Features

the-tinkerers-who-opened-up-a-fancy-coffee-maker-to-ai-brewing

The tinkerers who opened up a fancy coffee maker to AI brewing

(Ars contacted Fellow Products for comment on AI brewing and profile sharing and will update this post if we get a response.)

Opening up brew profiles

Fellow’s brew profiles are typically shared with buyers of its “Drops” coffees or between individual users through a phone app.

Credit: Fellow Products

Fellow’s brew profiles are typically shared with buyers of its “Drops” coffees or between individual users through a phone app. Credit: Fellow Products

Aiden profiles are shared and added to Aiden units through Fellow’s brew.link service. But the profiles are not offered in an easy-to-sort database, nor are they easy to scan for details. So Aiden enthusiast and hobbyist coder Kevin Anderson created brewshare.coffee, which gathers both general and bean-based profiles, makes them easy to search and load, and adds optional but quite helpful suggested grind sizes.

As a non-professional developer jumping into a public offering, he had to work hard on data validation, backend security, and mobile-friendly design. “I just had a bit of an idea and a hobby, so I thought I’d try and make it happen,” Anderson writes. With his tool, brew links can be stored and shared more widely, which helped both Dixon and another AI/coffee tinkerer.

Gabriel Levine, director of engineering at retail analytics firm Leap Inc., lost his OXO coffee maker (aka the “Barista Brain”) to malfunction just before the Aiden debuted. The Aiden appealed to Levine as a way to move beyond his coffee rut—a “nice chocolate-y medium roast, about as far as I went,” he told Ars. “This thing that can be hyper-customized to different coffees to bring out their characteristics; [it] really kind of appealed to that nerd side of me,” Levine said.

Levine had also been doing AI stuff for about 10 years, or “since before everyone called it AI—predictive analytics, machine learning.” He described his career as “both kind of chief AI advocate and chief AI skeptic,” alternately driving real findings and talking down “everyone who… just wants to type, ‘how much money should my business make next year’ and call that work.” Like Dixon, Levine’s work and fascination with Aiden ended up intersecting.

The coffee maker with 3,588 ideas

The author’s conversation with the Aiden Profile Creator, which pulled in both brewing knowledge and product info for a widely available coffee.

Levine’s Aiden Profile Creator is a ChatGPT prompt set up with a custom prompt and told to weight certain knowledge more heavily. What kind of prompt and knowledge? Levine didn’t want to give away his exact work. But he cited resources like the Specialty Coffee Association of America and James Hoffman’s coffee guides as examples of what he fed it.

What it does with that knowledge is something of a mystery to Levine himself. “There’s this kind of blind leap, where it’s grabbing the relevant pieces of information from the knowledge base, biasing toward all the expert advice and extraction science, doing something with it, and then I take that something and coerce it back into a structured output I can put on your Aiden,” Levine said.

It’s a blind leap, but it has landed just right for me so far. I’ve made four profiles with Levine’s prompt based on beans I’ve bought: Stumptown’s Hundred Mile, a light-roasted batch from Jimma, Ethiopia from Small Planes, Lost Sock’s Western House filter blend, and some dark-roast beans given as a gift. With the Western House, Levine’s profile creator said it aimed to “balance nutty sweetness, chocolate richness, and bright cherry acidity, using a slightly stepped temperature profile and moderate pulse structure.” The resulting profile has worked great, even if the chatbot named it “Cherry Timber.”

Levine’s chatbot relies on two important things: Dixon’s work in revealing Fellow’s Aiden API and his own workhorse Aiden. Every Aiden profile link is created on a machine, so every profile created by Levine’s chat is launched, temporarily, from the Aiden in his kitchen, then deleted. “I’ve hit an undocumented limit on the number of profiles you can have on one machine, so I’ve had to do some triage there,” he said. As of April 22, nearly 3,600 profiles had passed through Levine’s Aiden.

“My hope with this is that it lowers the bar to entry,” Levine said, “so more people get into these specialty roasts and it drives people to support local roasters, explore their world a little more. I feel like that certainly happened to me.”

Something new is brewing

Credit: Fellow Products

Having admitted to myself that I find something generated by ChatGPT prompts genuinely useful, I’ve softened my stance slightly on LLM technology, if not the hype. Used within very specific parameters, with everything second-guessed, I’m getting more comfortable asking chat prompts for formatted summaries on topics with lots of expertise available. I do my own writing, and I don’t waste server energy on things I can, and should, research myself. I even generally resist calling language model prompts “AI,” given the term’s baggage. But I’ve found one way to appreciate its possibilities.

This revelation may not be new to someone already steeped in the models. But having tested—and tasted—my first big experiment with willfully engaging with a brewing bot, I’m a bit more awake.

This post was updated at 8: 40 a.m. with a different capture of a GPT-created recipe.

The tinkerers who opened up a fancy coffee maker to AI brewing Read More »

doom:-the-dark-ages-review:-shields-up!

Doom: The Dark Ages review: Shields up!


Prepare to add a more defensive stance to the usual dodge-and-shoot gameplay loop.

There’s a reason that shield is so prominent in this image. Credit: Bethesda Game Studios

There’s a reason that shield is so prominent in this image. Credit: Bethesda Game Studios

For decades now, you could count on there being a certain rhythm to a Doom game. From the ’90s originals to the series’ resurrection in recent years, the Doom games have always been about using constant, zippy motion to dodge through a sea of relatively slow-moving bullets, maintaining your distance while firing back at encroaching hordes of varied monsters. The specific guns and movement options you could call on might change from game to game, but the basic rhythm of that dodge-and-shoot gameplay never has.

Just a few minutes in, Doom: The Dark Ages throws out that traditional Doom rhythm almost completely. The introduction of a crucial shield adds a whole suite of new verbs to the Doom vocabulary; in addition to running, dodging, and shooting, you’ll now be blocking, parrying, and stunning enemies for counterattacks. In previous Doom games, standing still for any length of time often led to instant death. In The Dark Ages, standing your ground to absorb and/or deflect incoming enemy attacks is practically required at many points.

During a preview event earlier this year, the game’s developers likened this change to the difference between flying a fighter jet and piloting a tank. That’s a pretty apt metaphor, and it’s not exactly an unwelcome change for a series that might be in need of a shake-up. But it only works if you go in ready to play like a tank and not like the fighter jet that has been synonymous with Doom for decades.

Stand your ground

Don’t get me wrong, The Dark Ages still features its fair share of the Doom series’ standard position-based Boomer Shooter action. The game includes the usual stockpile of varied weapons—from short-range shotguns to long-range semi-automatics to high-damage explosives with dangerous blowback—and doles them out slowly enough that major new options are still being introduced well into the back half of the game.

But the shooting side has simplified a bit since Doom Eternal. Gone are the secondary weapon modes, grenades, chainsaws, and flamethrowers that made enemy encounters a complicated weapon and ammo juggling act. Gone too are the enemies that practically forced you to use a specific weapon to exploit their One True Weakness; I got by for most of The Dark Ages by leaning on my favored plasma rifle, with occasional switches to a charged steel ball-and-chain launcher for heavily armored enemies.

See green, get ready to parry…

Credit: Bethesda Game Studios

See green, get ready to parry… Credit: Bethesda Game Studios

In their place is the shield, which gives you ample (but not unlimited) ability to simply deflect enemy attacks damage-free. You can also throw the shield for a ranged attack that’s useful for blowing up frequent phalanxes of shielded enemies or freezing larger unarmored enemies in place for a safe, punishing barrage.

But the shield’s most important role comes when you stand face to face with a particularly punishing demon, waiting for a flash of green to appear on the screen. When that color appears, it’s your signal that the associated projectile and/or incoming melee attack can be parried by raising your shield just before it lands. A successful parry knocks that attack back entirely, returning projectiles to their source and/or temporarily deflecting the encroaching enemy themselves.

A well-timed, powerful parry is often the only reasonable option for attacks that are otherwise too quick or overwhelming to dodge effectively. The overall effect ends up feeling a bit like Doom by way of Mike Tyson’s Punch-Out!! Instead of dancing around a sea of hazards and looking for an opening, you’ll often find yourself just standing still for a few seconds, waiting to knock back a flash of green so you can have the opportunity to unleash your own counterattack. Various shield sigils introduced late in the game encourage this kind of conservative turtling strategy even more by adding powerful bonus effects to each successful parry.

The window for executing a successful parry is pretty generous, and the dramatic temporal slowdown and sound effects make each one feel like an impactful moment. But they start to feel less impactful as the game goes on, and battles often devolve into vast seas of incoming green flashes. There were countless moments in my Dark Ages playthrough where I found myself more or less pinned down by a deluge of green attacks, frantically clicking the right mouse button four or five times in quick succession to parry off threats from a variety of angles.

In between all the parrying, you do get to shoot stuff.

Credit: Bethesda Game Studios

In between all the parrying, you do get to shoot stuff. Credit: Bethesda Game Studios

In between these parries, the game seems to go out of its way to encourage a more fast-paced, aggressive style of play. A targeted shield slam move lets you leap quickly across great distances to get up close and personal with enemy demons, at which point you can use one of a variety of melee weapons for some extremely satisfying, crunchy close quarters beatdowns (though these melee attacks are limited by their own slowly recharging ammo system).

You might absorb some damage in the process of going in for these aggressive close-up attacks, but don’t worry—defeated enemies tend to drop heaps of health, armor, and ammo, depending on the specific way they were killed. I’d often find myself dancing on the edge of critically low health after an especially aggressive move, only to recover just in time by finishing off a major demon. Doubling back for a shield slam on a far-off “fodder” enemy can also be an effective strategy for quickly escaping a sticky situation and grabbing some health in the process.

The back-and-forth tug between these aggressive encroachments and the more conservative parry-based turtling makes for some exciting moment-to-moment gameplay, with enough variety in the enemy mix to never feel too stale. Effectively managing your movement and attack options in any given firefight feels complex enough to be engaging without ever tipping into overwhelming, as well.

Even so, working through Doom: The Dark Ages, there was a part of me that missed the more free-form, three-dimensional acrobatics of Doom Eternal’s double jumps and air dashes. Compared to the almost balletic, improvisational movement in that game, playing The Dark Ages too often felt like it devolved into something akin to a simple rhythm game; simply wait for each green “note” to reach the bottom of the screen, then hit the button to activate your counterattack.

Stories and secrets

In between chapters, Doom: The Dark Ages breaks things up with some extremely ponderous cutscenes featuring a number of religious and political factions, both demon and human, jockeying for position and control in an interdimensional war. This mostly involves a lot of tedious standing around discussing the Heart of Argent (a McGuffin that’s supposed to grant the bearer the power of a god) and debating how, where, and when to deploy the Slayer (that’s you) as a weapon.

I watched these cutscenes out of a sense of professional obligation, but I tuned out at points and thus had trouble following the internecine intrigue that seemed to develop between factions whose motivations and backgrounds never seemed to be sufficiently explained or delineated. Most players who aren’t reviewing the game should feel comfortable skipping these scenes and getting back to the action as quickly as possible.

I hope you like red and black, because there’s a lot of it here…

Credit: Bethesda Game Studios

I hope you like red and black, because there’s a lot of it here… Credit: Bethesda Game Studios

The levels themselves are all dripping with the usual mix of Hellish symbology and red-and-black gore, with mood lighting so dark that it can be hard to see a wall right in front of your face. Design-wise, the chapters seem to alternate between Doom’s usual system of twisty enemy-filled corridors and more wide-open outdoor levels. The latter are punctuated by a number of large, open areas where huge groups of demons simply teleport in as soon as you set foot in the pre-set engagement zone. These battle arenas might have a few inclines or spires to mix things up, but for the most part, they all feel depressingly similar and bland after a while. If you’ve stood your ground in one canyon, you’ve stood your ground in them all.

Each level is also absolutely crawling with secret collectibles hidden in various nooks and crannies, which often tease you with a glimpse through a hole in some impassable wall or rock formation. Studying the map screen for a minute more often than not reveals the general double-back path you’ll need to follow to find the hidden entrance behind these walls, even as finding the precise path can involve solving some simple puzzles or examining your surroundings for one particularly well-hidden bit that will allow you to advance.

After all the enemies were cleared in one particularly vast open level, I spent a good half hour picking through every corner of the map until I tracked down the hidden pathways leading to every stray piece of gold and collectible trinket. It was fine as a change of pace—and lucrative in terms of upgrading my weapons and shield for later fights—but it felt kind of lonely and quiet compared to the more action-packed battles.

Don’t unleash the dragon

Speaking of changes of pace, by far the worst parts of Doom: The Dark Ages come when the game insists on interrupting the usual parry-and-shoot gameplay to put you in some sort of vehicle. This includes multiple sections where your quick-moving hero is replaced with a lumbering 30-foot-tall mech, which slouches pitifully down straight corridors toward encounters with equally large demons.

These mech battles play out as the world’s dullest fistfights, where you simply wail on the attack buttons while occasionally tapping the dodge button to step away from some incredibly slow and telegraphed counterattacks. I found myself counting the minutes until these extremely boring interludes were over.

Believe me, this is less exciting than it looks.

Credit: Bethesda Game Studios

Believe me, this is less exciting than it looks. Credit: Bethesda Game Studios

The sections where your Slayer rides a dragon for some reason are ever-so-slightly more interesting, if only because the intuitive, fast-paced flight controls can be a tad more exciting. Unfortunately, these sections don’t give you any thrilling dogfights or complex obstacle courses to take advantage of these controls, topping out instead in a few simplistic chase sequences where you take literally no incoming fire.

Between those semi-engaging chase sequences is a seemingly endless parade of showdowns with stationary turrets. These require your dragon to hover frustratingly still in mid-air, waiting patiently for an incoming energy attack to dodge, which in turn somehow powers up your gun enough to take out the turret in a counterattack. How anyone thought that this was the most engaging use of a seemingly competent third-person flight-combat system is utterly baffling.

Those too-frequent interludes aside, Doom: The Dark Ages is a more-than-suitable attempt to shake up the Doom formula with a completely new style of gameplay. While the more conservative, parry-based shield system takes some getting used to—and may require adjusting some of your long-standing Doom muscle memory in the process—it’s ultimately a welcome and engaging way to add new types of interaction to the long-running franchise.

Photo of Kyle Orland

Kyle Orland has been the Senior Gaming Editor at Ars Technica since 2012, writing primarily about the business, tech, and culture behind video games. He has journalism and computer science degrees from University of Maryland. He once wrote a whole book about Minesweeper.

Doom: The Dark Ages review: Shields up! Read More »

ars-technica’s-gift-guide-for-mother’s-day:-give-mom-some-cool-things

Ars Technica’s gift guide for Mother’s Day: Give mom some cool things


say hi to your mom for me

Wondering what to get the mom who has everything? We’ve got some ideas!

Credit: Carol Yepes / Getty

Greetings, Arsians, and welcome to Mother’s Day, which I am told is once again happening this weekend in the US! Do you, much like the rest of humanity, have a mother? Well, if you do, then this is the time of year when you’re supposed to buy her something to make up for all the pain and suffering she went through in order to bring you into this world! Mom raised you, and while what your mother probably wants more than anything is for you to pick up the phone and talk, you could do a lot worse than throwing some money at the problem and buying your mother something from the list we’ve assembled below!

Stuff for under $100

Severance TV show mug, $17.99

Photograph of a Severance-themed mug

From Allentown to Cold Harbor, discerning innies know the best way to drink beverages.

Credit: Amazon

From Allentown to Cold Harbor, discerning innies know the best way to drink beverages. Credit: Amazon

Whether the mom in your life operates primarily as an “innie” or an “outie,” if she’s a fan of the Apple TV+ show Severance, she may appreciate this ceramic coffee mug inspired by the series. The mug features the iconic phrase “The Work is Both Mysterious and Important” in blue text that mirrors Lumon Industries’ sterile corporate aesthetic. It’s an ideal conversation starter for fans enjoying the show’s second season after the painfully long production delay. Best of all, it’s perfect for morning coffee before Mom begins her own mysterious and important work. The same company also offers a “Woe’s Hollow” mug if you’d like an alternative design. Celebrate the Sisyphean every-day-is-the-same blessing of motherhood with confidence as these mugs are dishwasher and microwave safe, and they are available in both 11oz and 15oz sizes.

Frameo digital picture frame, $49.99

Photograph of a digital picture frame

Frame your mom!

Credit: Amazon

Frame your mom! Credit: Amazon

From awkward baby pictures, to wedding memories and last year’s holidays, your mother likely has more photos than she knows what to do with. Frameo digital picture frames give your mom somewhere to show off those countless photos without embarrassing, unexpected tags on Facebook.

The digital frame shows uploaded pictures like a slideshow. With the iOS or Android app, it’s easy to upload photos from their phone to the frame. Mom hates the cloud and prefers PC storage? No proble—Frameo frames also support PC upload via USB. You can even help ensure the frame puts your best face forward: With the proper permissions, you can access the thing remotely and upload photos to your mom’s frame from afar. Other handy features include sleep mode and the ability to display the time or weather.

There are various Frameo frames available depending on the size, resolution, and look your mom prefers. Here is a popular 10.1-inch IPS one with 1280ˣ800 resolution and 32GB of storage.

A USB-C charger that will actually fast charge her phone, $27.99

Photograph of an Anker phone charger

Faster charging means never having to say “I’m sorry.” Or “My phone is dead.”

Credit: Amazon

Faster charging means never having to say “I’m sorry.” Or “My phone is dead.” Credit: Amazon

Smartphones haven’t come with chargers for a few years now, which means most people like your mom are using one that’s years old. And that old plug probably can’t hit the increasingly lofty charging speeds of new phones. If mom has an old 18W plug, a new one could juice up her phone at double the speed or more. We like Anker’s Nano II charger (on sale for $28) because it’s compact and reaches an impressive 45W, which is fast enough to hit the max wattage for even high-end phones from Apple, Samsung, and Google. It supports USB-PD and PPS charging technologies, which means it can max out anything with a USB-C port to a limit of 45W.

Loop Quiet 2 ear plugs, $20.95

Photograph of the Loop earbuds

They look soft!

Credit: Amazon

They look soft! Credit: Amazon

Let’s face it: Moms need uninterrupted sleep. When relieved from kid or pet duty, or perhaps resting after a night shift, it’s great to wipe out a sleep deficit thanks to some good earplugs. These silicone earplugs offer 24dB noise reduction while avoiding the uncomfortable pressure of cheap foam plugs. The most frustrating thing about traditional earplugs is that there’s a wide variety in “ear hole” sizes out there. To fix that, Loop includes four different tip sizes to ensure a proper fit in any ear canal. The silicone design works well for side-sleepers, and the rubber loop makes them easy to pull out and won’t get lost in your ear canals. Amazon reviewers praise these earplugs highly for travel, focus work, and sensitive hearing situations, with many noting they’re comfortable enough to forget you’re wearing them.

Cornell Lab of Ornithology’s Bird courses, $40-$125

Photograph of a red bird

If you take a course, you might be able to identify this bird! (Spoiler: This bird is Christina.)

