can only be used for non-commercial purposes. Paying subscribers reportedly own generated songs “while subscribed to Pro or Premier,” subject to Suno’s terms of service. However, the US Copyright Office took a stance last year that purely AI-generated visual art cannot be copyrighted, and while that standard has not yet been resolved for AI-generated music, it might eventually become official legal policy as well.
The Moonshark song
Enlarge/ A screenshot of the Suno.ai website showing lyrics of an AI-generated “Moonshark” song.
Benj Edwards
While using the service, Suno appears to have no trouble creating unique lyrics based on your prompt (unless you supply your own) and sets those words to stylized genres of music it generates based on its training dataset. It dynamically generates vocals as well, although they include audible aberrations. Suno’s output is not indistinguishable from high-fidelity human-created music yet, but given the pace of progress we’ve seen, that bridge could be crossed within the next year.
To get a sense of what Suno can do, we created an account on the site and prompted the AI engine to create songs about our mascot, Moonshark, and about barbarians with CRTs, two insidejokes at Ars. What’s interesting is that although the AI model aced the task of creating an original song for each topic, both songs start with the same line, “In the depths of the digital domain.” That’s possibly an artifact of whatever hidden prompt Suno is using to instruct ChatGPT when writing the lyrics.
Suno is arguably a fun toy to experiment with and doubtless a milestone in generative AI music tools. But it’s also an achievement tainted by the unresolved ethical issues related to scraping musical work without the artist’s permission. Then there’s the issue of potentially replacing human musicians, which has not been far from the minds of people sharing their own Suno results online. On Monday, AI influencer Ethan Mollick wrote, “I’ve had a song from Suno AI stuck in my head all day. Grim milestone or good one?”
Former Apple design lead Jony Ive and current OpenAI CEO Sam Altman are seeking funding for a new company that will produce an “artificial intelligence-powered personal device,” according to The Information‘s sources, who are said to be familiar with the plans.
The exact nature of the device is unknown, but it will not look anything like a smartphone, according to the sources. We first heard tell of this venture in the fall of 2023, but The Information’s story reveals that talks are moving forward to get the company off the ground.
Ive and Altman hope to raise at least $1 billion for the new company. The complete list of potential funding sources they’ve spoken with is unknown, but The Information’s sources say they are in talks with frequent OpenAI investor Thrive Capital as well as Emerson Collective, a venture capital firm founded by Laurene Powell Jobs.
SoftBank CEO and super-investor Masayoshi Son is also said to have spoken with Altman and Ive about the venture. Financial Times previously reported that Son wanted Arm (another company he has backed) to be involved in the project.
Obviously, those are some of the well-established and famous names within today’s tech industry. Personal connections may play a role; for example, Jobs is said to have a friendship with both Ive and Altman. That might be critical because the pedigree involved could scare off smaller investors since the big names could drive up the initial cost of investment.
Although we don’t know anything about the device yet, it would likely put Ive in direct competition with his former employer, Apple. It has been reported elsewhere that Apple is working on bringing powerful new AI features to iOS 18 and later versions of the software for iPhones, iPads, and the company’s other devices.
Altman already has his hands in several other AI ventures besides OpenAI. The Information reports that there is no indication yet that OpenAI would be directly involved in the new hardware company.
The Federal Communications Commission chair decided not to impose Universal Service fees on Internet service, rejecting arguments for new assessments to shore up an FCC fund that subsidizes broadband network expansions and provides discounts to low-income consumers.
The $8 billion-a-year Universal Service Fund (USF) pays for FCC programs such as Lifeline discounts and Rural Digital Opportunity Fund deployment grants for ISPs. Phone companies must pay a percentage of their revenue into the fund, and telcos generally pass those fees on to consumers with a “Universal Service” line item on telephone bills.
Imposing similar assessments on broadband could increase the Universal Service Fund’s size and/or reduce the charges on phone service, spreading the burden more evenly across different types of telecommunications services. Some consumer advocates want the FCC to increase the fund in order to replace the Affordable Connectivity Program (ACP), a different government program that gives $30 monthly broadband discounts to people with low incomes but is about to run out of money because of inaction by Congress.
Imposing Universal Service charges on broadband would likely result in ISPs adding those costs to monthly bills and would make the net neutrality proceeding even more of a political minefield than it already is. FCC Chairwoman Jessica Rosenworcel’s net neutrality proposal takes the same stance against requiring Universal Service contributions that the FCC took in 2015 when it first imposed the net neutrality rules.
“We conclude that forbearing from imposing new universal service contribution requirements on BIAS [Broadband Internet Access Service] is in the public interest,” Rosenworcel’s proposal says. “For one thing, we agree with commenters who warn that suddenly and unnecessarily imposing new fees on broadband service could pose ‘major upheaval in what is actually a stable and equitable contribution system.’ Rather than risk this upheaval, we believe it in the public interest to proceed cautiously and incrementally.”
The deferral of action on Universal Service funding is welcome news to cable lobby group NCTA-The Internet & Television Association, even though it opposes the net neutrality plan overall. The NCTA has urged the FCC “to resist calls for immediate action and instead defer to Congress on the complex and controversial issues surrounding contribution reform.” Assessments on broadband “would almost certainly result in new passed-through fees not previously assessed on these services” and “may harm broadband adoption,” the NCTA says.
Broadband industry lobby group USTelecom has called for Big Tech firms to pay into the Universal Service Fund, an argument that has also been made repeatedly by Republican FCC Commissioner Brendan Carr.
Rosenworcel may be inclined to let Congress tackle broadband contributions to Universal Service. Her draft plan also raises the possibility of the FCC addressing the issue on its own in a separate proceeding:
Contrary to the assumption of some commenters, Commission efforts remain ongoing in this area. Congress has also been actively deliberating on legislative proposals to reform the USF contribution and funding mechanisms. USF contribution reform is an immensely complex and delicate undertaking with far-reaching consequences, and we believe that any decisions on whether and how to make BIAS providers contribute to USF funding are best addressed holistically in those ongoing discussions of USF contribution reform, on a full record and with robust input from all interested parties, rather than in this proceeding.
Hackers are actively exploiting a pair of recently discovered vulnerabilities to remotely commandeer network-attached storage devices manufactured by D-Link, researchers said Monday.
Roughly 92,000 devices are vulnerable to the remote takeover exploits, which can be remotely transmitted by sending malicious commands through simple HTTP traffic. The vulnerability came to light two weeks ago. The researcher said they were making the threat public because D-Link said it had no plans to patch the vulnerabilities, which are present only in end-of-life devices, meaning they are no longer supported by the manufacturer.
An ideal recipe
On Monday, researchers said their sensors began detecting active attempts to exploit the vulnerabilities starting over the weekend. Greynoise, one of the organizations reporting the in-the-wild exploitation, said in an email that the activity began around 02: 17 UTC on Sunday. The attacks attempted to download and install one of several pieces of malware on vulnerable devices depending on their specific hardware profile. One such piece of malware is flagged under various names by 40 endpoint protection services.
Security organization Shadowserver has also reported seeing scanning or exploits from multiple IP addresses but didn’t provide additional details.
The vulnerability pair, found in the nas_sharing.cgi programming interface of the vulnerable devices, provide an ideal recipe for remote takeover. The first, tracked as CVE-2024-3272 and carrying a severity rating of 9.8 out of 10, is a backdoor account enabled by credentials hardcoded into the firmware. The second is a command-injection flaw tracked as CVE-2024-3273 and has a severity rating of 7.3. It can be remotely activated with a simple HTTP GET request.