Credit: Cornell

If you take a course, you might be able to identify this bird! (Spoiler: This bird is Christina.) Credit: Cornell

These courses do a few things at once. They give a bird-loving mum hours of engagement. They nicely supplement a complementary webcam-equipped bird feeder or binoculars. And they support an organization that advances bird education, research, and conservation. You can start with beginner basics, pick a lane like ducks or owls, or pack in more with a savings bundle. They pair well with pointing mom to the free Merlin Bird ID app and trading sightings with her throughout the year.

The gift of enlightenment: An Ars subscription, $25-50

Hope to avoid dinner conversations about why you shouldn’t vaccinate your kids? Don’t want forwarded messages about how climate change is a hoax? Can’t endure intense lectures on the perils of germ theory? Know the symptoms of brainworms—and stay safe with Ars Technica.

Brainworms are an active public safety threat in the US. They can infect people you know and love. Brainworms have already attacked our current HHS secretary; they could be coming for your mom next!

Fortunately, there is a vaccine. Get the peace of mind that comes from an Ars Technica subscription. Provide your mom with a completely ad-free viewing experience and access to extra homepage stuff (like the ability to hide news categories she doesn’t like!). An Ars Technica subscription, if applied topically on a daily basis, should inoculate against dumb Facebook memes and other vectors for brainworm infection.

An image of the Ars logo, gift-wrapped

Give that mom an Ars subscription! Moms love Ars subscriptions.

Give that mom an Ars subscription! Moms love Ars subscriptions.

Keep your mom away from jade eggs and pseudoscience! An Ars subscription will show instead how measles is killing kids again, or how the administration’s attack on science is ending America’s worldwide leadership in research, or how NOAA is being stripped bare even as the Atlantic hurricane season gets underway.

Every single subscription helps support the work we do at Ars, and every one is appreciated. So help fight the brainworms and give a subscription to your mother! Soon, she’ll be proudly posting memes in the Ars OpenForum!

Mid-price: $100-$300

Bose Ultra Open-Ear headphones, $249

These are the strangest headphones we’ve ever liked. They’re made for people who want excellent environmental awareness and don’t want the weight of headphones or the discomfort of in-ear units. If those two things are high on your list, these deserve a look. If not, move on because they’re relatively expensive otherwise.

Photograph of earbuds

They’re a little odd-looking, but they sound great.

Credit: Amazon

They’re a little odd-looking, but they sound great. Credit: Amazon

When we first tried these, we expected muddy sound and paltry bass, but to our surprise, they sound extremely good–leaps and bounds beyond bone-conduction headphones that have become popular with some runners in recent years. And unless you crank these, or are sitting somewhere very quiet, people near you won’t hear your music.

They are comfortable, too, despite being clamped on the outer ring of your ear. You can almost forget you’re wearing them, unless you’re one of the rare people for whom these are pure torture. All this said, beware: a recent firmware update improved the microphone, but it’s now only average, and we couldn’t recommend these for anyone who plans on doing a lot of calls with them on. As we said at the outset, these are designed for a particular use case; outside of that, there are better options.

Google TV Streamer 4K, $99.99

Photograph of streamer thing

Stream away!

Credit: Google

Stream away! Credit: Google

Your mom’s TV probably has streaming apps built in, but they’re terrible. A good streaming box can offer better audio and video options, as well as a smoother experience. Google’s TV Streamer 4K fits the bill, with support for HDR10+ and the more rare Dolby Vision video, plus Atmos audio. There are other streaming boxes out there, but we think mom will appreciate Google’s Android TV interface over the cluttered, clunky stuff you get from Roku or Amazon. Google’s streamer also connects to the Play Store for apps, which is much better than the alternatives.

Victrola Empire 6-in-1 record player and speaker, $289.99

Part record player, part boombox, part Bluetooth speaker, all class. Victrola’s Empire 6-in-1 Wood Record Player could be the last speaker your musical mother ever needs.

With the ability to play vinyl records (33 1/3, 45, or 78 RPM), CDs, cassettes, and FM radio (unfortunately, there’s no AM tuner), this speaker lets your mom enjoy all that physical media she has stacked in the house, while also allowing her to tune into live radio to hear the latest hits or about current events. If your mom doesn’t need all that, Victrola also makes record player-Bluetooth speaker combos that skip CD, cassette, and radio functionality for less money.

Photo of a record player

Oooh, retro!

Credit: Victrola

Oooh, retro! Credit: Victrola

Keeping mom in the 21st century, the Empire also lets you connect to its speaker via Bluetooth or a 3.5mm jack, so she can stream music from her favorite apps or play files

stored on her phone.

With a vintage look available in multiple hues, the speaker makes for a classic living room piece that looks vintage without feeling overly dated or antiquated.

Belkin auto-tracking phone stand, $144.99

Photograph of the stand

Mom will be unable to look away. Because the stand will track her.

Credit: Amazon

Mom will be unable to look away. Because the stand will track her. Credit: Amazon

This stand is partly pitched at video creators, sure—but it’s also a boon to anyone who wants to reduce the pain of FaceTime calls with their parents. Set up the stand in their home, make the call, and your folks can sit, stand, wash dishes, wander about, or do anything besides hold a phone in the air or crouch over a table. It comes with a cable and charger, it requires no companion app, and it’s a gift to you, too—the person spending far less time looking up your parents’ noses.

Lego Botanicals Flower Arrangement ($109.99)

The thing about a bouquet of flowers is that it looks nice for a few days, maybe a week, and then it dies. Not so with a Lego Botanicals set, which will always look as good as it did the day you built it. (Speaking from experience, they’re also great conversation starters!)

Photograph of LEGO flowers

Beautiful! Just don’t step on the pieces.

Credit: Target

Beautiful! Just don’t step on the pieces. Credit: Target

This 1,161-piece flower arrangement is one of the larger and pricier sets, but the good news is that the Botanicals series includes many sets at all kinds of prices. Sets like this mini orchid or plum blossom run around $24, or you could pick up a flower bouquet for $48. Longtime Lego fans will also enjoy seeing how Lego has repurposed heads, hats, and other shapes from other sets to create plastic plants.

Big spender: Over $300

Bose QuietComfort Ultra Bluetooth headphones, $379.99

In our estimation, Bose still sits atop the noise cancellation game. And that’s why you buy these: best in class noise cancellation. The first time I used Bose’s QC line was on a trip from Boston to London. A flight attendant offered me a pair for the flight, and the rest is history: they became my go-to for travel. Apple and Sony can’t touch this noise cancellation.

Photograph of headphones

They’re quiet and comfortable, like it says on the tin.

Credit: Amazon

They’re quiet and comfortable, like it says on the tin. Credit: Amazon

It’s not just bout noise cancellation though. The sound quality is excellent, even if we might give the Sony’s high-end WH-1000XM5 the nod on bass. We found the Bose QC Ultras to be warm and detailed, and certain types of music (hello, Radiohead) sounded amazing with their spatialized stereo option, dubbed Immersive Audio.

Critically, we stumbled upon these as a gift for someone who found the AirPod Max too heavy (385g). At 252g, they’re nearly a third lighter. Bose primarily accomplished this using plastic rather than metal, but in our usage, we appreciated the lightness more than the looks.

Oura Ring 4, $499

We last checked in with Oura when they released version 3.0 of the Oura ring, and it did not impress us much. With Oura Ring 4.0, we’re ready to recommend this device to fitness fanatics with a few caveats. First, the good stuff. The Oura has slightly better battery performance, and we can go 6 days between charges. It’s more comfortable now, too, thanks to repositioning improved sensors. If you want a smart ring, this is the best one right now.

Photograph of a ring

Smart rings are getting smarter all the time.

Credit: Amazon

Smart rings are getting smarter all the time. Credit: Amazon

But yes, caveats: fit is critical. If you want accurate steps and activities, you must get the tightest ring you can still easily remove. Order the sizing kits, or use the sizing its in the story. Do not rely on your traditional ring size. It might not fit!

Most annoying, full use of the ring’s software requires a subscription, which is best purchased annually at $70. This makes the Oura quite a splurge, but if that special mom is looking for extra motivation to focus on fitness, wants to track her sleep, and doesn’t want a wrist-tracker or Apple Watch, we’d recommend this.

Apple iPhone 16E, $599 and up

Though no longer as budget-friendly as Apple’s old, discontinued iPhone SE, Apple’s new iPhone 16E still gives you a lot of value for your money (read our review here). It excels at all the things that most people use their phones for—it’s fast, it’s well-built, it has a great camera, and it will get years of software support from Apple.

Photograph of iPhones

Who doesn’t need an iPhone?

Credit: Apple

Who doesn’t need an iPhone? Credit: Apple

For anyone using an aging iPhone SE, or any iPhone that’s more than three or four years old, it will feel like an immense upgrade. It also ditches Apple’s Lightning port in favor of USB-C, so you can charge it with the same power brick you already use for your laptop/Nintendo Switch/Kindle/etc.

Ars Technica may earn compensation for sales from links on this post through affiliate programs.

Ars Technica’s gift guide for Mother’s Day: Give mom some cool things Read More »

spacex-pushed-“sniper”-theory-with-the-feds-far-more-than-is-publicly-known

SpaceX pushed “sniper” theory with the feds far more than is publicly known


“It came out of nowhere, and it was really violent.”

The Amos 6 satellite is lost atop a Falcon 9 rocket. Credit: USLaunchReport

The Amos 6 satellite is lost atop a Falcon 9 rocket. Credit: USLaunchReport

The rocket was there. And then it decidedly was not.

Shortly after sunrise on a late summer morning nearly nine years ago at SpaceX’s sole operational launch pad, engineers neared the end of a static fire test. These were still early days for their operation of a Falcon 9 rocket that used super-chilled liquid propellants, and engineers pressed to see how quickly they could complete fueling. This was because the liquid oxygen and kerosene fuel warmed quickly in Florida’s sultry air, and cold propellants were essential to maximizing the rocket’s performance.

On this morning, September 1, 2016, everything proceeded more or less nominally up until eight minutes before the ignition of the rocket’s nine Merlin engines. It was a stable point in the countdown, so no one expected what happened next.

“I saw the first explosion,” John Muratore, launch director for the mission, told me. “It came out of nowhere, and it was really violent. I swear, that explosion must have taken an hour. It felt like an hour. But it was only a few seconds. The second stage exploded in this huge ball of fire, and then the payload kind of teetered on top of the transporter erector. And then it took a swan dive off the top rails, dove down, and hit the ground. And then it exploded.”

The dramatic loss of the Falcon 9 rocket and its Amos-6 satellite, captured on video by a commercial photographer, came at a pivotal moment for SpaceX and the broader commercial space industry. It was SpaceX’s second rocket failure in a little more than a year, and it occurred as NASA was betting heavily on the company to carry its astronauts to orbit. SpaceX was not the behemoth it is today, a company valued at $350 billion. It remained vulnerable to the vicissitudes of the launch industry. This violent failure shook everyone, from the engineers in Florida to satellite launch customers to the suits at NASA headquarters in Washington, DC.

As part of my book on the Falcon 9 and Dragon years at SpaceX, Reentry, I reported deeply on the loss of the Amos-6 mission. In the weeks afterward, the greatest mystery was what had precipitated the accident. It was understood that a pressurized helium tank inside the upper stage had ruptured. But why? No major parts on the rocket were moving at the time of the failure. It was, for all intents and purposes, akin to an automobile idling in a driveway with half a tank of gasoline. And then it exploded.

This failure gave rise to one of the oddest—but also strangely compelling—stories of the 2010s in spaceflight. And we’re still learning new things today.

The “sniper” theory

The lack of a concrete explanation for the failure led SpaceX engineers to pursue hundreds of theories. One was the possibility that an outside “sniper” had shot the rocket. This theory appealed to SpaceX founder Elon Musk, who was asleep at his home in California when the rocket exploded. Within hours of hearing about the failure, Musk gravitated toward the simple answer of a projectile being shot through the rocket.

This is not as crazy as it sounds, and other engineers at SpaceX aside from Musk entertained the possibility, as some circumstantial evidence to support the notion of an outside actor existed. Most notably, the first rupture in the rocket occurred about 200 feet above the ground, on the side of the vehicle facing the southwest. In this direction, about one mile away, lay a building leased by SpaceX’s main competitor in launch, United Launch Alliance. A separate video indicated a flash on the roof of this building, now known as the Spaceflight Processing Operations Center. The timing of this flash matched the interval it would take a projectile to travel from the building to the rocket.

A sniper on the roof of a competitor’s building—forget the Right Stuff, this was the stuff of a Mission: Impossible or James Bond movie.

At Musk’s direction, SpaceX worked this theory both internally and externally. Within the company, engineers and technicians actually took pressurized tanks that stored helium—one of these had burst, leading to the explosion—and shot at them in Texas to determine whether they would explode and what the result looked like. Externally, they sent the site director for their Florida operations, Ricky Lim, to inquire whether he might visit the roof of the United Launch Alliance building.

SpaceX pursued the sniper theory for more than a month. A few SpaceX employees told me that they did not stop this line of inquiry until the Federal Aviation Administration sent the company a letter definitively saying that there was no gunman involved. It would be interesting to see this letter, so I submitted a Freedom of Information Act request to the FAA in the spring of 2023. Because the federal FOIA process moves slowly, I did not expect to receive a response in time for the book. But it was worth a try anyway.

No reply came in 2023 or early 2024, when the final version of my book was due to my editor. Reentry was published last September, and still nothing. However, last week, to my great surprise and delight, I got a response from the FAA. It was the very letter I requested, sent from the FAA to Tim Hughes, the general counsel of SpaceX, on October 13, 2016. And yes, the letter says there was no gunman involved.

However, there were other things I did not know—namely, that the FBI had also investigated the incident.

The ULA rivalry

One of the most compelling elements of this story is that it involves SpaceX’s heated rival, United Launch Alliance. For a long time, ULA had the upper hand, but in recent years, it has taken a dramatic turn. Now we know that David would grow up and slay Goliath: Between the final rocket ULA launched last year (the Vulcan test flight on October 4) and the first rocket the company launched this year (Atlas V, April 28), SpaceX launched 90 rockets.

Ninety.

But it was a different story in the summer of 2016 in the months leading up to the Amos 6 failure. Back then, ULA was launching about 15 rockets a year, compared to SpaceX’s five. And ULA was launching all of the important science missions for NASA and the critical spy satellites for the US military. They were the big dog, SpaceX the pup.

In the early days of the Falcon 9 rocket, some ULA employees would drive to where SpaceX was working on the first booster and jeer at their efforts. And rivalry played out not just on the launch pad but in courtrooms and on Capitol Hill. After ULA won an $11 billion block buy contract from the US Air Force to launch high-value military payloads into the early 2020s, Musk sued in April 2014. He alleged that the contract had been awarded without a fair competition and said the Falcon 9 rocket could launch the missions at a substantially lower price. Taxpayers, he argued, were being taken for a ride.

Eventually, SpaceX and the Air Force resolved their claims. The Air Force agreed to open some of its previously awarded national security missions to competitive bids. Over time, SpaceX has overtaken ULA even in this arena. During the most recent round of awards, SpaceX won 60 percent of the contracts compared to ULA’s 40 percent.

So when SpaceX raised the possibility of a ULA sniper, it came at an incendiary moment in the rivalry, when SpaceX was finally putting forth a very serious challenge to ULA’s dominance and monopoly.

It is no surprise, therefore, that ULA told SpaceX’s Ricky Lim to get lost when he wanted to see the roof of their building in Florida.

“Hair-on-fire stuff”

NASA officials were also deeply concerned by the loss of the Falcon 9 rocket in September 2016.

The space agency spent much of the 2010s working with SpaceX and Boeing to develop, test, and fly spacecraft that could fly humans into space. These were difficult years for the space agency, which had to rely on Russia to get its astronauts into space. NASA also had a challenging time balancing costs with astronaut safety. Then rockets started blowing up.

Consider this sequence from mid-2015 to mid-2016. In June 2015, the second stage of a Falcon 9 rocket carrying a cargo version of the Dragon spacecraft into orbit exploded. Less than two weeks later, NASA named four astronauts to its “commercial crew” cadre from which the initial pilots of Dragon and Starliner spacecraft would be selected. Finally, a little more than a year after this, a second Falcon 9 rocket upper stage exploded during flight.

Video of CRS-7 launch and failure.

Even as it was losing Falcon 9 rockets, SpaceX revealed that it intended to upend NASA’s long-standing practice of fueling a rocket and then, when the vehicle reached a stable condition, putting crew on board. Rather, SpaceX said it would put the astronauts on board before fueling. This process became known as “load and go.”

NASA’s safety community went nuts.

“When SpaceX came to us and said we want to load the crew first and then the propellant, mushroom clouds went off in our safety community,” Phil McAlister, the head of NASA’s commercial programs, told me for Reentry. “I mean, hair-on-fire stuff. It was just conventional wisdom that you load the propellant first and get it thermally stable. Fueling is a very dynamic operation. The vehicle is popping and hissing. The safety community was adamantly against this.”

Amos-6 compounded these concerns. That’s because the rocket was not shot by a sniper. After months of painful investigation and analysis, engineers determined the rocket was lost due to the propellant-loading process. In their goal of rapidly fueling the Falcon 9 rocket, the SpaceX teams had filled the pressurized helium tanks too quickly, heating the aluminum liner and causing it to buckle. In their haste to load super-chilled propellant onto the Falcon 9, SpaceX had found its speed limit.

At NASA, it was not difficult to visualize astronauts in a Dragon capsule sitting atop an exploding rocket during propellant loading rather than a commercial satellite.

Enter the FBI

We should stop and appreciate the crucible that SpaceX engineers and technicians endured in the fall of 2016. They were simultaneously attempting to tease out the physics of a fiendishly complex failure; prove to NASA their exploding rocket was safe; convince safety officials that even though they had just blown up their rocket by fueling it too quickly, load-and-go was feasible for astronaut missions; increase the cadence of Falcon 9 missions to catch and surpass ULA; and, oh yes, gently explain to the boss that a sniper had not shot their rocket.

So there had to be some relief when, on October 13, Hughes received that letter from Dr. Michael C. Romanowski, director of Commercial Space Integration at the FAA.

According to this letter (see a copy here), three weeks after the launch pad explosion, SpaceX submitted “video and audio” along with its analysis of the failure to the FAA. “SpaceX suggested that in the company’s view, this information and data could be indicative of sabotage or criminal activity associated with the on-pad explosion of SpaceX’s Falcon 9,” the letter states.

This is notable because it suggests that Musk directed SpaceX to elevate the “sniper” theory to the point that the FAA should take it seriously. But there was more. According to the letter, SpaceX reported the same data and analysis to the Federal Bureau of Investigation in Florida.

After this, the Tampa Field Office of the FBI and its Criminal Investigative Division in Washington, DC, looked into the matter. And what did they find? Nothing, apparently.

“The FBI has informed us that based upon a thorough and coordinated review by the appropriate Federal criminal and security investigative authorities, there were no indications to suggest that sabotage or any other criminal activity played a role in the September 1 Falcon 9 explosion,” Romanowski wrote. “As a result, the FAA considers this matter closed.”

The failure of the Amos-6 mission would turn out to be a low point for SpaceX. For a few weeks, there were non-trivial questions about the company’s financial viability. But soon, SpaceX would come roaring back. In 2017, the Falcon 9 rocket launched a record 18 times, surpassing ULA for the first time. The gap would only widen. Last year, SpaceX launched 137 rockets to ULA’s five.