Netsecfish, the researcher who disclosed the vulnerabilities, demonstrated how a hacker could remotely commandeer vulnerable devices by sending a simple set of HTTP requests to them. The code looks like this:
GET /cgi-bin/nas_sharing.cgiuser=messagebus&passwd=&cmd=15&system=
In the exploit example below, the text inside the first red rectangle contains the hardcoded credentials—username messagebus and an empty password field—while the next rectangle contains a malicious command string that has been base64 encoded.
netsecfish
“Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the system, potentially leading to unauthorized access to sensitive information, modification of system configurations, or denial of service conditions,” netsecfish wrote.
Last week, D-Link published an advisory. D-Link confirmed the list of affected devices:
The best defense against these attacks and others like them is to replace hardware once it reaches end of life. Barring that, users of EoL devices should at least ensure they’re running the most recent firmware. D-Link provides this dedicated support page for legacy devices for owners to locate the latest available firmware. Another effective protection is to disable UPnP and connections from remote Internet addresses unless they’re absolutely necessary and configured correctly.
Enlarge/ The plague bacteria, Yersina pestis, is a close relative of the toxin-producing species studied here.
Life-forms with no brain are capable of some astounding things. It might sound like sci-fi nightmare fuel, but some bacteria can wage kamikaze chemical warfare.
Pathogenic bacteria make us sick by secreting toxins. While the release of smaller toxin molecules is well understood, methods of releasing larger toxin molecules have mostly eluded us until now. Researcher Stefan Raunser, director of the Max Planck Institute of Molecular Physiology, and his team finally found out how the insect pathogen Yersinia entomophaga (which attacks beetles) releases its large-molecule toxin.
They found that designated “soldier cells” sacrifice themselves and explode to deploy the poison inside their victim. “YenTc appears to be the first example of an anti-eukaryotic toxin using this newly established type of secretion system,” the researchers said in a study recently published in Nature.
Silent and deadly
Y. entomophaga is part of the Yersinia genus, relatives of the plague bacteria, which produce what are known as Tc toxins. Their molecules are huge as far as bacterial toxins go, but, like most smaller toxin molecules, they still need to make it through the bacteria’s three cell membranes before they escape to damage the host. Raunser had already found in a previous study that Tc toxin molecules do show up outside the bacteria. What he wanted to see next was how and when they exit the bacteria that makes them.
To find out what kind of environment is ideal for Y. entomophaga to release YenTC, the bacteria were placed in acidic (PH under 7) and alkaline (PH over 7) mediums. While they did not release much in the acidic medium, the bacteria thrived in the high PH of the alkaline medium, and increasing the PH led it to release even more of the toxin. The higher PH environment in a beetle is around the mid-end of its gut, so it is now thought that most of the toxin is liberated when the bacteria reach that area.
How YenTc is released was more difficult to determine. When the research team used mass spectrometry to take a closer look at the toxin, they found that it was missing something: There was no signal sequence that indicated to the bacteria that the protein needed to be transported outside the bacterium. Signal sequences, also known as signal peptides, are kind of like built-in tags for secretion. They are in charge of connecting the proteins (toxins are proteins) to a complex at the innermost cell membrane that pushes them through. But YenTC apparently doesn’t need a signal sequence to export its toxins into the host.
About to explode
So how does this insect killer release YenTc, its most formidable toxin? The first test was a process of elimination. While YenTc has no signal sequence, the bacteria have different secretion systems for other toxins that it releases. Raunser thought that knocking out these secretion systems using gene editing could possibly reveal which one was responsible for secreting YenTc. Every secretion system in Y. entomophaga was knocked out until no more were left, yet the bacteria were still able to secrete YenTc.
The researchers then used fluorescence microscopy to observe the bacteria releasing its toxin. They inserted a gene that encodes a fluorescent protein into the toxin gene so the bacteria would glow when making the toxin. While not all Y. entomophaga cells produced YenTc, those that did (and so glowed) tended to be larger and more sluggish. To induce secretion, PH was raised to alkaline levels. Non-producing cells went about their business, but YenTc-expressing cells only took minutes to collapse and release the toxin.
This is what’s called a lytic secretion system, which involves the rupture of cell walls or membranes to release toxins.
“This prime example of self-destructive cooperation in bacteria demonstrates that YenTc release is the result of a controlled lysis strictly dedicated to toxin release rather than a typical secretion process, explaining our initially perplexing observation of atypical extracellular proteins,” the researchers said in the same study.
Yersinia also includes pathogenic bacteria that cause tuberculosis and bubonic plague, diseases that have devastated humans. Now that the secretion mechanism of one Yersinia species has been found out, Raunser wants to study more of them, along with other types of pathogens, to see if any others have kamikaze soldier cells that use the same lytic mechanism of releasing toxins.
The discovery of Y. entomophaga’s exploding cells could eventually mean human treatments that target kamikaze cells. In the meantime, we can at least be relieved we aren’t beetles.
Enlarge/ Artistic rendition of a black hole merging with a neutron star. LIGO/VIRGO/KAGRA detected a merger involving a neutron star and what might be a very light black hole falling within the “mass gap” range.
LIGO-India/ Soheb Mandhai
The LIGO/VIRGO/KAGRA collaboration searches the universe for gravitational waves produced by the mergers of black holes and neutron stars. It has now announced the detection of a signal indicating a merger between two compact objects, one of which has an unusual intermediate mass—heavier than a neutron star and lighter than a black hole. The collaboration provided specifics of their analysis of the merger and the “mystery object” in a draft manuscript posted to the physics arXiv, suggesting that the object might be a very low-mass black hole.
LIGO detects gravitational waves via laser interferometry, using high-powered lasers to measure tiny changes in the distance between two objects positioned kilometers apart. LIGO has detectors in Hanford, Washington state, and in Livingston, Louisiana. A third detector in Italy, Advanced VIRGO, came online in 2016. In Japan, KAGRA is the first gravitational-wave detector in Asia and the first to be built underground. Construction began on LIGO-India in 2021, and physicists expect it will turn on sometime after 2025.
To date, the collaboration has detected dozens of merger events since its first Nobel Prize-winning discovery. Early detected mergers involved either two black holes or two neutron stars, but in 2021, LIGO/VIRGO/KAGRA confirmed the detection of two separate “mixed” mergers between black holes and neutron stars.
Most objects involved in the mergers detected by the collaboration fall into two groups: stellar-mass black holes (ranging from a few solar masses to tens of solar masses) and supermassive black holes, like the one in the middle of our Milky Way galaxy (ranging from hundreds of thousands to billions of solar masses). The former are the result of massive stars dying in a core-collapse supernova, while the latter’s formation process remains something of a mystery. The range between the heaviest known neutron star and the lightest known black hole is known as the “mass gap” among scientists.
There have been gravitational wave hints of compact objects falling within the mass gap before. For instance, as reported previously, in 2019, LIGO/VIRGO picked up a gravitational wave signal from a black hole merger dubbed “GW190521,” that produced the most energetic signal detected thus far, showing up in the data as more of a “bang” than the usual “chirp.” Even weirder, the two black holes that merged were locked in an elliptical (rather than circular) orbit, and their axes of spin were tipped far more than usual compared to those orbits. And the new black hole resulting from the merger had an intermediate mass of 142 solar masses—smack in the middle of the mass gap.
That same year, the collaboration detected another signal, GW 190814, a compact binary merger involving a mystery object that also fell within the mass gap. With no corresponding electromagnetic signal to accompany the gravitational wave signal, astrophysicists were unable to determine whether that object was an unusually heavy neutron star or an especially light black hole. And now we have a new mystery object within the mass gap in a merger event dubbed “GW 230529.”