With Amos-6, therefore, SpaceX lost the battle. But it would eventually win the war—without anyone firing a shot.

Photo of Eric Berger

Eric Berger is the senior space editor at Ars Technica, covering everything from astronomy to private space to NASA policy, and author of two books: Liftoff, about the rise of SpaceX; and Reentry, on the development of the Falcon 9 rocket and Dragon. A certified meteorologist, Eric lives in Houston.

SpaceX pushed “sniper” theory with the feds far more than is publicly known Read More »

“older-than-google,”-this-elder-scrolls-wiki-has-been-helping-gamers-for-30-years

“Older than Google,” this Elder Scrolls wiki has been helping gamers for 30 years


Interviewing the people behind the 30-year-old Unofficial Elder Scrolls Pages.

A statue in Oblivion Remastered

The team is still keeping up with new updates, including for Oblivion Remastered. Credit: Kyle Orland

The team is still keeping up with new updates, including for Oblivion Remastered. Credit: Kyle Orland

If at some point over the last 20 years you’ve found yourself in an Internet argument or had a question in your head you just couldn’t seem to get rid of, chances are good that you’ve relied on an online wiki.

And you probably used the online wiki: Wikipedia, the free encyclopedia. But for video games, Wikipedia provides a more general, top-down view, painting in broad strokes what a game is about, how it was made, when it was released, and how it was received by players.

In addition, many games and franchises have their own dedicated wikis that go a step further; these wikis are often part game guide, part lore book, and part historical record.

But what does it take to build a game wiki? Why do people do it? I looked to one of my all-time favorite games for answers.

The Unofficial Elder Scrolls Pages

It had been at least 10 years since I last played The Elder Scrolls IV: Oblivion before this past fall, when I decided somewhat arbitrarily to put another 80-or-so hours into a new save. Rushing through the first few parts of the main questline, it felt like I was visiting home, right up until I was named “Hero of Kvatch.”

Then, though, it quickly began to feel like I was playing the game for the first time, and, to put it mildly, I was getting beaten to a pulp across Cyrodiil.

While it was great to re-explore the game that consumed so many hours of my life and discover again what made the 2006 release an instant classic, I was frustrated that I had forgotten how the game worked.

Without the official manual that came with my now surely sold-to-GameStop Xbox 360 edition of the game or the Official Prima Strategy Guide, I quickly found myself (as countless others do) on The Unofficial Elder Scrolls Pages.

Broadly, UESPWiki is an impressive information repository of The Elder Scrolls franchise. It also documents the dense, often convoluted lore of the franchise, as well as books and merchandise sold alongside the games, and the multiple tabletop games.

The homepage for UESP, with a classic wiki design

The Unofficial Elder Scrolls Pages as they appear today. Credit: Samuel Axon

For all its uniqueness—the sort of early “Web 2.0” design style, limited advertisement space, and its namespace-centered way of organization—the UESP is an independent wiki at its core. It has all the bone structure that makes a wiki accessible and easy to use and is driven by a dedicated community of editors.

The wiki currently maintains over 110,000 articles. The phrase “We have been building a collaborative source for all knowledge on the Elder Scrolls series since 1995” is written at the top of the home page. This year, UESP is celebrating its 30th anniversary.

“The phrase I always say is ‘we’re older than Google,’” said 51-year-old Dave Humphrey, founder of the UESP. “Obviously, we’re not as big or as popular as Google, but we’re older than Google, and we’re older than a lot of websites. In fact, I don’t think there’s any other Elder Scrolls-related website that’s older than us.”

The earliest version of the UESP wasn’t a wiki at all and is just a little older than 30 years. It was a message distributed through USENET called Daggerfall FAQ, originally published in the fall of 1994, and it featured prerelease content about The Elder Scrolls II: Daggerfall.

A year later, the Daggerfall FAQ would become a webpage, and a few months after that, it would become the Unofficial Elder Scrolls Pages, which was just a webpage at the time, to include information about The Elder Scrolls games.

When The Elder Scrolls III: Morrowind released, it was the franchise’s biggest game at that point, and Humphrey quickly became remarkably busy. He wrote hundreds of entries for the game and its two DLCs while maintaining his regular job. But the more he did, the more reader emails suggesting new entries and edits to the site came in. In 2005, UESP officially became a wiki.

“It was too much for me to do as a full-time or second full-time job sort of thing,” Humphrey said. “That’s when I decided instead of having a regular webpage, we’d move to a wiki-based format where instead of people, you know, emailing me, they can edit their own tips.”

In 2012, Humphrey officially made the UESP his full-time job, but he is largely no longer involved in the content side of the wiki. He instead maintains more of an overseer role, doing most of the back-end server maintenance, programming, and cluster design for the site.

What sets UESP apart, at least from Humphrey’s perspective, is the creativity and decision-making capacity derived from its independence. This allows the team to run the ads they choose and implement new utilities like the ESO Build Editor.

“We’ve been asked to join larger wiki farms before, and while it might make sense from a technical standpoint, we would lose a lot of what makes UESP unique and long-lasting,” said Humphrey.

In fact, UESP has been slowly expanding over the years and is starting to host wiki sites beyond The Elder Scrolls. In August 2023, the site launched the Starfield Wiki, which already maintains over 10,000 articles and has unofficially taken over all the construction set wikis for the Elder Scrolls and Fallout franchises. Currently, Humphrey said, UESP is looking at hosting a few more existing game wikis later this year.

As for the Elder Scrolls series itself, The Elder Scrolls VI is still well into the future. But at the time of my interview, the Oblivion remaster was just social media speculation. Still, Humphrey predicted how the game might change the wiki.

“It comes down to the organization of the site. We sort of have to deal with that a bit with DLCs. There’s the base game, and then there’s the DLCs; for the most part, DLCs are their own contained area, but they do modify the base game as well,” said Humphrey.

“We’d probably take a similar approach with it, creating their own namespace underneath Oblivion and putting all the remake information there,” he added.

It’s always a challenge to determine how to organize things like DLCs and remakes into the wiki, Humphrey said. He noted that he would ultimately leave it up to the editors themselves.

Since the release of Oblivion Remastered, the game has, in fact, received its own namespace, and editors are already documenting some of the changes.

A changelog on the wiki

There’s a detailed page listing every known change in the Oblivion remaster. Credit: Samuel Axon

When it was still the Daggerfall FAQ, Humphrey wasn’t thinking about what it would look like in 2025 or how a community could be built around a website; he was simply someone with a passion for the game who liked building things.

But as time went on and Humphrey began attending conventions and Elder Scrolls-related meetups, he started to realize the kind of community that had naturally formed around the site.

“It’s not something I planned on doing, but it’s really neat, and it’s something I’m more aware of now in terms of doing community-related stuff,” Humphrey said.

That community, which has over 23,000 users with at least one edit in its history, measures the success of the wiki not by the quantity of content but the quality of the pages themselves. Humphrey leaves most of the content decisions up to those editors.

Scraping and editing

Robert “RobinHood70” Morley—a 54-year-old native of Ottawa, Canada—has been editing the pages since May 2006, just a short time after UESP turned into a wiki, while playing through Oblivion.

He explained that he found the wiki at a critical time, shortly after he fell ill with a sickness that doctors struggled to diagnose.

“Getting involved in the wiki provided a bit of a refuge from that,” Morely wrote through Discord. “I could forget how I felt (to some degree) and focus instead on what was going on the wiki. Because I couldn’t really leave the house much anymore, I made friends on the wiki instead and let that replace the real-life social life that I couldn’t have anymore… That continues to be the case even now.”

He didn’t necessarily set out to find that kind of community, which was much smaller at the time, but he recognized that it was helping him cope with things. Not only did editing give him a sense of accomplishment, but he enjoyed seeing what others were able to do.

Over the years, Morely’s involvement in the wiki has grown. He’s gone from a regular user to an admin to a bureaucrat. He’s the only editor with access to the servers other than Humphrey. He now does the critical job of running bots through the game pages that add bulk information to the wiki.

“In some sense, a bot is like any other editor. It adds/changes/removes information on the wiki. The difference is that it does so several thousand times faster,” Morley said. “Bots are often used to bulk-upload information from the game files to the wiki. For example, they might provide the initial documentation of every NPC in a game… They would provide the hard stats, but afterward, people would expand the page to provide a narrative for each character.”

When an Elder Scrolls Online update goes live, for example, Morley quickly deploys the bot, which detects any changes in the new versions of the game, such as skill and stat adjustments. All that added information is dumped into the wiki to provide human editors with a base to start from.

That’s similar to the process of creating pages for a brand-new Elder Scrolls game. The game would be scraped shortly after it was released, and editors would get busy trying to figure out how those pieces fit together.

Once created, the pages would be edited and continuously retouched over time by other editors.

Those editors include people like 26-year-old Dillon “Dillonn241” D., who has been a part of the wiki for over half of his life. He first discovered and began editing pages of the UESP at 11 or 12 years old.

While his activity on the wiki has ebbed and flowed over the years based on interest and the demands of daily life, he says the community is a big part of what keeps him coming back—the near-endless nature of collaboratively working on a project. He enjoys the casual conversations on the wiki’s Discord server, as well as the more focused and pragmatic discussions about editing through internal channels.

He has since become a prolific editor and was awarded a “gold star” on his talk page last year for editing more pages than anyone in 2024, with a total of 18,864 edits.

“I don’t want to call it an addiction because that makes it sound bad, but it’s kind of like—you know, I guess I have an hour here. I’ll just hop on UESP and edit a few pages or see how things I’ve edited have been doing.”

Most of those edits, he explained, were likely minor, things like fixing grammar, sentence structure, and formatting to better conform to the wiki’s internal style guide. In this way, he considers himself a “WikiGnome”—someone who makes small, incremental edits to pages and makes changes behind the scenes.

When he’s in the mood to do some editing, he’ll jump around the wiki using the random button for a couple of hours and make changes.

All those hours have given him not only refined copy editing skills but also a serious familiarity with the pages. Dillion says he can jump on just about any page and find at least one of his edits on it.

He has done a lot of work on the namespaces for the Tamriel Rebuilt mod and essentially rewrote the entire namespace for The Elder Scrolls Adventures: Redguard, a game he doesn’t particularly enjoy playing but started on a whim.

“At some point, I stumbled across the wiki section for it and was like, well this is nothing, this is awful,” he explained.

He recalled getting stuck on a section of the game, and the wiki wasn’t able to help him. He was able to stumble through the game but decided he would completely fix its entries so they would be more helpful to future players.

Now, the Redguard namespace includes detailed descriptions of the quests, characters, and items, along with photos, most of which Dillion took himself. He says that if the game and all its files were somehow wiped from the earth, developers would be able to remaster the entire game in Unity based just on what’s in the wiki.

A screenshot of the Redguard wiki page

Yep, he took those screenshots. Credit: Samuel Axon

“I guess that’s kind of the end goal,” he said, “and some of the namespaces are kind of close, like Oblivion I would say is kind of close to where the things that you can still add to the page are getting minimal.”

Efforts all over

While Dillion is a more prolific editor than most and Morley plays a more specific role in the wiki than others—and Humphrey represents the original jumping off point for the former two—it’s the combined effort of thousands of editors like them that make the UESP what it is.

And across the Internet, there are equally involved editors working on an endless number of wikis toward similar goals. In a way, they are remaking the games they love in a text-based format.

At their core, these community efforts help players get through games in a time when physical guides often no longer exist. But in the aggregate, deeper, centralized insights into these games can ultimately contribute to something new. A record over time of how a game changes and how it works can lead to discovery and debate. In turn, that could spark inspiration for a mod—or a new game entirely.

“Older than Google,” this Elder Scrolls wiki has been helping gamers for 30 years Read More »

redditor-accidentally-reinvents-discarded-’90s-tool-to-escape-today’s-age-gates

Redditor accidentally reinvents discarded ’90s tool to escape today’s age gates


The ’90s called. They want their flawed age verification methods back.

A boys head with a fingerprint revealing something unclear but perhaps evocative

Credit: Aurich Lawson | Getty Images

Credit: Aurich Lawson | Getty Images

Back in the mid-1990s, when The Net was among the top box office draws and Americans were just starting to flock online in droves, kids had to swipe their parents’ credit cards or find a fraudulent number online to access adult content on the web. But today’s kids—even in states with the strictest age verification laws—know they can just use Google.

Last month, a study analyzing the relative popularity of Google search terms found that age verification laws shift users’ search behavior. It’s impossible to tell if the shift represents young users attempting to circumvent the child-focused law or adult users who aren’t the actual target of the laws. But overall, enforcement causes nearly half of users to stop searching for popular adult sites complying with laws and instead search for a noncompliant rival (48 percent) or virtual private network (VPN) services (34 percent), which are used to mask a location and circumvent age checks on preferred sites, the study found.

“Individuals adapt primarily by moving to content providers that do not require age verification,” the study concluded.

Although the Google Trends data prevented researchers from analyzing trends by particular age groups, the findings help confirm critics’ fears that age verification laws “may be ineffective, potentially compromise user privacy, and could drive users toward less regulated, potentially more dangerous platforms,” the study said.

The authors warn that lawmakers are not relying enough on evidence-backed policy evaluations to truly understand the consequences of circumvention strategies before passing laws. Internet law expert Eric Goldman recently warned in an analysis of age-estimation tech available today that this situation creates a world in which some kids are likely to be harmed by the laws designed to protect them.

Goldman told Ars that all of the age check methods carry the same privacy and security flaws, concluding that technology alone can’t solve this age-old societal problem. And logic-defying laws that push for them could end up “dramatically” reshaping the Internet, he warned.

Zeve Sanderson, a co-author of the Google Trends study, told Ars that “if you’re a policymaker, in addition to being potentially nervous about the more dangerous content, it’s also about just benefiting a noncompliant firm.”

“You don’t want to create a regulatory environment where noncompliance is incentivized or they benefit in some way,” Sanderson said.

Sanderson’s study pointed out that search data is only part of the picture. Some users may be using VPNs and accessing adult sites through direct URLs rather than through search. Others may rely on social media to find adult content, a 2025 conference paper noted, “easily” bypassing age checks on the largest platforms. VPNs remain the most popular circumvention method, a 2024 article in the International Journal of Law, Ethics, and Technology confirmed, “and yet they tend to be ignored or overlooked by statutes despite their popularity.”

While kids are ducking age gates and likely putting their sensitive data at greater risk, adult backlash may be peaking over the red wave of age-gating laws already blocking adults from visiting popular porn sites in several states.

Some states started controversially requiring checking IDs to access adult content, which prompted Pornhub owner Aylo to swiftly block access to its sites in certain states. Pornhub instead advocates for device-based age verification, which it claims is a safer choice.

Aylo’s campaign has seemingly won over some states that either explicitly recommend device-based age checks or allow platforms to adopt whatever age check method they deem “reasonable.” Other methods could include app store-based age checks, algorithmic age estimation (based on a user’s web activity), face scans, or even tools that guess users’ ages based on hand movements.

On Reddit, adults have spent the past year debating the least intrusive age verification methods, as it appears inevitable that adult content will stay locked down, and they dread a future where more and more adult sites might ask for IDs. Additionally, critics have warned that showing an ID magnifies the risk of users publicly exposing their sexual preferences if a data breach or leak occurs.

To avoid that fate, at least one Redditor has attempted to reinvent the earliest age verification method, promoting a resurgence of credit card-based age checks that society discarded as unconstitutional in the early 2000s.

Under those systems, an entire industry of age verification companies emerged, selling passcodes to access adult sites for a supposedly nominal fee. The logic was simple: Only adults could buy credit cards, so only adults could buy passcodes with credit cards.

If “a person buys, for a nominal fee, a randomly generated passcode not connected to them in any way” to access adult sites, one Redditor suggested about three months ago, “there won’t be any way to tie the individual to that passcode.”

“This could satisfy the requirement to keep stuff out of minors’ hands,” the Redditor wrote in a thread asking how any site featuring sexual imagery could hypothetically comply with US laws. “Maybe?”

Several users rushed to educate the Redditor about the history of age checks. Those grasping for purely technology-based solutions today could be propping up the next industry flourishing from flawed laws, they said.

And, of course, since ’90s kids easily ducked those age gates, too, history shows why investing millions to build the latest and greatest age verification systems probably remains a fool’s errand after all these years.

The cringey early history of age checks

The earliest age verification systems were born out of Congress’s “first attempt to outlaw pornography online,” the LA Times reported. That attempt culminated in the Communications Decency Act of 1996.

Although the law was largely overturned a year later, the million-dollar age verification industry was already entrenched, partly due to its intriguing business model. These companies didn’t charge adult sites any fee to add age check systems—which required little technical expertise to implement—and instead shared a big chunk of their revenue with porn sites that opted in. Some sites got 50 percent of revenues, estimated in the millions, simply for adding the functionality.

The age check business was apparently so lucrative that in 2000, one adult site, which was sued for distributing pornographic images of children, pushed fans to buy subscriptions to its preferred service as a way of helping to fund its defense, Wired reported. “Please buy an Adult Check ID, and show your support to fight this injustice!” the site urged users. (The age check service promptly denied any association with the site.)

In a sense, the age check industry incentivized adult sites’ growth, an American Civil Liberties Union attorney told the LA Times in 1999. In turn, that fueled further growth in the age verification industry.

Some services made their link to adult sites obvious, like Porno Press, which charged a one-time fee of $9.95 to access affiliated adult sites, a Congressional filing noted. But many others tried to mask the link, opting for names like PayCom or CCBill, as Forbes reported, perhaps enticing more customers by drawing less attention on a credit card statement. Other firms had names like Adult Check, Mancheck, and Adult Sights, Wired reported.

Of these firms, the biggest and most successful was Adult Check. At its peak popularity in 2001, the service boasted 4 million customers willing to pay “for the privilege of ogling 400,000 sex sites,” Forbes reported.

At the head of the company was Laith P. Alsarraf, the CEO of the Adult Check service provider Cybernet Ventures.

Alsarraf testified to Congress several times, becoming a go-to expert witness for lawmakers behind the 1998 Child Online Protection Act (COPA). Like the version of the CDA that prompted it, this act was ultimately deemed unconstitutional. And some judges and top law enforcement officers defended Alsarraf’s business model with Adult Check in court—insisting that it didn’t impact adult speech and “at most” posed a “modest burden” that was “outweighed by the government’s compelling interest in shielding minors” from adult content.

But his apparent conflicts of interest also drew criticism. One judge warned in 1999 that “perhaps we do the minors of this country harm if First Amendment protections, which they will with age inherit fully, are chipped away in the name of their protection,” the American Civil Liberties Union (ACLU) noted.

Summing up the seeming conflict, Ann Beeson, an ACLU lawyer, told the LA Times, “the government wants to shut down porn on the Net. And yet their main witness is this guy who makes his money urging more and more people to access porn on the Net.”

’90s kids dodged Adult Check age gates

Adult Check’s subscription costs varied, but the service predictably got more expensive as its popularity spiked. In 1999, customers could snag a “lifetime membership” for $76.95 or else fork over $30 every two years or $20 annually, the LA Times reported. Those were good deals compared to the significantly higher costs documented in the 2001 Forbes report, which noted a three-month package was available for $20, or users could pay $20 monthly to access supposedly premium content.