“While previous evidence for mass-gap objects has been reported both in gravitational and electromagnetic waves, this system is especially exciting because it’s the first gravitational-wave detection of a mass-gap object paired with a neutron star,” said co-author Sylvia Biscoveanu of Northwestern University. “The observation of this system has important implications for both theories of binary evolution and electromagnetic counterparts to compact-object mergers.”
Enlarge/ See where this discovery falls within the mass gap.
Shanika Galaudage / Observatoire de la Côte d’Azur
LIGO/VIRGO/KAGRA started its fourth observing run last spring and soon picked up GW 230529’s signal. Scientists determined that one of the two merging objects had a mass between 1.2 to 2 times the mass of our sun—most likely a neutron star—while the other’s mass fell in the mass-gap range of 2.5 to 4.5 times the mass of our sun. As with GW 190814, there were no accompanying bursts of electromagnetic radiation, so the team wasn’t able to conclusively identify the nature of the more massive mystery object located some 650 million light-years from Earth, but they think it is probably a low-mass black hole. If so, the finding implies an increase in the expected rate of neutron star–black hole mergers with electromagnetic counterparts, per the authors.
“Before we started observing the universe in gravitational waves, the properties of compact objects like black holes and neutron stars were indirectly inferred from electromagnetic observations of systems in our Milky Way,” said co-author Michael Zevin, an astrophysicist at the Adler Planetarium. “The idea of a gap between neutron-star and black-hole masses, an idea that has been around for a quarter of a century, was driven by such electromagnetic observations. GW230529 is an exciting discovery because it hints at this ‘mass gap’ being less empty than astronomers previously thought, which has implications for the supernova explosions that form compact objects and for the potential light shows that ensue when a black hole rips apart a neutron star.”
Canadian telecom Bell Canada has been pushing its cloud-based DVR service to its Fibe TV subscribers for years. While it has given customers advantages, like the ability to view their recordings from more devices, such as phones, compared to using local DVR storage, users don’t have as much control over the recordings as they thought they had.
On May 1, Fibe TV will automatically delete recordings stored on its Cloud PVR (personal video recorder) offering once the recordings hit 61 days of age, as confirmed by Canadian online newspaper Daily Hive. Currently, customers maintain access to recordings stored via Cloud PVR for 365 days.
Fibe TV apparently started alerting customers of the upcoming change this month.
A Bell Canada spokesperson, Jacqueline Michelis, minimized the idea of disruption to customers, telling Daily Hive: “The viewing of nearly all recordings takes place within 60 days, so there is minimal impact to customers.” Michelis didn’t provide more details on how Bell Canada arrived at this conclusion.
An X user (formerly Twitter) user going by SimonDingleyTV shared what he said was a notice he received from Fibe TV about the policy change. He claimed that a company representative told him that the reason for the change was to “save space.”
Bell updated its website to acknowledge the time limit and noted that Cloud PVR also has a limit of up to 320 hours of recordings. If users surpass that limit, the oldest recordings will start getting deleted.
“Absolutely ridiculous”
Customers have turned to Bell Canada’s online support forum to share their discontent with the changes, with some saying that they don’t align with the services they expected to receive when signing up for Fibe TV. Thankfully, Bell Canada won’t be able to delete recordings stored on DVR hardware inside customers’ homes.
Other complaints are coming from users whose recordings are being deleted even when they haven’t come close to maxing out their cloud storage or if their recordings aren’t available on demand.
A user going by camisotro on Bell Canada’s online support forum called the announcement “absolutely ridiculous” and condemned what they perceived to be years of telecoms pushing back against users’ ability to record content:
… Bell eliminated the option for any device that actually records TV locally, forcing customers onto an inferior TV box with ‘Cloud PVR.’ Now they are nerfing it to a nearly useless 60 days of recording. This is not the service I signed up for on contract, and yet I am still continuing to pay increasing prices.
Like rivals, Bell pushed customers toward cloud-based DVR, with its website stating, “Fibe TV has evolved to a cloud-based storage system for all your recordings.”