Among Adult Check’s customers were apparently some savvy kids who snuck through the cracks in the system. In various threads debating today’s laws, several Redditors have claimed that they used Adult Check as minors in the ’90s, either admitting to stealing a parent’s credit card or sharing age-authenticated passcodes with friends.

“Adult Check? I remember signing up for that in the mid-late 90s,” one commenter wrote in a thread asking if anyone would ever show ID to access porn. “Possibly a minor friend of mine paid for half the fee so he could use it too.”

“Those years were a strange time,” the commenter continued. “We’d go see tech-suspense-horror-thrillers like The Net and Disclosure where the protagonist has to fight to reclaim their lives from cyberantagonists, only to come home to send our personal information along with a credit card payment so we could look at porn.”

“LOL. I remember paying for the lifetime package, thinking I’d use it for decades,” another commenter responded. “Doh…”

Adult Check thrived even without age check laws

Sanderson’s study noted that today, minors’ “first exposure [to adult content] typically occurs between ages 11–13,” which is “substantially earlier than pre-Internet estimates.” Kids seeking out adult content may be in a period of heightened risk-taking or lack self-control, while others may be exposed without ever seeking it out. Some studies suggest that kids who are more likely to seek out adult content could struggle with lower self-esteem, emotional problems, body image concerns, or depressive symptoms. These potential negative associations with adolescent exposure to porn have long been the basis for lawmakers’ fight to keep the content away from kids—and even the biggest publishers today, like Pornhub, agree that it’s a worthy goal.

After parents got wise to ’90s kids dodging age gates, pressure predictably mounted on Adult Check to solve the problem, despite Adult Check consistently admitting that its system wasn’t foolproof. Alsarraf claimed that Adult Check developed “proprietary” technology to detect when kids were using credit cards or when multiple kids were attempting to use the same passcode at the same time from different IP addresses. He also claimed that Adult Check could detect stolen credit cards, bogus card numbers, card numbers “posted on the Internet,” and other fraud.

Meanwhile, the LA Times noted, Cybernet Ventures pulled in an estimated $50 million in 1999, ensuring that the CEO could splurge on a $690,000 house in Pasadena and a $100,000 Hummer. Although Adult Check was believed to be his most profitable venture at that time, Alsarraf told the LA Times that he wasn’t really invested in COPA passing.

“I know Adult Check will flourish,” Alsarraf said, “with or without the law.”

And he was apparently right. By 2001, subscriptions banked an estimated $320 million.

After the CDA and COPA were blocked, “many website owners continue to use Adult Check as a responsible approach to content accessibility,” Alsarraf testified.

While adult sites were likely just in it for the paychecks—which reportedly were dependably delivered—he positioned this ongoing growth as fueled by sites voluntarily turning to Adult Check to protect kids and free speech. “Adult Check allows a free flow of ideas and constitutionally protected speech to course through the Internet without censorship and unreasonable intrusion,” Alsarraf said.

“The Adult Check system is the least restrictive, least intrusive method of restricting access to content that requires minimal cost, and no parental technical expertise and intervention: It does not judge content, does not inhibit free speech, and it does not prevent access to any ideas, word, thoughts, or expressions,” Alsarraf testified.

Britney Spears aided Adult Check’s downfall

Adult Check’s downfall ultimately came in part thanks to Britney Spears, Wired reported in 2002. Spears went from Mickey Mouse Club child star to the “Princess of Pop” at 16 years old with her hit “Baby One More Time” in 1999, the same year that Adult Check rose to prominence.

Today, Spears is well-known for her activism, but in the late 1990s and early 2000s, she was one of the earliest victims of fake online porn.

Spears submitted documents in a lawsuit raised by the publisher of a porn magazine called Perfect 10. The publisher accused Adult Check of enabling the infringement of its content featured on the age check provider’s partner sites, and Spears’ documents helped prove that Adult Check was also linking to “non-existent nude photos,” allegedly in violation of unfair competition laws. The case was an early test of online liability, and Adult Check seemingly learned the hard way that the courts weren’t on its side.

That suit prompted an injunction blocking Adult Check from partnering with sites promoting supposedly illicit photos of “models and celebrities,” which it said was no big deal because it only comprised about 6 percent of its business.

However, after losing the lawsuit in 2004, Adult Check’s reputation took a hit, and it fell out of the pop lexicon. Although Cybernet Ventures continued to exist, Adult Check screening was dropped from sites, as it was no longer considered the gold standard in age verification. Perhaps more importantly, it was no longer required by law.

But although millions validated Adult Check for years, not everybody in the ’90s bought into Adult Check’s claims that it was protecting kids from porn. Some critics said it only provided a veneer of online safety without meaningfully impacting kids. Most of the country—more than 250 million US residents—never subscribed.

“I never used Adult Check,” one Redditor said in a thread pondering whether age gate laws might increase the risks of government surveillance. “My recollection was that it was an untrustworthy scam and unneeded barrier for the theater of legitimacy.”

Alsarraf keeps a lower profile these days and did not respond to Ars’ request to comment.

The rise and fall of Adult Check may have prevented more legally viable age verification systems from gaining traction. The ACLU argued that its popularity trampled the momentum of the “least restrictive” method for age checks available in the ’90s, a system called the Platform for Internet Content Selection (PICS).

Based on rating and filtering technology, PICS allowed content providers or third-party interest groups to create private rating systems so that “individual users can then choose the rating system that best reflects their own values, and any material that offends them will be blocked from their homes.”

However, like all age check systems, PICS was also criticized as being imperfect. Legal scholar Lawrence Lessig called it “the devil” because “it allows censorship at any point on the chain of distribution” of online content.

Although the age verification technology has changed, today’s lawmakers are stuck in the same debate decades later, with no perfect solutions in sight.

SCOTUS to rule on constitutionality of age gate laws

This summer, the Supreme Court will decide whether a Texas law blocking minors’ access to porn is constitutional. The decision could either stunt the momentum or strengthen the backbone of nearly 20 laws in red states across the country seeking to age-gate the Internet.

For privacy advocates opposing the laws, the SCOTUS ruling feels like a sink-or-swim moment for age gates, depending on which way the court swings. And it will come just as blue states like Colorado have recently begun pushing for age gates, too. Meanwhile, other laws increasingly seek to safeguard kids’ privacy and prevent social media addiction by also requiring age checks.

Since the 1990s, the US has debated how to best keep kids away from harmful content without trampling adults’ First Amendment rights. And while cruder credit card-based systems like Adult Check are no longer seen as viable, it’s clear that for lawmakers today, technology is still viewed as both the problem and the solution.

While lawmakers claim that the latest technology makes it easier than ever to access porn, advancements like digital IDs, device-based age checks, or app store age checks seem to signal salvation, making it easier to digitally verify user ages. And some artificial intelligence solutions have likely made lawmakers’ dreams of age-gating the Internet appear even more within reach.

Critics have condemned age gates as unconstitutionally limiting adults’ access to legal speech, at the furthest extreme accusing conservatives of seeking to censor all adult content online or expand government surveillance by tracking people’s sexual identity. (Goldman noted that “Russell Vought, an architect of Project 2025 and President Trump’s Director of the Office of Management and Budget, admitted that he favored age authentication mandates as a ‘back door’ way to censor pornography.”)

Ultimately, SCOTUS could end up deciding if any kind of age gate is ever appropriate. The court could perhaps rule that strict scrutiny, which requires a narrowly tailored solution to serve a compelling government interest, must be applied, potentially ruling out all of lawmakers’ suggested strategies. Or the court could decide that strict scrutiny applies but age checks are narrowly tailored. Or it could go the other way and rule that strict scrutiny does not apply, so all state lawmakers need to show is that their basis for requiring age verification is rationally connected to their interest in blocking minors from adult content.

Age verification remains flawed, experts say

If there’s anything the ’90s can teach lawmakers about age gates, it’s that creating an age verification industry dependent on adult sites will only incentivize the creation of more adult sites that benefit from the new rules. Back then, when age verification systems increased sites’ revenues, compliant sites were rewarded, but in today’s climate, it’s the noncompliant sites that stand to profit by not authenticating ages.

Sanderson’s study noted that Louisiana “was the only state that implemented age verification in a manner that plausibly preserved a user’s anonymity while verifying age,” which is why Pornhub didn’t block the state over its age verification law. But other states that Pornhub blocked passed copycat laws that “tended to be stricter, either requiring uploads of an individual’s government identification,” methods requiring providing other sensitive data, “or even presenting biometric data such as face scanning,” the study noted.

The technology continues evolving as the debate rages on. Some of the most popular platforms and biggest tech companies have been testing new age estimation methods this year. Notably, Discord is testing out face scans in the United Kingdom and Australia, and both Meta and Google are testing technology to supposedly detect kids lying about their ages online.

But a solution has not yet been found as parents and their lawyers circle social media companies they believe are harming their kids. In fact, the unreliability of the tech remains an issue for Meta, which is perhaps the most motivated to find a fix, having long faced immense pressure to improve child safety on its platforms. Earlier this year, Meta had to yank its age detection tool after the “measure didn’t work as well as we’d hoped and inadvertently locked out some parents and guardians who shared devices with their teens,” the company said.

On April 21, Meta announced that it started testing the tech in the US, suggesting the flaws were fixed, but Meta did not directly respond to Ars’ request to comment in more detail on updates.

Two years ago, Ash Johnson, a senior policy manager at the nonpartisan nonprofit think tank the Information Technology and Innovation Foundation (ITIF), urged Congress to “support more research and testing of age verification technology,” saying that the government’s last empirical evaluation was in 2014. She noted then that “the technology is not perfect, and some children will break the rules, eventually slipping through the safeguards,” but that lawmakers need to understand the trade-offs of advocating for different tech solutions or else risk infringing user privacy.

More research is needed, Johnson told Ars, while Sanderson’s study suggested that regulators should also conduct circumvention research or be stuck with laws that have a “limited effectiveness as a standalone policy tool.”

For example, while AI solutions are increasingly more accurate—and in one Facebook survey overwhelmingly more popular with users, Goldman’s analysis noted—the tech still struggles to differentiate between a 17- or 18-year-old, for example.

Like Aylo, ITIF recommends device-based age authentication as the least restrictive method, Johnson told Ars. Perhaps the biggest issue with that option, though, is that kids may have an easy time accessing adult content on devices shared with parents, Goldman noted.

Not sharing Johnson’s optimism, Goldman wrote that “there is no ‘preferred’ or ‘ideal’ way to do online age authentication.” Even a perfect system that accurately authenticates age every time would be flawed, he suggested.

“Rather, they each fall on a spectrum of ‘dangerous in one way’ to ‘dangerous in a different way,'” he wrote, concluding that “every solution has serious privacy, accuracy, or security problems.”

Kids at “grave risk” from uninformed laws

As a “burgeoning” age verification industry swells, Goldman wants to see more earnest efforts from lawmakers to “develop a wider and more thoughtful toolkit of online child safety measures.” They could start, he suggested, by consistently defining minors in laws so it’s clear who is being regulated and what access is being restricted. They could then provide education to parents and minors to help them navigate online harms.

Without such careful consideration, Goldman predicts a dystopian future prompted by age verification laws. If SCOTUS endorses them, users could become so accustomed to age gates that they start entering sensitive information into various web platforms without a second thought. Even the government knows that would be a disaster, Goldman said.

“Governments around the world want people to think twice before sharing sensitive biometric information due to the information’s immutability if stolen,” Goldman wrote. “Mandatory age authentication teaches them the opposite lesson.”

Goldman recommends that lawmakers start seeking an information-based solution to age verification problems rather than depending on tech to save the day.

“Treating the online age authentication challenges as purely technological encourages the unsupportable belief that its problems can be solved if technologists ‘nerd harder,'” Goldman wrote. “This reductionist thinking is a categorical error. Age authentication is fundamentally an information problem, not a technology problem. Technology can help improve information accuracy and quality, but it cannot unilaterally solve information challenges.”

Lawmakers could potentially minimize risks to kids by only verifying age when someone tries to access restricted content or “by compelling age authenticators to minimize their data collection” and “promptly delete any highly sensitive information” collected. That likely wouldn’t stop some vendors from collecting or retaining data anyway, Goldman suggested. But it could be a better standard to protect users of all ages from inevitable data breaches, since we know that “numerous authenticators have suffered major data security failures that put authenticated individuals at grave risk.”

“If the policy goal is to protect minors online because of their potential vulnerability, then forcing minors to constantly decide whether or not to share highly sensitive information with strangers online is a policy failure,” Goldman wrote. “Child safety online needs a whole-of-society response, not a delegate-and-pray approach.”

Photo of Ashley Belanger

Ashley is a senior policy reporter for Ars Technica, dedicated to tracking social impacts of emerging policies and new technologies. She is a Chicago-based journalist with 20 years of experience.

Redditor accidentally reinvents discarded ’90s tool to escape today’s age gates Read More »

monty-python-and-the-holy-grail-turns-50

Monty Python and the Holy Grail turns 50


Ars staffers reflect upon the things they love most about this masterpiece of absurdist comedy.

king arthur's and his knights staring up at something.

Credit: EMI Films/Python (Monty) Pictures

Credit: EMI Films/Python (Monty) Pictures

Monty Python and the Holy Grail is widely considered to be among the best comedy films of all time, and it’s certainly one of the most quotable. This absurdist masterpiece sending up Arthurian legend turns 50 (!) this year.

It was partly Python member Terry Jones’ passion for the Middle Ages and Arthurian legend that inspired Holy Grail and its approach to comedy. (Jones even went on to direct a 2004 documentary, Medieval Lives.) The troupe members wrote several drafts beginning in 1973, and Jones and Terry Gilliam were co-directors—the first full-length feature for each, so filming was one long learning process. Reviews were mixed when Holy Grail was first released—much like they were for Young Frankenstein (1974), another comedic masterpiece—but audiences begged to differ. It was the top-grossing British film screened in the US in 1975. And its reputation has only grown over the ensuing decades.

The film’s broad cultural influence extends beyond the entertainment industry. Holy Grail has been the subject of multiple scholarly papers examining such topics as its effectiveness at teaching Arthurian literature or geometric thought and logic, the comedic techniques employed, and why the depiction of a killer rabbit is so fitting (killer rabbits frequently appear drawn in the margins of Gothic manuscripts). My personal favorite was a 2018 tongue-in-cheek paper on whether the Black Knight could have survived long enough to make good on his threat to bite King Arthur’s legs off (tl;dr: no).

So it’s not at all surprising that Monty Python and the Holy Grail proved to be equally influential and beloved by Ars staffers, several of whom offer their reminiscences below.

They were nerd-gassing before it was cool

The Monty Python troupe famously made Holy Grail on a shoestring budget—so much so that they couldn’t afford to have the knights ride actual horses. (There are only a couple of scenes featuring a horse, and apparently it’s the same horse.) Rather than throwing up their hands in resignation, that very real constraint fueled the Pythons’ creativity. The actors decided the knights would simply pretend to ride horses while their porters followed behind, banging halves of coconut shells together to mimic the sound of horses’ hooves—a time-honored Foley effect dating back to the early days of radio.

Being masters of absurdist humor, naturally, they had to call attention to it. Arthur and his trusty servant, Patsy (Gilliam), approach the castle of their first potential recruit. When Arthur informs the guards that they have “ridden the length and breadth of the land,” one of the guards isn’t having it. “What, ridden on a horse? You’re using coconuts! You’ve got two empty halves of coconut, and you’re bangin’ ’em together!”

That raises the obvious question: Where did they get the coconuts? What follows is one of the greatest examples of nerd-gassing yet to appear on film. Arthur claims he and Patsy found them, but the guard is incredulous since the coconut is tropical and England is a temperate zone. Arthur counters by invoking the example of migrating swallows. Coconuts do not migrate, but Arthur suggests they could be carried by swallows gripping a coconut by the husk.

The guard still isn’t having it. It’s a question of getting the weight ratios right, you see, to maintain air-speed velocity. Another guard gets involved, suggesting it might be possible with an African swallow, but that species is non-migratory. And so on. The two are still debating the issue as an exasperated Arthur rides off to find another recruit.

The best part? There’s a callback to that scene late in the film when the knights must answer three questions to cross the Bridge of Death or else be chucked into the Gorge of Eternal Peril. When it’s Arthur’s turn, the third question is “What is the air-speed velocity of an unladen swallow?” Arthur asks whether this is an African or a European swallow. This stumps the Bridgekeeper, who gets flung into the gorge. Sir Belvedere asks how Arthur came to know so much about swallows. Arthur replies, “Well, you have to know these things when you’re a king, you know.”

The plucky Black Knight will always hold a special place in my heart, but that debate over air-speed velocities of laden versus unladen swallows encapsulates what makes Holy Grail a timeless masterpiece.

Jennifer Ouellette

A bunny out for blood

“Oh, it’s just a harmless little bunny, isn’t it?”

Despite their appearances, rabbits aren’t always the most innocent-looking animals. Recent reports of rabbit strikes on airplanes are the latest examples of the mayhem these creatures of chaos can inflict on unsuspecting targets.

I learned that lesson a long time ago, though, thanks partly to my way-too-early viewings of the animated Watership Down and Monty Python and the Holy Grail. There I was, about 8 years old and absent of paternal accompaniment, watching previously cuddly creatures bloodying each other and severing the heads of King Arthur’s retinue. While Watership Down’s animal-on-animal violence might have been a bit scarring at that age, I enjoyed the slapstick humor of the Rabbit of Caerbannog scene (many of the jokes my colleagues highlight went over my head upon my initial viewing).

Despite being warned of the creature’s viciousness by Tim the Enchanter, the Knights of the Round Table dismiss the Merlin stand-in’s fear and charge the bloodthirsty creature. But the knights quickly realize they’re no match for the “bad-tempered rodent,” which zips around in the air, goes straight for the throat, and causes the surviving knights to run away in fear. If Arthur and his knights possessed any self-awareness, they might have learned a lesson about making assumptions about appearances.

But hopefully that’s a takeaway for viewers of 1970s British pop culture involving rabbits. Even cute bunnies, as sweet as they may seem initially, can be engines of destruction: “Death awaits you all with nasty, big, pointy teeth.”

Jacob May

Can’t stop the music

The most memorable songs from Monty Python and the Holy Grail were penned by Neil Innes, who frequently collaborated with the troupe and appears in the film. His “Brave Sir Robin” amusingly parodied minstrel tales of valor by imagining all the torturous ways that one knight might die. Then there’s his “Knights of the Round Table,” the first musical number performed by the cast—if you don’t count the monk chants punctuated with slaps on the head with wooden planks. That song hilariously rouses not just wild dancing from knights but also claps from prisoners who otherwise dangle from cuffed wrists.

But while these songs have stuck in my head for decades, Monty Python’s Terry Jones once gave me a reason to focus on the canned music instead, and it weirdly changed the way I’ve watched the movie ever since.

Back in 2001, Jones told Billboard that an early screening for investors almost tanked the film. He claimed that after the first five minutes, the movie got no laughs whatsoever. For Jones, whose directorial debut could have died in that moment, the silence was unthinkable. “It can’t be that unfunny,” he told Billboard. “There must be something wrong.”

Jones soon decided that the soundtrack was the problem, immediately cutting the “wonderfully rich, atmospheric” songs penned by Innes that seemed to be “overpowering the funny bits” in favor of canned music.

Reading this prompted an immediate rewatch because I needed to know what the first bit was that failed to get a laugh from that fateful audience. It turned out to be the scene where King Arthur encounters peasants in a field who deny knowing that there even was a king. As usual, I was incapable of holding back a burst of laughter when one peasant woman grieves, “Well, I didn’t vote for you” while packing random clumps of mud into the field. It made me wonder if any song might have robbed me of that laugh, and that made me pay closer attention to how Jones flipped the script and somehow meticulously used the canned music to extract more laughs.

The canned music was licensed from a British sound library that helped the 1920s movie business evolve past silent films. They’re some of the earliest songs to summon emotion from viewers whose eyes were glued to a screen. In Monty Python and the Holy Grail, which features a naive King Arthur enduring his perilous journey on a wood stick horse, the canned music provides the most predictable soundtrack you could imagine that might score a child’s game of make-believe. It also plays the straight man by earnestly pulsing to convey deep trouble as knights approach the bridge of death or heavenly trumpeting the anticipated appearance of the Holy Grail.

It’s easy to watch the movie without noticing the canned music, as the colorful performances are Jones’ intended focus. Not relying on punchlines, the group couldn’t afford any nuance to be lost. But there is at least one moment where Jones obviously relies on the music to overwhelm the acting to compel a belly laugh. Just before “the most foul, cruel, bad-tempered rodent” appears, a quick surge of dramatic music that cuts out just as suddenly makes it all the more absurd when the threat emerges and appears to be an “ordinary rabbit.”

It’s during this scene, too, that King Arthur delivers a line that sums up how predictably odd but deceptively artful the movie’s use of canned music really is. When he meets Tim the Enchanter—who tries to warn the knights about the rabbit’s “pointy teeth” by evoking loud thunder rolls and waggling his fingers in front of his mouth—Arthur turns to the knights and says, “What an eccentric performance.”

Ashley Belanger

Thank the “keg rock conclave”

I tried to make music a big part of my teenage identity because I didn’t have much else. I was a suburban kid with a B-minus/C-plus average, no real hobbies, sports, or extra-curriculars, plus a deeply held belief that Nine Inch Nails, the Beastie Boys, and Aphex Twin would never get their due as geniuses. Classic Rock, the stuff jocks listened to at parties and practice? That my dad sang along to after having a few? No thanks.

There were cultural heroes, there were musty, overwrought villains, and I knew the score. Or so I thought.

I don’t remember exactly where I found the little fact that scarred my oppositional ego forever. It might have been Spin magazine, a weekend MTV/VH1 feature, or that Rolling Stone book about the ’70s (I bought it for the punks, I swear). But at some point, I learned that a who’s-who of my era’s played-out bands—Led Zeppelin, Pink Floyd, even Jethro (freaking) Tull—personally funded one of my favorite subversive movies. Jimmy Page and Robert Plant, key members of the keg-rock conclave, attended the premiere.

It was such a small thing, but it raised such big, naive, adolescent questions. Somebody had to pay for Holy Grail—it didn’t just arrive as something passed between nerds? People who make things I might not enjoy could financially support things I do enjoy? There was a time when today’s overcelebrated dinosaurs were cool and hip in the subculture? I had common ground with David Gilmour?

Ever since, when a reference to Holy Grail is made, especially to how cheap it looks, I think about how I once learned that my beloved nerds (or theater kids) wouldn’t even have those coconut horses were it not for some decent-hearted jocks.

Kevin Purdy

A masterpiece of absurdism

“I blow my nose at you, English pig-dog!” EMI Films/Python (Monty) Pictures

I was young enough that I’d never previously stayed awake until midnight on New Year’s Eve. My parents were off to a party, my younger brother was in bed, and my older sister had a neglectful attitude toward babysitting me. So I was parked in front of the TV when the local PBS station aired a double feature of The Yellow Submarine and The Holy Grail.

At the time, I probably would have said my mind was blown. In retrospect, I’d prefer to think that my mind was expanded.

For years, those films mostly existed as a source of one-line evocations of sketch comedy nirvana that I’d swap with my friends. (I’m not sure I’ve ever lacked a group of peers where a properly paced “With… a herring!” had meaning.) But over time, I’ve come to appreciate other ways that the films have stuck with me. I can’t say whether they set me on an aesthetic trajectory that has continued for decades or if they were just the first things to tickle some underlying tendencies that were lurking in my not-yet-fully-wired brain.

In either case, my brain has developed into a huge fan of absurdism, whether in sketch comedy, longer narratives like Arrested Development or the lyrics of Courtney Barnett. Or, let’s face it, any stream of consciousness lyrics I’ve been able to hunt down. But Monty Python remains a master of the form, and The Holy Grail’s conclusion in a knight bust remains one of its purest expressions.

A bit less obviously, both films are probably my first exposures to anti-plotting, where linearity and a sense of time were really besides the point. With some rare exceptions—the eating of Sir Robin’s minstrels, Ringo putting a hole in his pocket—the order of the scenes were completely irrelevant. Few of the incidents had much consequence for future scenes. Since I was unused to staying up past midnight at that age, I’d imagine the order of events was fuzzy already by the next day. By the time I was swapping one-line excerpts with friends, it was long gone. And it just didn’t matter.

In retrospect, I think that helped ready my brain for things like Catch-22 and its convoluted, looping, non-Euclidean plotting. The novel felt like a revelation when I first read it, but I’ve since realized it fits a bit more comfortably within a spectrum of works that play tricks with time and find clever connections among seemingly random events.

I’m not sure what possessed someone to place these two films together as appropriate New Year’s Eve programming. But I’d like to think it was more intentional than I had any reason to suspect at the time. And I feel like I owe them a debt.

—John Timmer

A delightful send-up of autocracy

King Arthur attempting to throttle a peasant in the field

“See the violence inherent in the system!” Credit: Python (Monty) Pictures

What an impossible task to pick just a single thing I love about this film! But if I had to choose one scene, it would be when a lost King Arthur comes across an old woman—but oops, it’s actually a man named Dennis—and ends up in a discussion about medieval politics. Arthur explains that he is king because the Lady of the Lake conferred the sword Excalibur on him, signifying that he should rule as king of the Britons by divine right.

To this, Dennis replies, “Strange women lying in ponds distributing swords is no basis for a system of government. Supreme executive power derives from a mandate from the masses, not from some farcical aquatic ceremony.”

Even though it was filmed half a century ago, the scene offers a delightful send-up of autocracy. And not to be too much of a downer here, but all of us living in the United States probably need to be reminded that living in an autocracy would suck for a lot of reasons. So let’s not do that.

Eric Berger

Photo of Jennifer Ouellette

Jennifer is a senior writer at Ars Technica with a particular focus on where science meets culture, covering everything from physics and related interdisciplinary topics to her favorite films and TV series. Jennifer lives in Baltimore with her spouse, physicist Sean M. Carroll, and their two cats, Ariel and Caliban.

Monty Python and the Holy Grail turns 50 Read More »

ios-and-android-juice-jacking-defenses-have-been-trivial-to-bypass-for-years

iOS and Android juice jacking defenses have been trivial to bypass for years


SON OF JUICE JACKING ARISES

New ChoiceJacking attack allows malicious chargers to steal data from phones.

Credit: Aurich Lawson | Getty Images

Credit: Aurich Lawson | Getty Images

About a decade ago, Apple and Google started updating iOS and Android, respectively, to make them less susceptible to “juice jacking,” a form of attack that could surreptitiously steal data or execute malicious code when users plug their phones into special-purpose charging hardware. Now, researchers are revealing that, for years, the mitigations have suffered from a fundamental defect that has made them trivial to bypass.

“Juice jacking” was coined in a 2011 article on KrebsOnSecurity detailing an attack demonstrated at a Defcon security conference at the time. Juice jacking works by equipping a charger with hidden hardware that can access files and other internal resources of phones, in much the same way that a computer can when a user connects it to the phone.

An attacker would then make the chargers available in airports, shopping malls, or other public venues for use by people looking to recharge depleted batteries. While the charger was ostensibly only providing electricity to the phone, it was also secretly downloading files or running malicious code on the device behind the scenes. Starting in 2012, both Apple and Google tried to mitigate the threat by requiring users to click a confirmation button on their phones before a computer—or a computer masquerading as a charger—could access files or execute code on the phone.

The logic behind the mitigation was rooted in a key portion of the USB protocol that, in the parlance of the specification, dictates that a USB port can facilitate a “host” device or a “peripheral” device at any given time, but not both. In the context of phones, this meant they could either:

  • Host the device on the other end of the USB cord—for instance, if a user connects a thumb drive or keyboard. In this scenario, the phone is the host that has access to the internals of the drive, keyboard or other peripheral device.
  • Act as a peripheral device that’s hosted by a computer or malicious charger, which under the USB paradigm is a host that has system access to the phone.

An alarming state of USB security

Researchers at the Graz University of Technology in Austria recently made a discovery that completely undermines the premise behind the countermeasure: They’re rooted under the assumption that USB hosts can’t inject input that autonomously approves the confirmation prompt. Given the restriction against a USB device simultaneously acting as a host and peripheral, the premise seemed sound. The trust models built into both iOS and Android, however, present loopholes that can be exploited to defeat the protections. The researchers went on to devise ChoiceJacking, the first known attack to defeat juice-jacking mitigations.

“We observe that these mitigations assume that an attacker cannot inject input events while establishing a data connection,” the researchers wrote in a paper scheduled to be presented in August at the Usenix Security Symposium in Seattle. “However, we show that this assumption does not hold in practice.”

The researchers continued:

We present a platform-agnostic attack principle and three concrete attack techniques for Android and iOS that allow a malicious charger to autonomously spoof user input to enable its own data connection. Our evaluation using a custom cheap malicious charger design reveals an alarming state of USB security on mobile platforms. Despite vendor customizations in USB stacks, ChoiceJacking attacks gain access to sensitive user files (pictures, documents, app data) on all tested devices from 8 vendors including the top 6 by market share.

In response to the findings, Apple updated the confirmation dialogs in last month’s release of iOS/iPadOS 18.4 to require a user authentication in the form of a PIN or password. While the researchers were investigating their ChoiceJacking attacks last year, Google independently updated its confirmation with the release of version 15 in November. The researchers say the new mitigation works as expected on fully updated Apple and Android devices. Given the fragmentation of the Android ecosystem, however, many Android devices remain vulnerable.

All three of the ChoiceJacking techniques defeat Android juice-jacking mitigations. One of them also works against those defenses in Apple devices. In all three, the charger acts as a USB host to trigger the confirmation prompt on the targeted phone.

The attacks then exploit various weaknesses in the OS that allow the charger to autonomously inject “input events” that can enter text or click buttons presented in screen prompts as if the user had done so directly into the phone. In all three, the charger eventually gains two conceptual channels to the phone: (1) an input one allowing it to spoof user consent and (2) a file access connection that can steal files.

An illustration of ChoiceJacking attacks. (1) The victim device is attached to the malicious charger. (2) The charger establishes an extra input channel. (3) The charger initiates a data connection. User consent is needed to confirm it. (4) The charger uses the input channel to spoof user consent. Credit: Draschbacher et al.

It’s a keyboard, it’s a host, it’s both

In the ChoiceJacking variant that defeats both Apple- and Google-devised juice-jacking mitigations, the charger starts as a USB keyboard or a similar peripheral device. It sends keyboard input over USB that invokes simple key presses, such as arrow up or down, but also more complex key combinations that trigger settings or open a status bar.

The input establishes a Bluetooth connection to a second miniaturized keyboard hidden inside the malicious charger. The charger then uses the USB Power Delivery, a standard available in USB-C connectors that allows devices to either provide or receive power to or from the other device, depending on messages they exchange, a process known as the USB PD Data Role Swap.

A simulated ChoiceJacking charger. Bidirectional USB lines allow for data role swaps. Credit: Draschbacher et al.

With the charger now acting as a host, it triggers the file access consent dialog. At the same time, the charger still maintains its role as a peripheral device that acts as a Bluetooth keyboard that approves the file access consent dialog.

The full steps for the attack, provided in the Usenix paper, are:

1. The victim device is connected to the malicious charger. The device has its screen unlocked.

2. At a suitable moment, the charger performs a USB PD Data Role (DR) Swap. The mobile device now acts as a USB host, the charger acts as a USB input device.

3. The charger generates input to ensure that BT is enabled.

4. The charger navigates to the BT pairing screen in the system settings to make the mobile device discoverable.

5. The charger starts advertising as a BT input device.

6. By constantly scanning for newly discoverable Bluetooth devices, the charger identifies the BT device address of the mobile device and initiates pairing.

7. Through the USB input device, the charger accepts the Yes/No pairing dialog appearing on the mobile device. The Bluetooth input device is now connected.

8. The charger sends another USB PD DR Swap. It is now the USB host, and the mobile device is the USB device.

9. As the USB host, the charger initiates a data connection.

10. Through the Bluetooth input device, the charger confirms its own data connection on the mobile device.

This technique works against all but one of the 11 phone models tested, with the holdout being an Android device running the Vivo Funtouch OS, which doesn’t fully support the USB PD protocol. The attacks against the 10 remaining models take about 25 to 30 seconds to establish the Bluetooth pairing, depending on the phone model being hacked. The attacker then has read and write access to files stored on the device for as long as it remains connected to the charger.

Two more ways to hack Android

The two other members of the ChoiceJacking family work only against the juice-jacking mitigations that Google put into Android. In the first, the malicious charger invokes the Android Open Access Protocol, which allows a USB host to act as an input device when the host sends a special message that puts it into accessory mode.

The protocol specifically dictates that while in accessory mode, a USB host can no longer respond to other USB interfaces, such as the Picture Transfer Protocol for transferring photos and videos and the Media Transfer Protocol that enables transferring files in other formats. Despite the restriction, all of the Android devices tested violated the specification by accepting AOAP messages sent, even when the USB host hadn’t been put into accessory mode. The charger can exploit this implementation flaw to autonomously complete the required user confirmations.

The remaining ChoiceJacking technique exploits a race condition in the Android input dispatcher by flooding it with a specially crafted sequence of input events. The dispatcher puts each event into a queue and processes them one by one. The dispatcher waits for all previous input events to be fully processed before acting on a new one.

“This means that a single process that performs overly complex logic in its key event handler will delay event dispatching for all other processes or global event handlers,” the researchers explained.

They went on to note, “A malicious charger can exploit this by starting as a USB peripheral and flooding the event queue with a specially crafted sequence of key events. It then switches its USB interface to act as a USB host while the victim device is still busy dispatching the attacker’s events. These events therefore accept user prompts for confirming the data connection to the malicious charger.”

The Usenix paper provides the following matrix showing which devices tested in the research are vulnerable to which attacks.

The susceptibility of tested devices to all three ChoiceJacking attack techniques. Credit: Draschbacher et al.

User convenience over security

In an email, the researchers said that the fixes provided by Apple and Google successfully blunt ChoiceJacking attacks in iPhones, iPads, and Pixel devices. Many Android devices made by other manufacturers, however, remain vulnerable because they have yet to update their devices to Android 15. Other Android devices—most notably those from Samsung running the One UI 7 software interface—don’t implement the new authentication requirement, even when running on Android 15. The omission leaves these models vulnerable to ChoiceJacking. In an email, principal paper author Florian Draschbacher wrote:

The attack can therefore still be exploited on many devices, even though we informed the manufacturers about a year ago and they acknowledged the problem. The reason for this slow reaction is probably that ChoiceJacking does not simply exploit a programming error. Rather, the problem is more deeply rooted in the USB trust model of mobile operating systems. Changes here have a negative impact on the user experience, which is why manufacturers are hesitant. [It] means for enabling USB-based file access, the user doesn’t need to simply tap YES on a dialog but additionally needs to present their unlock PIN/fingerprint/face. This inevitably slows down the process.

The biggest threat posed by ChoiceJacking is to Android devices that have been configured to enable USB debugging. Developers often turn on this option so they can troubleshoot problems with their apps, but many non-developers enable it so they can install apps from their computer, root their devices so they can install a different OS, transfer data between devices, and recover bricked phones. Turning it on requires a user to flip a switch in Settings > System > Developer options.

If a phone has USB Debugging turned on, ChoiceJacking can gain shell access through the Android Debug Bridge. From there, an attacker can install apps, access the file system, and execute malicious binary files. The level of access through the Android Debug Mode is much higher than that through Picture Transfer Protocol and Media Transfer Protocol, which only allow read and write access to system files.

The vulnerabilities are tracked as:

    • CVE-2025-24193 (Apple)
    • CVE-2024-43085 (Google)
    • CVE-2024-20900 (Samsung)
    • CVE-2024-54096 (Huawei)

A Google spokesperson confirmed that the weaknesses were patched in Android 15 but didn’t speak to the base of Android devices from other manufacturers, who either don’t support the new OS or the new authentication requirement it makes possible. Apple declined to comment for this post.

Word that juice-jacking-style attacks are once again possible on some Android devices and out-of-date iPhones is likely to breathe new life into the constant warnings from federal authorities, tech pundits, news outlets, and local and state government agencies that phone users should steer clear of public charging stations.

As I reported in 2023, these warnings are mostly scaremongering, and the advent of ChoiceJacking does little to change that, given that there are no documented cases of such attacks in the wild. That said, people using Android devices that don’t support Google’s new authentication requirement may want to refrain from public charging.

Photo of Dan Goodin

Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at here on Mastodon and here on Bluesky. Contact him on Signal at DanArs.82.

iOS and Android juice jacking defenses have been trivial to bypass for years Read More »

in-the-age-of-ai,-we-must-protect-human-creativity-as-a-natural-resource

In the age of AI, we must protect human creativity as a natural resource


Op-ed: As AI outputs flood the Internet, diverse human perspectives are our most valuable resource.

Ironically, our present AI age has shone a bright spotlight on the immense value of human creativity as breakthroughs in technology threaten to undermine it. As tech giants rush to build newer AI models, their web crawlers vacuum up creative content, and those same models spew floods of synthetic media, risking drowning out the human creative spark in an ocean of pablum.

Given this trajectory, AI-generated content may soon exceed the entire corpus of historical human creative works, making the preservation of the human creative ecosystem not just an ethical concern but an urgent imperative. The alternative is nothing less than a gradual homogenization of our cultural landscape, where machine learning flattens the richness of human expression into a mediocre statistical average.

A limited resource

By ingesting billions of creations, chatbots learn to talk, and image synthesizers learn to draw. Along the way, the AI companies behind them treat our shared culture like an inexhaustible resource to be strip-mined, with little thought for the consequences.

But human creativity isn’t the product of an industrial process; it’s inherently throttled precisely because we are finite biological beings who draw inspiration from real lived experiences while balancing creativity with the necessities of life—sleep, emotional recovery, and limited lifespans. Creativity comes from making connections, and it takes energy, time, and insight for those connections to be meaningful. Until recently, a human brain was a prerequisite for making those kinds of connections, and there’s a reason why that is valuable.

Every human brain isn’t just a store of data—it’s a knowledge engine that thinks in a unique way, creating novel combinations of ideas. Instead of having one “connection machine” (an AI model) duplicated a million times, we have seven billion neural networks, each with a unique perspective. Relying on the diversity of thought derived from human cognition helps us escape the monolithic thinking that may emerge if everyone were to draw from the same AI-generated sources.