However, some users may not have realized the trade-offs.
“Wish I knew this before I traded PVRs to change to cloud storage! No one told us that !!!,” a forum user known as Crazy aunt said.
Another user, Thornquills, called the news a “deal-breaker” because they’re “paying $10.00/month for cloud storage,” and “2 months is too restrictive, in my opinion.”
Meanwhile, Bell Canada rival Rogers Ignite confirmed to The Canadian Press that it will continue allowing its customers to keep DVR recordings stored in the cloud for one year, as its cloud PVR offering exists to “help manage storage capacity.”
Fibe TV’s policy change comes about two months after Bell Canada announced that it was laying off 4,800 workers and selling 45 of its 103 radio stations.
Chipolo’s trackers. The keychain tracker takes a CR2023 battery; the card is not rechargeable.
Pebblebee’s trackers are all rechargeable.
Google’s “Find My Device” app.
Google
After an announcement that ended up being a year early, Android’s version of Tile/AirTags is ready to launch. Google has been gearing up on the software side of things to enable a Bluetooth tracking network on Android, and the company’s two tracking tag hardware partners, Pebblebee and Chipolo, now have ship dates. The two companies each have a press release today, with Pebblebee saying its trackers will ship in “late May,” while Chipolo says it will ship “after May 27th.” Google has a blog post out, too, promising “additional Bluetooth tags from Eufy, Jio, Motorola and more” later this year.
Both sets of devices have been up for preorder for a year now, and it doesn’t seem like anything has changed since. Both companies are offering little Bluetooth trackers in a keychain tag or credit card format, and Pebblebee has a third stick-on tag format. They’ll all be anonymously tracked by Android’s 3 billion-device Bluetooth tracker network, and the device owner will be able to see them in Google’s “Find my device” app.
Chipolo’s “One Point” key chain tag is the only thing that takes a CR2032 coin cell battery, while the company’s credit card tracker is not rechargeable. Pebblebee’s key chain, credit card, and stick-on tracker all have rechargeable batteries, including the wallet card, which is very rare! Nothing has UWB for precise location tracking—everything uses a speaker. Both companies sell multiple SKUs of what look like the exact same product but are locked to Google’s or Apple’s network—no switching allowed.
These were all supposed to come out in 2023 originally. Google’s patch notes say that the tracking network shipped in Android in December 2022, even though nothing is using it. The company has actually been waiting on Apple. In May 2023, Google and Apple announced a joint standard for “unknown tracker” alerts. While the two networks will not be compatible, they will team up to alert users if a tracker is being used to stalk them. All this hardware was announced a week later, but in July 2023, Google shipped what a spokesperson called, “a custom implementation” for AirTags (enabling Android phones to alert users to an unknown AirTag), and the company said it wouldn’t enable its tracking network until the joint tracking detection standard with Apple was ready. It looks like Apple will do that in iOS 17.5. iOS 17.5 is expected to be out—you guessed it—at the end of May, so these tags can finally ship.
9: 00pm update: A Google spokesperson told us Google’s July release of Android’s unwanted AirTag detection is “a custom implementation” and not the joint standard.
Enlarge/ This photo taken in August 2014 shows macaque monkeys in a country park in Hong Kong.
A 37-year-old man is fighting for his life in an intensive care unit in Hong Kong after being wounded by monkeys during a recent park visit and contracting a rare and deadly virus spread by primates.
The man, who was previously in good health, was wounded by wild macaque monkeys during a visit to Kam Shan Country Park in late February, according to local health officials. The park is well known for its conservation of wild macaques and features an area that locals call “Monkey Hill” and describe as a macaque kingdom.
On March 21, he was admitted to the hospital with a fever and “decreased conscious level,” health officials reported. As of Wednesday, April 3, he was in the ICU listed in critical condition. Officials reported the man’s case Wednesday after testing of his cerebrospinal fluid revealed the presence of B virus.
B virus, also known as herpes B virus or herpesvirus simiae, is a common infection in macaques, usually causing asymptomatic or mild disease. Infections in humans are extremely rare, but when they occur, they usually come from macaque encounters and are often severe and deadly. The infection can start out a lot like the flu, but the virus can move to the brain and spinal cord, causing brain damage, nerve damage, and death. The US Centers for Disease Control and Prevention estimates that about 70 percent of untreated infections in humans are fatal.
Despite the presence of macaques around Hong Kong, the man’s case is the first known B virus infection documented there. The virus was discovered in 1932, and since then only 50 human infections have been documented as of 2019, the CDC reports. Of those 50 people infected, 21 died. The agency notes that in one case, from 1997, a researcher was infected and died after bodily fluid from an infected monkey splashed into her eye. Still, contracting the virus is rare, even among people exposed to macaques. The CDC reports that there are hundreds of reports of macaque bites and scratches each year in US animal facilities, and infections remain very uncommon.
However low the risk, health officials recommend keeping your distance from wild monkeys and not feeding or touching them. If you are bitten or scratched, wash the wound immediately and seek medical attention.
Enlarge/ As of late March, much of the Atlantic Ocean was seeing temperatures far above normal.
Weathermodels.com
The Atlantic hurricane season does not begin for another eight weeks, but we are deep in the heart of hurricane season prediction season.
On Thursday, the most influential of these forecasts was issued by Phil Klotzbach, a hurricane scientist at Colorado State University. To put a fine point on it, Klotzbach and his team foresee an exceptionally busy season in the Atlantic basin, which encompasses the Atlantic Ocean, Caribbean Sea, and Gulf of Mexico.
“We anticipate that the 2024 Atlantic basin hurricane season will be extremely active,” Klotzbach wrote in his forecast discussion.
The Colorado State forecast calls for 23 named storms, more than 50 percent higher than a typical season of 14.4 named storms; and 11 hurricanes, above a normal total of seven. Additionally, the forecast predicts that the season’s accumulated cyclone energy—a summation of the duration and intensity of storms across the whole basin—will be 70 percent greater than normal. If the forecast is accurate, the year 2024 would rank among the top 10 most active Atlantic hurricane seasons in a century and a half of records.
This forecast is not out of line with other seasonal predictions. Dozens of organizations, from private groups to individual forecasters to media properties, issue these kinds of seasonal predictions. But Colorado State’s is the longest-running and most influential, and its release underscores what is indeed expected to be a very busy season for tropical storms, hurricanes, and major hurricanes.
What’s driving this?
Klotzbach cites two major factors driving the busy year. The primary one is sea surface temperatures in the eastern and central Atlantic, where tropical systems develop. These seas are seeing record warm temperatures for April—indeed, in many places, the Atlantic is already as warm as it typically would be in June. Undoubtedly climate change is a central factor behind this warming.
Warm seas are one precursor to tropical systems, but they are just one condition necessary for a low-pressure system to organize into a tropical depression.
Another is low wind shear, as cross-directional winds can literally shear a storm apart. While it is not possible to forecast wind shear months ahead of a season, the presence of El Niño or La Niña in the Pacific Ocean is a pretty useful indicator.
In this case, there’s more bad news. The present (weak) El Niño in the Pacific is likely to transition into a La Niña by this summer, especially in August or September. That matters because these are typically the most frenetic months for activity, and with a La Niña in place, wind shear is likely to be lower overall in the Atlantic basin.
This is the first of several forecasts Klotzbach will issue for the upcoming season, and although predictions in April typically have lower skill, it is difficult to ignore the signals out there. “While the skill of this prediction is low, our confidence is higher than normal this year for an early April forecast given how hurricane-favorable the large-scale conditions appear to be,” he wrote.
What does this mean?