Today, the AI industry’s business models unintentionally echo the ways in which early industrialists approached forests and fisheries—as free inputs to exploit without considering ecological limits.

Just as pollution from early factories unexpectedly damaged the environment, AI systems risk polluting the digital environment by flooding the Internet with synthetic content. Like a forest that needs careful management to thrive or a fishery vulnerable to collapse from overexploitation, the creative ecosystem can be degraded even if the potential for imagination remains.

Depleting our creative diversity may become one of the hidden costs of AI, but that diversity is worth preserving. If we let AI systems deplete or pollute the human outputs they depend on, what happens to AI models—and ultimately to human society—over the long term?

AI’s creative debt

Every AI chatbot or image generator exists only because of human works, and many traditional artists argue strongly against current AI training approaches, labeling them plagiarism. Tech companies tend to disagree, although their positions vary. For example, in 2023, imaging giant Adobe took an unusual step by training its Firefly AI models solely on licensed stock photos and public domain works, demonstrating that alternative approaches are possible.

Adobe’s licensing model offers a contrast to companies like OpenAI, which rely heavily on scraping vast amounts of Internet content without always distinguishing between licensed and unlicensed works.

Photo of a mining dumptruck and water tank in an open pit copper mine.

OpenAI has argued that this type of scraping constitutes “fair use” and effectively claims that competitive AI models at current performance levels cannot be developed without relying on unlicensed training data, despite Adobe’s alternative approach.

The “fair use” argument often hinges on the legal concept of “transformative use,” the idea that using works for a fundamentally different purpose from creative expression—such as identifying patterns for AI—does not violate copyright. Generative AI proponents often argue that their approach is how human artists learn from the world around them.

Meanwhile, artists are expressing growing concern about losing their livelihoods as corporations turn to cheap, instantaneously generated AI content. They also call for clear boundaries and consent-driven models rather than allowing developers to extract value from their creations without acknowledgment or remuneration.

Copyright as crop rotation

This tension between artists and AI reveals a deeper ecological perspective on creativity itself. Copyright’s time-limited nature was designed as a form of resource management, like crop rotation or regulated fishing seasons that allow for regeneration. Copyright expiration isn’t a bug; its designers hoped it would ensure a steady replenishment of the public domain, feeding the ecosystem from which future creativity springs.

On the other hand, purely AI-generated outputs cannot be copyrighted in the US, potentially brewing an unprecedented explosion in public domain content, although it’s content that contains smoothed-over imitations of human perspectives.

Treating human-generated content solely as raw material for AI training disrupts this ecological balance between “artist as consumer of creative ideas” and “artist as producer.” Repeated legislative extensions of copyright terms have already significantly delayed the replenishment cycle, keeping works out of the public domain for much longer than originally envisioned. Now, AI’s wholesale extraction approach further threatens this delicate balance.

The resource under strain

Our creative ecosystem is already showing measurable strain from AI’s impact, from tangible present-day infrastructure burdens to concerning future possibilities.

Aggressive AI crawlers already effectively function as denial-of-service attacks on certain sites, with Cloudflare documenting GPTBot’s immediate impact on traffic patterns. Wikimedia’s experience provides clear evidence of current costs: AI crawlers caused a documented 50 percent bandwidth surge, forcing the nonprofit to divert limited resources to defensive measures rather than to its core mission of knowledge sharing. As Wikimedia says, “Our content is free, our infrastructure is not.” Many of these crawlers demonstrably ignore established technical boundaries like robots.txt files.

Beyond infrastructure strain, our information environment also shows signs of degradation. Google has publicly acknowledged rising volumes of “spammy, low-quality,” often auto-generated content appearing in search results. A Wired investigation found concrete examples of AI-generated plagiarism sometimes outranking original reporting in search results. This kind of digital pollution led Ross Anderson of Cambridge University to compare it to filling oceans with plastic—it’s a contamination of our shared information spaces.

Looking to the future, more risks may emerge. Ted Chiang’s comparison of LLMs to lossy JPEGs offers a framework for understanding potential problems, as each AI generation summarizes web information into an increasingly “blurry” facsimile of human knowledge. The logical extension of this process—what some researchers term “model collapse“—presents a risk of degradation in our collective knowledge ecosystem if models are trained indiscriminately on their own outputs. (However, this differs from carefully designed synthetic data that can actually improve model efficiency.)

This downward spiral of AI pollution may soon resemble a classic “tragedy of the commons,” in which organizations act from self-interest at the expense of shared resources. If AI developers continue extracting data without limits or meaningful contributions, the shared resource of human creativity could eventually degrade for everyone.

Protecting the human spark

While AI models that simulate creativity in writing, coding, images, audio, or video can achieve remarkable imitations of human works, this sophisticated mimicry currently lacks the full depth of the human experience.

For example, AI models lack a body that endures the pain and travails of human life. They don’t grow over the course of a human lifespan in real time. When an AI-generated output happens to connect with us emotionally, it often does so by imitating patterns learned from a human artist who has actually lived that pain or joy.

A photo of a young woman painter in her art studio.

Even if future AI systems develop more sophisticated simulations of emotional states or embodied experiences, they would still fundamentally differ from human creativity, which emerges organically from lived biological experience, cultural context, and social interaction.

That’s because the world constantly changes. New types of human experience emerge. If an ethically trained AI model is to remain useful, researchers must train it on recent human experiences, such as viral trends, evolving slang, and cultural shifts.

Current AI solutions, like retrieval-augmented generation (RAG), address this challenge somewhat by retrieving up-to-date, external information to supplement their static training data. Yet even RAG methods depend heavily on validated, high-quality human-generated content—the very kind of data at risk if our digital environment becomes overwhelmed with low-quality AI-produced output.

This need for high-quality, human-generated data is a major reason why companies like OpenAI have pursued media deals (including a deal signed with Ars Technica parent Condé Nast last August). Yet paradoxically, the same models fed on valuable human data often produce the low-quality spam and slop that floods public areas of the Internet, degrading the very ecosystem they rely on.

AI as creative support

When used carelessly or excessively, generative AI is a threat to the creative ecosystem, but we can’t wholly discount the tech as a tool in a human creative’s arsenal. The history of art is full of technological changes (new pigments, brushes, typewriters, word processors) that transform the nature of artistic production while augmenting human creativity.

Bear with me because there’s a great deal of nuance here that is easy to miss among today’s more impassioned reactions to people using AI as a blunt instrument of creating mediocrity.

While many artists rightfully worry about AI’s extractive tendencies, research published in Harvard Business Review indicates that AI tools can potentially amplify rather than merely extract creative capacity, suggesting that a symbiotic relationship is possible under the right conditions.

Inherent in this argument is that the responsible use of AI is reflected in the skill of the user. You can use a paintbrush to paint a wall or paint the Mona Lisa. Similarly, generative AI can mindlessly fill a canvas with slop, or a human can utilize it to express their own ideas.

Machine learning tools (such as those in Adobe Photoshop) already help human creatives prototype concepts faster, iterate on variations they wouldn’t have considered, or handle some repetitive production tasks like object removal or audio transcription, freeing humans to focus on conceptual direction and emotional resonance.

These potential positives, however, don’t negate the need for responsible stewardship and respecting human creativity as a precious resource.

Cultivating the future

So what might a sustainable ecosystem for human creativity actually involve?

Legal and economic approaches will likely be key. Governments could legislate that AI training must be opt-in, or at the very least, provide a collective opt-out registry (as the EU’s “AI Act” does).

Other potential mechanisms include robust licensing or royalty systems, such as creating a royalty clearinghouse (like the music industry’s BMI or ASCAP) for efficient licensing and fair compensation. Those fees could help compensate human creatives and encourage them to keep creating well into the future.

Deeper shifts may involve cultural values and governance. Inspired by models like Japan’s “Living National Treasures“—where the government funds artisans to preserve vital skills and support their work. Could we establish programs that similarly support human creators while also designating certain works or practices as “creative reserves,” funding the further creation of certain creative works even if the economic market for them dries up?

Or a more radical shift might involve an “AI commons”—legally declaring that any AI model trained on publicly scraped data should be owned collectively as a shared public domain, ensuring that its benefits flow back to society and don’t just enrich corporations.

Photo of family Harvesting Organic Crops On Farm

Meanwhile, Internet platforms have already been experimenting with technical defenses against industrial-scale AI demands. Examples include proof-of-work challenges, slowdown “tarpits” (e.g., Nepenthes), shared crawler blocklists (“ai.robots.txt“), commercial tools (Cloudflare’s AI Labyrinth), and Wikimedia’s “WE5: Responsible Use of Infrastructure” initiative.

These solutions aren’t perfect, and implementing any of them would require overcoming significant practical hurdles. Strict regulations might slow beneficial AI development; opt-out systems burden creators, while opt-in models can be complex to track. Meanwhile, tech defenses often invite arms races. Finding a sustainable, equitable balance remains the core challenge. The issue won’t be solved in a day.

Invest in people

While navigating these complex systemic challenges will take time and collective effort, there is a surprisingly direct strategy that organizations can adopt now: investing in people. Don’t sacrifice human connection and insight to save money with mediocre AI outputs.

Organizations that cultivate unique human perspectives and integrate them with thoughtful AI augmentation will likely outperform those that pursue cost-cutting through wholesale creative automation. Investing in people acknowledges that while AI can generate content at scale, the distinctiveness of human insight, experience, and connection remains priceless.

Photo of Benj Edwards

Benj Edwards is Ars Technica’s Senior AI Reporter and founder of the site’s dedicated AI beat in 2022. He’s also a tech historian with almost two decades of experience. In his free time, he writes and records music, collects vintage computers, and enjoys nature. He lives in Raleigh, NC.

In the age of AI, we must protect human creativity as a natural resource Read More »

review:-ryzen-ai-cpu-makes-this-the-fastest-the-framework-laptop-13-has-ever-been

Review: Ryzen AI CPU makes this the fastest the Framework Laptop 13 has ever been


With great power comes great responsibility and subpar battery life.

The latest Framework Laptop 13, which asks you to take the good with the bad. Credit: Andrew Cunningham

The latest Framework Laptop 13, which asks you to take the good with the bad. Credit: Andrew Cunningham

At this point, the Framework Laptop 13 is a familiar face, an old friend. We have reviewed this laptop five other times, and in that time, the idea of a repairable and upgradeable laptop has gone from a “sounds great if they can pull it off” idea to one that’s become pretty reliable and predictable. And nearly four years out from the original version—which shipped with an 11th-generation Intel Core processor—we’re at the point where an upgrade will get you significant boosts to CPU and GPU performance, plus some other things.

We’re looking at the Ryzen AI 300 version of the Framework Laptop today, currently available for preorder and shipping in Q2 for people who buy one now. The laptop starts at $1,099 for a pre-built version and $899 for a RAM-less, SSD-less, Windows-less DIY version, and we’ve tested the Ryzen AI 9 HX 370 version that starts at $1,659 before you add RAM, an SSD, or an OS.

This board is a direct upgrade to Framework’s Ryzen 7040-series board from mid-2023, with most of the same performance benefits we saw last year when we first took a look at the Ryzen AI 300 series. It’s also, if this matters to you, the first Framework Laptop to meet Microsoft’s requirements for its Copilot+ PC initiative, giving users access to some extra locally processed AI features (including but not limited to Recall) with the promise of more to come.

For this upgrade, Ryzen AI giveth, and Ryzen AI taketh away. This is the fastest the Framework Laptop 13 has ever been (at least, if you spring for the Ryzen AI 9 HX 370 chip that our review unit shipped with). If you’re looking to do some light gaming (or non-Nvidia GPU-accelerated computing), the Radeon 890M GPU is about as good as it gets. But you’ll pay for it in battery life—never a particularly strong point for Framework, and less so here than in most of the Intel versions.

What’s new, Framework?

This Framework update brings the return of colorful translucent accessories, parts you can also add to an older Framework Laptop if you want. Credit: Andrew Cunningham

We’re going to focus on what makes this particular Framework Laptop 13 different from the past iterations. We talk more about the build process and the internals in our review of the 12th-generation Intel Core version, and we ran lots of battery tests with the new screen in our review of the Intel Core Ultra version. We also have coverage of the original Ryzen version of the laptop, with the Ryzen 7 7840U and Radeon 780M GPU installed.

Per usual, every internal refresh of the Framework Laptop 13 comes with another slate of external parts. Functionally, there’s not a ton of exciting stuff this time around—certainly nothing as interesting as the higher-resolution 120 Hz screen option we got with last year’s Intel Meteor Lake update—but there’s a handful of things worth paying attention to.

Functionally, Framework has slightly improved the keyboard, with “a new key structure” on the spacebar and shift keys that “reduce buzzing when your speakers are cranked up.” I can’t really discern a difference in the feel of the keyboard, so this isn’t a part I’d run out to add to my own Framework Laptop, but it’s a fringe benefit if you’re buying an all-new laptop or replacing your keyboard for some other reason.

Keyboard legends have also been tweaked; pre-built Windows versions get Microsoft’s dedicated (and, within limits, customizable) Copilot key, while DIY editions come with a Framework logo on the Windows/Super key (instead of the word “super”) and no Copilot key.

Cosmetically, Framework is keeping the dream of the late ’90s alive with translucent plastic parts, namely the bezel around the display and the USB-C Expansion Modules. I’ll never say no to additional customization options, though I still think that “silver body/lid with colorful bezel/ports” gives the laptop a rougher, unfinished-looking vibe.

Like the other Ryzen Framework Laptops (both 13 and 16), not all of the Ryzen AI board’s four USB-C ports support all the same capabilities, so you’ll want to arrange your ports carefully.

Framework’s recommendations for how to configure the Ryzen AI laptop’s expansion modules. Credit: Framework

Framework publishes a graphic to show you which ports do what; if you’re looking at the laptop from the front, ports 1 and 3 are on the back, and ports 2 and 4 are toward the front. Generally, ports 1 and 3 are the “better” ones, supporting full USB4 speeds instead of USB 3.2 and DisplayPort 2.0 instead of 1.4. But USB-A modules should go in ports 2 or 4 because they’ll consume extra power in bays 1 and 3. All four do support display output, though, which isn’t the case for the Ryzen 7040 Framework board, and all four continue to support USB-C charging.

The situation has improved from the 7040 version of the Framework board, where not all of the ports could do any kind of display output. But it still somewhat complicates the laptop’s customizability story relative to the Intel versions, where any expansion card can go into any port.

I will also say that this iteration of the Framework laptop hasn’t been perfectly stable for me. The problems are intermittent but persistent, despite using the latest BIOS version (3.03 as of this writing) and driver package available from Framework. I had a couple of total-system freezes/crashes, occasional problems waking from sleep, and sporadic rendering glitches in Microsoft Edge. These weren’t problems I’ve had with the other Ryzen AI laptops I’ve used so far or with the Ryzen 7040 version of the Framework 13. They also persisted across two separate clean installs of Windows.

It’s possible/probable that some combination of firmware and driver updates can iron out these problems, and they generally didn’t prevent me from using the laptop the way I wanted to use it, but I thought it was worth mentioning since my experience with new Framework boards has usually been a bit better than this.

Internals and performance

“Ryzen AI” is AMD’s most recent branding update for its high-end laptop chips, but you don’t actually need to care about AI to appreciate the solid CPU and GPU speed upgrades compared to the last-generation Ryzen Framework or older Intel versions of the laptop.

Our Framework Laptop board uses the fastest processor offering: a Ryzen AI 9 HX 370 with four of AMD’s Zen 5 CPU cores, eight of the smaller, more power-efficient Zen 5c cores, and a Radeon 890M integrated GPU with 16 of AMD’s RDNA 3.5 graphics cores.

There are places where the Intel Arc graphics in the Core Ultra 7/Meteor Lake version of the Framework Laptop are still faster than what AMD can offer, though your experience may vary depending on the games or apps you’re trying to use. Generally, our benchmarks show the Arc GPU ahead by a small amount, but it’s not faster across the board.

Relative to other Ryzen AI systems, the Framework Laptop’s graphics performance also suffers somewhat because socketed DDR5 DIMMs don’t run as fast as RAM that’s been soldered to the motherboard. This is one of the trade-offs you’re probably OK with making if you’re looking at a Framework Laptop in the first place, but it’s worth mentioning.

A few actual game benchmarks. Ones with ray-tracing features enabled tend to favor Intel’s Arc GPU, while the Radeon 890M pulls ahead in some other games.

But the new Ryzen chip’s CPU is dramatically faster than Meteor Lake at just about everything, as well as the older Ryzen 7 7840U in the older Framework board. This is the fastest the Framework Laptop has ever been, and it’s not particularly close (but if you’re waffling between the Ryzen AI version, the older AMD version that Framework sells for a bit less money or the Core Ultra 7 version, wait to see the battery life results before you spend any money). Power efficiency has also improved for heavy workloads, as demonstrated by our Handbrake video encoding tests—the Ryzen AI chip used a bit less power under heavy load and took less time to transcode our test video, so it uses quite a bit less power overall to do the same work.

Power efficiency tests under heavy load using the Handbrake transcoding tool. Test uses CPU for encoding and not hardware-accelerated GPU-assisted encoding.

We didn’t run specific performance tests on the Ryzen AI NPU, but it’s worth noting that this is also Framework’s first laptop with a neural processing unit (NPU) fast enough to support the full range of Microsoft’s Copilot+ PC features—this was one of the systems I used to test Microsoft’s near-final version of Windows Recall, for example. Intel’s other Core Ultra 100 chips, all 200-series Core Ultra chips other than the 200V series (codenamed Lunar Lake), and AMD’s Ryzen 7000- and 8000-series processors often include NPUs, but they don’t meet Microsoft’s performance requirements.

The Ryzen AI chips are also the only Copilot+ compatible processors on the market that Framework could have used while maintaining the Laptop’s current level of upgradeability. Qualcomm’s Snapdragon X Elite and Plus chips don’t support external RAM—at least, Qualcomm only lists support for soldered-down LPDDR5X in its product sheets—and Intel’s Core Ultra 200V processors use RAM integrated into the processor package itself. So if any of those features appeal to you, this is the only Framework Laptop you can buy to take advantage of them.

Battery and power

Battery tests. The Ryzen AI 300 doesn’t do great, though it’s similar to the last-gen Ryzen Framework.

When paired with the higher-resolution screen option and Framework’s 61 WHr battery, the Ryzen AI version of the laptop lasted around 8.5 hours in a PCMark Modern Office battery life test with the screen brightness set to a static 200 nits. This is a fair bit lower than the Intel Core Ultra version of the board, and it’s even worse when compared to what a MacBook Air or a more typical PC laptop will give you. But it’s holding roughly even with the older Ryzen version of the Framework board despite being much faster.

You can improve this situation somewhat by opting for the cheaper, lower-resolution screen; we didn’t test it with the Ryzen AI board, and Framework won’t sell you the lower-resolution screen with the higher-end chip. But for upgraders using the older panel, the higher-res screen reduced battery life by between 5 and 15 percent in past testing of older Framework Laptops. The slower Ryzen AI 5 and Ryzen AI 7 versions will also likely last a little longer, though Framework usually only sends us the highest-end versions of its boards to test.

A routine update

This combo screwdriver-and-spudger is still the only tool you need to take a Framework Laptop apart. Credit: Andrew Cunningham

It’s weird that my two favorite laptops right now are probably Apple’s MacBook Air and the Framework Laptop 13, but that’s where I am. They represent opposite visions of computing, each of which appeals to a different part of my brain: The MacBook Air is the personal computer at its most appliance-like, the thing you buy (or recommend) if you just don’t want to think about your computer that much. Framework embraces a more traditionally PC-like approach, favoring open standards and interoperable parts; the result is more complicated and chaotic but also more flexible. It’s the thing you buy when you like thinking about your computer.

Framework Laptop buyers continue to pay a price for getting a more repairable and modular laptop. Battery life remains OK at best, and Framework doesn’t seem to have substantially sped up its firmware or driver releases since we talked with them about it last summer. You’ll need to be comfortable taking things apart, and you’ll need to make sure you put the right expansion modules in the right bays. And you may end up paying more than you would to get the same specs from a different laptop manufacturer.

But what you get in return still feels kind of magical, and all the more so because Framework has now been shipping product for four years. The Ryzen AI version of the laptop is probably the one I’d recommend if you were buying a new one, and it’s also a huge leap forward for anyone who bought into the first-generation Framework Laptop a few years ago and is ready for an upgrade. It’s by far the fastest CPU (and, depending on the app, the fastest or second-fastest GPU) Framework has shipped in the Laptop 13. And it’s nice to at least have the option of using Copilot+ features, even if you’re not actually interested in the ones Microsoft is currently offering.

If none of the other Framework Laptops have interested you yet, this one probably won’t, either. But it’s yet another improvement in what has become a steady, consistent sequence of improvements. Mediocre battery life is hard to excuse in a laptop, but if that’s not what’s most important to you, Framework is still offering something laudable and unique.

The good

  • Framework still gets all of the basics right—a matte 3:2 LCD that’s pleasant to look at, a nice-feeling keyboard and trackpad, and a design
  • Fastest CPU ever in the Framework Laptop 13, and the fastest or second-fastest integrated GPU
  • First Framework Laptop to support Copilot+ features in Windows, if those appeal to you at all
  • Fun translucent customization options
  • Modular, upgradeable, and repairable—more so than with most laptops, you’re buying a laptop that can change along with your needs and which will be easy to refurbish or hand down to someone else when you’re ready to replace it
  • Official support for both Windows and Linux

The bad

  • Occasional glitchiness that may or may not be fixed with future firmware or driver updates
  • Some expansion modules are slower or have higher power draw if you put them in the wrong place
  • Costs more than similarly specced laptops from other OEMs
  • Still lacks certain display features some users might require or prefer—in particular, there are no OLED, touchscreen, or wide-color-gamut options

The ugly

  • Battery life remains an enduring weak point.

Photo of Andrew Cunningham

Andrew is a Senior Technology Reporter at Ars Technica, with a focus on consumer tech including computer hardware and in-depth reviews of operating systems like Windows and macOS. Andrew lives in Philadelphia and co-hosts a weekly book podcast called Overdue.

Review: Ryzen AI CPU makes this the fastest the Framework Laptop 13 has ever been Read More »

in-depth-with-windows-11-recall—and-what-microsoft-has-(and-hasn’t)-fixed

In depth with Windows 11 Recall—and what Microsoft has (and hasn’t) fixed


Original botched launch still haunts new version of data-scraping AI feature.

Recall is coming back. Credit: Andrew Cunningham

Recall is coming back. Credit: Andrew Cunningham

Microsoft is preparing to reintroduce Recall to Windows 11. A feature limited to Copilot+ PCs—a label that just a fraction of a fraction of Windows 11 systems even qualify for—Recall has been controversial in part because it builds an extensive database of text and screenshots that records almost everything you do on your PC.

But the main problem with the initial version of Recall—the one that was delayed at the last minute after a large-scale outcry from security researchers, reporters, and users—was not just that it recorded everything you did on your PC but that it was a rushed, enabled-by-default feature with gaping security holes that made it trivial for anyone with any kind of access to your PC to see your entire Recall database.

It made no efforts to automatically exclude sensitive data like bank information or credit card numbers, offering just a few mechanisms to users to manually exclude specific apps or websites. It had been built quickly, outside of the normal extensive Windows Insider preview and testing process. And all of this was happening at the same time that the company was pledging to prioritize security over all other considerations, following several serious and highly public breaches.

Any coverage of the current version of Recall should mention what has changed since then.

Recall is being rolled out to Microsoft’s Windows Insider Release Preview channel after months of testing in the more experimental and less-stable channels, just like most other Windows features. It’s turned off by default and can be removed from Windows root-and-branch by users and IT administrators who don’t want it there. Microsoft has overhauled the feature’s underlying security architecture, encrypting data at rest so it can’t be accessed by other users on the PC, adding automated filters to screen out sensitive information, and requiring frequent reauthentication with Windows Hello anytime a user accesses their own Recall database.

Testing how Recall works

I installed the Release Preview Windows 11 build with Recall on a Snapdragon X Elite version of the Surface Laptop and a couple of Ryzen AI PCs, which all have NPUs fast enough to support the Copilot+ features.

No Windows PCs without this NPU will offer Recall or any other Copilot+ features—that’s every single PC sold before mid-2024 and the vast majority of PCs since then. Users may come up with ways to run those features on unsupported hardware some other way. But by default, Recall isn’t something most of Windows’ current user base will have to worry about.

Microsoft is taking data protection more seriously this time around. If Windows Hello isn’t enabled or drive encryption isn’t turned on, Recall will refuse to start working until you fix the issues. Credit: Andrew Cunningham

After installing the update, you’ll see a single OOBE-style setup screen describing Recall and offering to turn it on; as promised, it is now off by default until you opt in. And even if you accept Recall on this screen, you have to opt in a second time as part of the Recall setup to actually turn the feature on. We’ll be on high alert for a bait-and-switch when Microsoft is ready to remove Recall’s “preview” label, whenever that happens, but at least for now, opt-in means opt-in.

Enable Recall, and the snapshotting begins. As before, it’s storing two things: actual screenshots of the active area of your screen, minus the taskbar, and a searchable database of text that it scrapes from those screenshots using OCR. Somewhat oddly, there are limits on what Recall will offer to OCR for you; even if you’re using multiple apps onscreen at the same time, only the active, currently-in-focus app seems to have its text scraped and stored.

This is also more or less how Recall handles multi-monitor support; only the active display has screenshots taken, and only the active window on the active display is OCR’d. This does prevent Recall from taking gigabytes and gigabytes of screenshots of static or empty monitors, though it means the app may miss capturing content that updates passively if you don’t interact with those windows periodically.

All of this OCR’d text is fully searchable and can be copied directly from Recall to be pasted somewhere else. Recall will also offer to open whatever app or website is visible in the screenshot, and it gives you the option to delete that specific screenshot and all screenshots from specific apps (handy, if you decide you want to add an entire app to your filtering settings and you want to get rid of all existing snapshots of it).

Here are some basic facts about how Recall works on a PC since there’s a lot of FUD circulating about this, and much of the information on the Internet is about the older, insecure version from last year:

  • Recall is per-user. Setting up Recall for one user account does not turn on Recall for all users of a PC.
  • Recall does not require a Microsoft account.
  • Recall does not require an Internet connection or any cloud-side processing to work.
  • Recall does require your local disk to be encrypted with Device Encryption/BitLocker.
  • Recall does require Windows Hello and either a fingerprint reader or face-scanning camera for setup, though once it’s set up, it can be unlocked with a Windows Hello PIN.
  • Windows Hello authentication happens every time you open the Recall app.
  • Enabling Recall and changing its settings does not require an administrator account.
  • Recall can be uninstalled entirely by unchecking it in the legacy Windows Features control panel (you can also search for “turn Windows features on and off”).

If you read our coverage of the initial version, there’s a whole lot about how Recall functions that’s essentially the same as it was before. In Settings, you can see how much storage the feature is using and limit the total amount of storage Recall can use. The amount of time a snapshot can be kept is normally determined by the amount of space available, not by the age of the snapshot, but you can optionally choose a second age-based expiration date for snapshots (options range from 30 to 180 days).

You can see Recall hit the system’s NPU periodically every time it takes a snapshot (this is on an AMD Ryzen AI system, but it should be the same for Qualcomm Snapdragon PCs and Intel Core Ultra/Lunar Lake systems). Browsing your Recall database doesn’t use the NPU. Credit: Andrew Cunningham

It’s also possible to delete the entire database or all recent snapshots (those from the past hour, past day, past week, or past month), toggle the automated filtering of sensitive content, or add specific apps and websites you’d like to have filtered. Recall can temporarily be paused by clicking the system tray icon (which is always visible when you have Recall turned on), and it can be turned off entirely in Settings. Neither of these options will delete existing snapshots; they just stop your PC from creating new ones.

The amount of space Recall needs to do its thing will depend on a bunch of factors, including how actively you use your PC and how many things you filter out. But in my experience, it can easily generate a couple of hundred megabytes per day of images. A Ryzen system with a 1TB SSD allocated 150GB of space to Recall snapshots by default, but even a smaller 25GB Recall database could easily store a few months of data.

Fixes: Improved filtering, encryption at rest

For apps and sites that you know you don’t want to end up in Recall, you can manually add them to the exclusion lists in the Settings app. As a rule, major browsers running in private or incognito modes are also generally not snapshotted.

If you have an app that’s being filtered onscreen for any reason—even if it’s onscreen at the same time as an app that’s not being filtered, Recall won’t take pictures of your desktop at all. I ran an InPrivate Microsoft Edge window next to a regular window, and Microsoft’s solution is just to avoid capturing and storing screenshots entirely rather than filtering or blanking out the filtered app or site in some way.

This is probably the best way to do it! It minimizes the risk of anything being captured accidentally just because it’s running in the background, for example. But it could mean you don’t end up capturing much in Recall at all if you’re frequently mixing filtered and unfiltered apps.

New to this version of Recall is an attempt at automated content filtering to address one of the major concerns about the original iteration of Recall—that it can capture and store sensitive information like credit card numbers and passwords. This filtering is based on the technology Microsoft uses for Microsoft Purview Information Protection, an enterprise feature used to tag sensitive information on business, healthcare, and government systems.

This automated content filtering is hit and miss. Recall wouldn’t take snapshots of a webpage with a visible credit card field, or my online banking site, or an image of my driver’s license, or a recent pay stub, or of the Bitwarden password manager while viewing credentials. But I managed to find edge cases in less than five minutes, and you’ll be able to find them, too; Recall saved snapshots showing a recent check, with the account holder’s name, address, and account and routing numbers visible, and others testing it have still caught it recording credit card information in some cases.

The automated filtering is still a big improvement from before, when it would capture this kind of information indiscriminately. But things will inevitably slip through, and the automated filtering won’t help at all with other kinds of data; Recall will take pictures of email and messaging apps without distinguishing between what’s sensitive (school information for my kid, emails about Microsoft’s own product embargoes) and what isn’t.

Recall can be removed entirely. If you take it out, it’s totally gone—the options to configure it won’t even appear in Settings anymore. Credit: Andrew Cunningham

The upshot is that if you capture months and months and gigabytes and gigabytes of Recall data on your PC, it’s inevitable that it will capture something you probably wouldn’t want to be preserved in an easily searchable database.

One issue is that there’s no easy way to check and confirm what Recall is and isn’t filtering without actually scrolling through the database and checking snapshots manually. The system tray status icon does change to display a small triangle and will show you a “some content is being filtered” status message when something is being filtered, but the system won’t tell you what it is; I have some kind of filtered app or browser tab open somewhere right now, and I have no idea which one it is because Windows won’t tell me. That any attempt at automated filtering is hit-and-miss should be expected, but more transparency would help instill trust and help users fine-tune their filtering settings.

Recall’s files are still clearly visible and trivial to access, but with one improvement: They’re all actually encrypted now. Credit: Andrew Cunningham

Microsoft also seems to have fixed the single largest problem with Recall: previously, all screenshots and the entire text database were stored in plaintext with zero encryption. It was technicallyusually encrypted, insofar as the entire SSD in a modern PC is encrypted when you sign into a Microsoft account or enable Bitlocker, but any user with any kind of access to your PC (either physical or remote) could easily grab those files and view them anywhere with no additional authentication necessary.

This is fixed now. Recall’s entire file structure is available for anyone to look at, stored away in the user’s AppData folder in a directory called CoreAIPlatform.00UKP. Other administrators on the same PC can still navigate to these folders from a different user account and move or copy the files. Encryption renders them (hypothetically) unreadable.

Microsoft has gone into some detail about exactly how it’s protecting and storing the encryption keys used to encrypt these files—the company says “all encryption keys [are] protected by a hypervisor or TPM.” Rate-limiting and “anti-hammering” protections are also in place to protect Recall data, though I kind of have to take Microsoft at its word on that one.

That said, I don’t love that it’s still possible to get at those files at all. It leaves open the possibility that someone could theoretically grab a few megabytes’ worth of data. But it’s now much harder to get at that data, and better filtering means what is in there should be slightly less all-encompassing.

Lingering technical issues

As we mentioned already, Microsoft’s automated content filtering is hit-and-miss. Certainly, there’s a lot of stuff that the original version of Recall would capture that the new one won’t, but I didn’t have to work hard to find corner-cases, and you probably won’t, either. Turning Recall on still means assuming risk and being comfortable with the data and authentication protections Microsoft has implemented.

We’d also like there to be a way for apps to tell Recall to exclude them by default, which would be useful for password managers, encrypted messaging apps, and any other software where privacy is meant to be the point. Yes, users can choose to exclude these apps from Recall backups themselves. But as with Recall itself, opting in to having that data collected would be preferable to needing to opt out.

You need a fingerprint reader or face-scanning camera to get Recall set up, but once it is set up, anyone with your PIN and access to your PC can get in and see all your stuff. Credit: Andrew Cunningham

Another issue is that, while Recall does require a fingerprint reader or face-scanning camera when you set it up the very first time, you can unlock it with a Windows Hello PIN after it’s already going.

Microsoft has said that this is meant to be a fallback option in case you need to access your Recall database and there’s some kind of hardware issue with your fingerprint sensor. But in practice, it feels like too easy a workaround for a domestic abuser or someone else with access to your PC and a reason to know your PIN (and note that the PIN also gets them into your PC in the first place, so encryption isn’t really a fix for this). It feels like too broad a solution for a relatively rare problem.

Security researcher Kevin Beaumont, whose testing helped call attention to the problems with the original version of Recall last year, identified this as one of Recall’s biggest outstanding technical problems in a blog post shared with Ars Technica shortly before its publication (as of this writing, it’s available here; he and I also exchanged multiple text over the weekend comparing our findings).

“In my opinion, requiring devices to have enhanced biometrics with Windows Hello  but then not requiring said biometrics to actually access Recall snapshots is a big problem,” Beaumont wrote. “It will create a false sense of security in customers and false downstream advertising about the security of Recall.”

Beaumont also noted that, while the encryption on the Recall snapshots and database made it a “much, much better design,” “all hell would break loose” if attackers ever worked out a way to bypass this encryption.

“Microsoft know this and have invested in trying to stop it by encrypting the database files, but given I live in the trenches where ransomware groups are running around with zero days in Windows on an almost monthly basis nowadays, where patches arrive months later… Lord, this could go wrong,” he wrote.

But most of what’s wrong with Recall is harder to fix

Microsoft has actually addressed many of the specific, substantive Recall complaints raised by security researchers and our own reporting. It’s gone through the standard Windows testing process and has been available in public preview in its current form since late November. And yet the knee-jerk reaction to Recall news is still generally to treat it as though it were the same botched, bug-riddled software that nearly shipped last summer.

Some of this is the asymmetrical nature of how news spreads on the Internet—without revealing traffic data, I’ll just say that articles about Recall having problems have been read many, many more times by many more people than pieces about the steps Microsoft has taken to fix Recall. The latter reports simply aren’t being encountered by many of the minds Microsoft needs to change.

But the other problem goes deeper than the technology itself and gets back to something I brought up in my first Recall preview nearly a year ago—regardless of how it is architected and regardless of how many privacy policies and reassurances the company publishes, people simply don’t trust Microsoft enough to be excited about “the feature that records and stores every single thing you do with your PC.”

Recall continues to demand an extraordinary level of trust that Microsoft hasn’t earned. However secure and private it is—and, again, the version people will actually get is much better than the version that caused the original controversy—it just feels creepy to open up the app and see confidential work materials and pictures of your kid. You’re already trusting Microsoft with those things any time you use your PC, but there’s something viscerally unsettling about actually seeing evidence that your computer is tracking you, even if you’re not doing anything you’re worried about hiding, even if you’ve excluded certain apps or sites, and even if you “know” that part of the reason why Recall requires a Copilot+ PC is because it’s processing everything locally rather than on a server somewhere.

This was a problem that Microsoft made exponentially worse by screwing up the Recall rollout so badly in the first place. Recall made the kind of ugly first impression that it’s hard to dig out from under, no matter how thoroughly you fix the underlying problems. It’s Windows Vista. It’s Apple Maps. It’s the Android tablet.

And in doing that kind of damage to Recall (and possibly also to the broader Copilot+ branding project), Microsoft has practically guaranteed that many users will refuse to turn it on or uninstall it entirely, no matter how it actually works or how well the initial problems have been addressed.

Unfortunately, those people probably have it right. I can see no signs that Recall data is as easily accessed or compromised as before or that Microsoft is sending any Recall data from my PC to anywhere else. But today’s Microsoft has earned itself distrust-by-default from many users, thanks not just to the sloppy Recall rollout but also to the endless ads and aggressive cross-promotion of its own products that dominate modern Windows versions. That’s the kind of problem you can’t patch your way out of.

Listing image: Andrew Cunningham

Photo of Andrew Cunningham

Andrew is a Senior Technology Reporter at Ars Technica, with a focus on consumer tech including computer hardware and in-depth reviews of operating systems like Windows and macOS. Andrew lives in Philadelphia and co-hosts a weekly book podcast called Overdue.

In depth with Windows 11 Recall—and what Microsoft has (and hasn’t) fixed Read More »

resist,-eggheads!-universities-are-not-as-weak-as-they-have-chosen-to-be.

Resist, eggheads! Universities are not as weak as they have chosen to be.

The wholesale American cannibalism of one of its own crucial appendages—the world-famous university system—has begun in earnest. The campaign is predictably Trumpian, built on a flagrantly pretextual basis and executed with the sort of vicious but chaotic idiocy that has always been a hallmark of the authoritarian mind.

At a moment when the administration is systematically waging war on diversity initiatives of every kind, it has simultaneously discovered that it is really concerned about both “viewpoint diversity” and “antisemitism” on college campuses—and it is using the two issues as a club to beat on the US university system until it either dies or conforms to MAGA ideology.

Reaching this conclusion does not require reading any tea leaves or consulting any oracles; one need only listen to people like Vice President JD Vance, who in 2021 gave a speech called “The Universities are the Enemy” to signal that, like every authoritarian revolutionary, he intended to go after the educated.

“If any of us want to do the things that we want to do for our country,” Vance said, “and for the people who live in it, we have to honestly and aggressively attack the universities in this country.” Or, as conservative activist Christopher Rufo put it in a New York Times piece exploring the attack campaign, “We want to set them back a generation or two.”