Most coastal areas along the Atlantic, Caribbean, and Gulf will not be affected by a hurricane in any given year. I live and work in Houston, which is the largest city in the Atlantic basin that regularly sees significant hurricane threats. But even here, in the subtropics, we only see large, direct impacts from a hurricane or tropical storm about every 10 years.
What a busy season does is load the dice. More activity means a greater likelihood that one of those storms will venture closer to where one lives. So the threat of a hurricane is there every year; it’s just that the threat is greater in some years.
There is an old, oft-repeated adage in hurricane forecasting circles: “It only takes one.” This means that even during a slow season if there’s just one hurricane and it hits you, it was a busy hurricane season for you. We experienced this in Houston back in 1983 when the very first named storm of the year, a hurricane named Alicia, made landfall near the city on August 17. There ended up being just four named storms in 1984, but unfortunately for Houston, one of them struck here.
A busy forecast like this doesn’t mean a whole lot for coastal residents. We really need to be prepared every year, knowing our vulnerabilities to a hurricane, knowing when we need to evacuate, where we would go, and what we would need to take.
However, it does have implications for first responders and government organizations tasked with dealing with hurricane aftermath, such as the Federal Emergency Management Agency. Thus, it seems prudent that the recently passed federal budget for fiscal year 2024 tucked $20.3 billion into the agency’s Disaster Relief Fund.
Texas Secretary of State Jane Nelson yesterday issued a statement debunking claims of widespread voter fraud that were amplified by X owner Elon Musk on the social network formerly named Twitter. Election officials in two other states also disputed the “extremely false” information shared by Musk.
Musk is generally a big fan of Texas, but on Tuesday he shared a post by the account “End Wokeness” that claimed, “The number of voters registering without a photo ID is SKYROCKETING in 3 key swing states: Arizona, Texas, and Pennsylvania.” The account claimed there were 1.25 million such registrations in Texas since the beginning of 2024, over 580,000 in Pennsylvania, and over 220,000 in Arizona.
“Extremely concerning,” Musk wrote in a retweet re-X. The End Wokeness post shared by Musk suggested that “illegals” are registering to vote in large numbers by using Social Security numbers that can be obtained for work authorizations. The End Wokeness post has been viewed 63 million times so far, and Musk’s re-post has been viewed 58.2 million times.
Nelson’s statement on the Texas government’s website called the claim “totally inaccurate.” For one thing, the real number of voter registrations is a small fraction of the number claimed in the post shared by Musk, the secretary of state wrote:
It is totally inaccurate that 1.2 million voters have registered to vote in Texas without a photo ID this year. The truth is our voter rolls have increased by 57,711 voters since the beginning of 2024. This is less than the number of people registered in the same timeframe in 2022 (about 65,000) and in 2020 (about 104,000).
“Extremely false”
The Texas Secretary of State office reports having 17,948,242 registered voters for the March 2024 elections, a gain of just under 189,000 voters since November 2023. The total gain over the past 24 months is a little over 764,000.
Pennsylvania’s data shows the state has 8.7 million registered voters and 87,440 voter registrations so far in 2024. Most of those were applications for party changes, while the other 39,877 were new-voter registrations.
Arizona’s total number of registered voters has been declining. While Arizona had 4.28 million registered voters in 2020 and 4.14 million in 2022, the state’s tally in March 2024 was 4,096,260.
Musk’s “Extremely concerning” post got a reply from Maricopa County Recorder Stephen Richer, who called it “extremely false.”
“We haven’t even had that many new registrants TOTAL in 2024 in Arizona,” stated Richer, an elected official and Republican who has been active in calling out election misinformation on X. “And we have fewer than 35,000 registrants (out of 4.1 million registered voters in Arizona) who haven’t provided documented proof of citizenship.”
Musk’s platform has faced plenty of criticism over its moderation of misinformation on elections and other topics. After reports of deep cuts to X’s election integrity team in September 2023, Musk claimed the ex-X employees were “undermining election integrity.”