The goal is capitulation or destruction. And “destruction” is not a hyperbolic term; some Trump aides have, according to the same piece, “spoken privately of toppling a high-profile university to signal their seriousness.”

Consider, in just a few months, how many battles have been launched:

  • The Trump administration is now snatching non-citizen university students, even those in the country legally, off the streets using plainclothes units and attempting to deport them based on their speech or beliefs.
  • It has opened investigations of more than 50 universities.
  • It has threatened grants and contracts at, among others, Brown ($510 million), Columbia ($400 million), Cornell ($1 billion), Harvard ($9 billion), Penn ($175 million), and Princeton ($210 million).
  • It has reached a widely criticized deal with Columbia that would force Columbia to change protest and security policies but would also single out one academic department (Middle Eastern, South Asian, and African Studies) for enhanced scrutiny. This deal didn’t even get Columbia its $400 million back; it only paved the way for future “negotiations” about the money. And the Trump administration is potentially considering a consent decree with Columbia, giving it leverage over the school for years to come.
  • It has demanded that Harvard audit every department for “viewpoint diversity,” hiring faculty who meet the administration’s undefined standards.
  • Trump himself has explicitly threatened to revoke Harvard’s tax-exempt nonprofit status after it refused to bow to his demands. And the IRS looks ready to do it.
  • The government has warned that it could choke off all international students—an important diplomatic asset but also a key source of revenue—at any school it likes.
  • Ed Martin—the extremely Trumpy interim US Attorney for Washington, DC—has already notified Georgetown that his office will not hire any of that school’s graduates if the school “continues to teach and utilize DEI.”

What’s next? Project 2025 lays it out for us, envisioning the federal government getting heavily involved in accreditation—thus giving the government another way to bully schools—and privatizing many student loans. Right-wing wonks have already begun to push for “a never-ending compliance review” of elite schools’ admissions practices, one that would see the Harvard admissions office filled with federal monitors scrutinizing every single admissions decision. Trump has also called for “patriotic education” in K–12 schools; expect similar demands of universities, though probably under the rubrics of “viewpoint discrimination” and “diversity.”

Universities may tell themselves that they would never comply with such demands, but a school without accreditation and without access to federal funds, international students, and student loan dollars could have trouble surviving for long.

Some of the top leaders in academia are ringing the alarm bells. Princeton’s president, Christopher Eisgruber, wrote a piece in The Atlantic warning that the Trump administration has already become “the greatest threat to American universities since the Red Scare of the 1950s. Every American should be concerned.”

Lee Bollinger, who served as president of both the University of Michigan and Columbia University, gave a fiery interview to the Chronicle of Higher Education in which he said, “We’re in the midst of an authoritarian takeover of the US government… We cannot get ourselves to see how this is going to unfold in its most frightening versions. You neutralize the branches of government; you neutralize the media; you neutralize universities, and you’re on your way. We’re beginning to see the effects on universities. It’s very, very frightening.”

But for the most part, even though faculty members have complained and even sued, administrators have stayed quiet. They are generally willing to fight for their cash in court—but not so much in the court of public opinion. The thinking is apparently that there is little to be gained by antagonizing a ruthless but also chaotic administration that just might flip the money spigot back on as quickly as it was shut off. (See also: tariff policy.)

This academic silence also comes after many universities course-corrected following years of administrators weighing in on global and political events outside a school’s basic mission. When that practice finally caused problems for institutions, as it did following the Gaza/Israel fighting, numerous schools adopted a posture of “institutional neutrality” and stopped offering statements except on core university concerns. This may be wise policy, but unfortunately, schools are clinging to it even though the current moment could not be more central to their mission.

To critics, the public silence looks a lot like “appeasement”—a word used by our sister publication The New Yorker to describe how “universities have cut previously unthinkable ‘deals’ with the Administration which threaten academic freedom.” As one critic put it recently, “still there is no sign of organized resistance on the part of universities. There is not even a joint statement in defense of academic freedom or an assertion of universities’ value to society.”

Even Michael Roth, the president of Wesleyan University, has said that universities’ current “infatuation with institutional neutrality is just making cowardice into a policy.”

Appeasing narcissistic strongmen bent on “dominance” is a fool’s errand, as is entering a purely defensive crouch. Weakness in such moments is only an invitation to the strongman to dominate you further. You aren’t going to outlast your opponent when the intended goal appears to be not momentary “wins” but the weakening of all cultural forces that might resist the strongman. (See also: Trump’s brazen attacks on major law firms and the courts.)

As an Atlantic article put it recently, “Since taking office, the Trump administration has been working to dismantle the global order and the nation’s core institutions, including its cultural ones, to strip them of their power. The future of the nation’s universities is very much at stake. This is not a challenge that can be met with purely defensive tactics.”

The temperamental caution of university administrators means that some can be poor public advocates for their universities in an age of anger and distrust, and they may have trouble finding a clear voice to speak with when they come under thundering public attacks from a government they are more used to thinking of as a funding source.

But the moment demands nothing less. This is not a breeze; this is the whirlwind. And it will leave a state-dependent, nationalist university system in its wake unless academia arises, feels its own power, and non-violently resists.

Fighting back

Finally, on April 14, something happened: Harvard decided to resist in far more public fashion. The Trump administration had demanded, as a condition of receiving $9 billion in grants over multiple years, that Harvard reduce the power of student and faculty leaders, vet every academic department for undefined “viewpoint diversity,” run plagiarism checks on all faculty, share hiring information with the administration, shut down any program related to diversity or inclusion, and audit particular departments for antisemitism, including the Divinity School. (Numerous Jewish groups want nothing to do with the campaign, writing in an open letter that “our safety as Jews has always been tied to the rule of law, to the safety of others, to the strength of civil society, and to the protection of rights and liberties for all.”)

If you think this sounds a lot like government control, giving the Trump administration the power to dictate hiring and teaching practices, you’re not alone; Harvard president Alan Garber rejected the demands in a letter, saying, “The university will not surrender its independence or relinquish its constitutional rights. Neither Harvard nor any other private university can allow itself to be taken over by the federal government.”

The Trump administration immediately responded by cutting billions in Harvard funding, threatening the university’s tax-exempt status, and claiming it might block international students from attending Harvard.

Perhaps Harvard’s example will provide cover for other universities to make hard choices. And these are hard choices. But Columbia and Harvard have already shown that the only way you have a chance at getting the money back is to sell whatever soul your institution has left.

Given that, why not fight? If you have to suffer, suffer for your deepest values.

Fare forward

“Resistance” does not mean a refusal to change, a digging in, a doubling down. No matter what part of the political spectrum you inhabit, universities—like most human institutions—are “target-rich environments” for complaints. To see this, one has only to read about recent battles over affirmative action, the Western canon, “legacy” admissions, the rise and fall of “theory” in the humanities, Gaza/Palestine protests, the “Varsity Blues” scandal, critiques of “meritocracy,” mandatory faculty “diversity statements,” the staggering rise in tuition costs over the last few decades, student deplatforming of invited speakers, or the fact that so many students from elite institutions cannot imagine a higher calling than management consulting. Even top university officials acknowledge there are problems.

Famed Swiss theologian Karl Barth lost his professorship and was forced to leave Germany in 1935 because he would not bend the knee to Adolf Hitler. He knew something about standing up for one’s academic and spiritual values—and about the importance of not letting any approach to the world ossify into a reactionary, bureaucratic conservatism that punishes all attempts at change or dissent. The struggle for knowledge, truth, and justice requires forward movement even as the world changes, as ideas and policies are tested, and as cultures develop. Barth’s phrase for this was “Ecclesia semper reformanda est“—the church must always be reformed—and it applies just as well to the universities where he spent much of his career.

As universities today face their own watershed moment of resistance, they must still find ways to remain intellectually curious and open to the world. They must continue to change, always imperfectly but without fear. It is important that their resistance not be partisan. Universities can only benefit from broad-based social support, and the idea that they are fighting “against conservatives” or “for Democrats” will be deeply unhelpful. (Just as it would be if universities capitulated to government oversight of their faculty hires or gave in to “patriotic education.”)

This is difficult when one is under attack, as the natural reaction is to defend what currently exists. But the assault on the universities is about deeper issues than admissions policies or the role of elite institutions in American life. It is about the rule of law, freedom of speech, scientific research, and the very independence of the university—things that should be able to attract broad social and judicial support if schools do not retreat into ideology.

Why it matters

Ars Technica was founded by grad students and began with a “faculty model” drawn from universities: find subject matter experts and turn them loose to find interesting stories in their domains of expertise, with minimal oversight and no constant meetings.

From Minnesota Bible colleges to the halls of Harvard, from philosophy majors to chemistry PhDs, from undergrads to post-docs, Ars has employed people from a wide range of schools and disciplines. We’ve been shaped by the university system, and we cover it regularly as a source of scientific research and computer science breakthroughs. While we differ in many ways, we recognize the value of a strong, independent, mission-focused university system that, despite current flaws, remains one of America’s storied achievements. And we hope that universities can collectively find the strength to defend themselves, just as we in the media must learn to do.

The assault on universities and on the knowledge they produce has been disorienting in its swiftness, animus, and savagery. But universities are not starfish, flopping about helplessly on a beach while a cruel child slices off their arms one by one. They can do far more than hope to survive another day, regrowing missing limbs in some remote future. They have real power, here and now. But they need to move quickly, they need to move in solidarity, and they need to use the resources that they have, collectively, assembled.

Because, if they aren’t going to use those resources when their very mission comes under assault, what was the point of gathering them in the first place?

Here are a few of those resources.

Money

Cash is not always the most important force in human affairs, but it doesn’t hurt to have a pile of it when facing off against a feral US government. When the government threatened Harvard with multiyear cuts of $9 billion, for instance, it was certainly easier for the university to resist while sitting on a staggering $53 billion endowment. In 2024, the National Association of College and University Business Officers reported that higher ed institutions in the US collectively have over $800 billion in endowment money.

It’s true that many endowment funds are donor-restricted and often invested in non-liquid assets, making them unavailable for immediate use or to bail out university programs whose funding has been cut. But it’s also true that $800 billion is a lot of money—it’s more than the individual GDP of all but two dozen countries.

No trustee of this sort of legacy wants to squander an institution’s future by spending money recklessly, but what point is there in having a massive endowment if it requires your school to become some sort of state-approved adjunct?

Besides, one might choose not to spend that money now only to find that it is soon requisitioned regardless. People in Trump’s orbit have talked for years about placing big new taxes on endowment revenue as a way of bringing universities to heel. Trump himself recently wrote on social media that Harvard “perhaps” should “lose its Tax Exempt Status and be Taxed as a Political Entity if it keeps pushing political, ideological, and terrorist inspired/supporting “Sickness?” Remember, Tax Exempt Status is totally contingent on acting in the PUBLIC INTEREST!”

So spend wisely, but do spend. This is the kind of moment such resources were accumulated to weather.

Students

Fifteen million students are currently enrolled in higher education across the country. The total US population is 341 million people. That means students comprise over 4 percent of the total population; when you add in faculty and staff, higher education’s total share of the population is even greater.

So what? Political science research over the last three decades looked at nonviolent protest movements and found that they need only 3.5 percent of the population to actively participate. Most movements that hit that threshold succeed, even in authoritarian states. Higher ed alone has those kinds of numbers.

Students are not a monolith, of course, and many would not participate—nor should universities look at their students merely as potential protesters who might serve university interests. But students have been well-known for a willingness to protest, and one of the odd features of the current moment has been that so many students protested the Gaza/Israel conflict even though so few have protested the current government assault on the very schools where they have chosen to spend their time and money. It is hard to say whether both schools and their students are burned out from recent, bruising protests, or whether the will to resist remains.

But if it does, the government assault on higher education could provoke an interesting realignment of forces: students, faculty, and administrators working together for once in resistance and protest, upending the normal dynamics of campus movements. And the numbers exist to make a real national difference if higher ed can rally its own full range of resources.

Institutions

Depending on how you count, the US has around 4,000 colleges and universities. The sheer number and diversity of these institutions is a strength—but only if they can do a better job working together on communications, lobbying, and legal defenses.

Schools are being attacked individually, through targeted threats rather than broad laws targeting all higher education. And because schools are in many ways competitors rather than collaborators, it can be difficult to think in terms of sharing resources or speaking with one voice. But joint action will be essential, given that many smaller schools are already under economic pressure and will have a hard time resisting government demands, losing their nonprofit status, or finding their students blocked from the country or cut off from loan money.

Plenty of trade associations and professional societies exist within the world of higher education, of course, but they are often dedicated to specific tasks and lack the public standing and authority to make powerful public statements.

Faculty/alumni

The old stereotype of the out-of-touch, tweed-wearing egghead, spending their life lecturing on the lesser plays of Ben Jonson, is itself out of touch. The modern university is stuffed with lawyers, data scientists, computer scientists, cryptographers, marketing researchers, writers, media professionals, and tech policy mavens. They are a serious asset, though universities sometimes leave faculty members to operate so autonomously that group action is difficult or, at least, institutionally unusual. At a time of crisis, that may need to change.

Faculty are an incredible resource because of what they know, of course. Historians and political scientists can offer context and theory for understanding populist movements and authoritarian regimes. Those specializing in dialogue across difference, or in truth and reconciliation movements, or in peace and conflict studies, can offer larger visions for how even deep social conflicts might be transcended. Communications professors can help universities think more carefully about articulating what they do in the public marketplace of ideas. And when you are on the receiving end of vindictive and pretextual legal activity, it doesn’t hurt to have a law school stuffed with top legal minds.

But faculty power extends beyond facts. Relationships with students, across many years, are a hallmark of the best faculty members. When generations of those students have spread out into government, law, and business, they make a formidable network.

Universities that realize the need to fight back already know this. Ed Martin, the interim US Attorney for the District of Columbia, attacked Georgetown in February and asked if it had “eliminated all DEI from your school and its curriculum?” He ended his “clarification” letter by claiming that “no applicant for our fellows program, our summer internship, or employment in our office who is a student or affiliated with a law school or university that continues to teach and utilize DEI will be considered.”

When Georgetown Dean Bill Treanor replied to Martin, he did not back down, noting Martin’s threat to “deny our students and graduates government employment opportunities until you, as Interim United States Attorney for the District of Columbia, approve of our curriculum.” (Martin himself had managed to omit the “interim” part of his title.) Such a threat would violate “the First Amendment’s protection of a university’s freedom to determine its own curriculum and how to deliver it.”

There was no “negotiating” here, no attempt to placate a bully. Treanor barely addressed Martin’s questions. Instead, he politely but firmly noted that the inquiry itself was illegitimate, even under recent Supreme Court jurisprudent and Trump Department of Education policy. And he tied everything in his response to the university’s mission as a Jesuit school committed to “intellectual, ethical, and spiritual understanding.”

The letter’s final paragraph, in which Treanor told Martin that he expected him to back down from his threats, opened with a discussion of Georgetown’s faculty.

Georgetown Law has one of the preeminent faculties in the country, fostering groundbreaking scholarship, educating students in a wide variety of perspectives, and thriving on the robust exchange of ideas. Georgetown Law faculty have educated world leaders, members of Congress, and Justice Department officials, from diverse backgrounds and perspectives.

Implicit in these remarks are two reminders:

  1. Georgetown is home to many top legal minds who aren’t about to be steamrolled by a January 6 defender whose actions in DC have already been so comically outrageous that Sen. Adam Schiff has placed a hold on his nomination to get the job permanently.
  2. Georgetown faculty have good relationships with many powerful people across the globe who are unlikely to sympathize with some legal hack trying to bully their alma mater.

The letter serves as a good reminder: Resist with firmness and rely on your faculty. Incentivize their work, providing the time and resources to write more popular-level distillations of their research or to educate alumni groups about the threats campuses are facing. Get them into the media and onto lecture hall stages. Tap their expertise for internal working groups. Don’t give in to the caricatures but present a better vision of how faculty contribute to students, to research, and to society.

Real estate

Universities collectively possess a real estate portfolio of land and buildings—including lecture halls, stages, dining facilities, stadiums, and dormitories—that would make even a developer like Donald Trump salivate. It’s an incredible resource that is already well-used but might be put toward purposes that meet the moment even more clearly.

Host more talks, not just on narrow specialty topics, but on the kinds of broad-based political debates that a healthy society needs. Make the universities essential places for debate, discussion, and civic organizing. Encourage more campus conferences in summer, with vastly reduced rates for groups that effectively aid civic engagement, depolarization, and dialogue across political differences. Provide the physical infrastructure for fruitful cross-party political encounters and anti-authoritarian organizing. Use campuses to house regional and national hubs that develop best practices in messaging, legal tactics, local outreach, and community service from students, faculty, and administrators.

Universities do these things, of course; many are filled with “dialogue centers” and civic engagement offices. But many of these resources exist primarily for students; to survive and thrive, universities will need to rebuild broader social confidence. The other main criticism is that they can be siloed off from the other doings of the university. If “dialogue” is taken care of at the “dialogue center,” then other departments and administrative units may not need to worry about it. But with something as broad and important as “resistance,” the work cannot be confined to particular units.

With so many different resources, from university presses to libraries to lecture halls, academia can do a better job at making its campuses useful both to students and to the surrounding community—so long as the universities know their own missions and make sure their actions align with them.

Athletics

During times of external stress, universities need to operate more than ever out of their core, mission-driven values. While educating the whole person, mentally and physically, is a worthy goal, it is not one that requires universities to submit to a Two Minutes Hate while simultaneously providing mass entertainment and betting material for the gambling-industrial complex.

When up against a state that seeks “leverage” of every kind over the university sector, realize that academia itself controls some of the most popular sports competitions in America. That, too, is leverage, if one knows how to use it.

Such leverage could, of course, be Trumpian in its own bluntness—no March Madness tournament, for instance, so long as thousands of researchers are losing their jobs and health care networks are decimated and the government is insisting on ideological control over hiring and department makeup. (That would certainly be interesting—though quite possibly counterproductive.)

But universities might use their control of NCAA sporting events to better market themselves and their impact—and to highlight what’s really happening to them. Instead, we continue to get the worst kinds of anodyne spots during football and basketball games: frisbee on the quad, inspiring shots of domes and flags, a professor lecturing in front of a chalkboard.

Be creative! But do something. Saying and doing nothing—letting the games go on without comment as the boot heel comes down on the whole sector, is a complete abdication of mission and responsibility.

DOD and cyber research

The Trump administration seems to believe that it has the only thing people want: grant funding. It seems not even to care if broader science funding in the US simply evaporates, if labs close down, or if the US loses its world-beating research edge.

But even if “science” is currently expendable, the US government itself relies heavily on university researchers to produce innovations required by the Department of Defense and the intelligence community. Cryptography, cybersecurity tools, the AI that could power battlefield drone swarms—much of it is produced by universities under contract with the feds. And there’s no simple, short-term way for the government to replace this system.

Even other countries believe that US universities do valuable cyber work for the federal government; China just accused the University of California and Virginia Tech of aiding in an alleged cyberattack by the NSA, for instance.

That gives the larger universities—the one who often have these contracts—additional leverage. They should find a way to use it.

Medical facilities

Many of the larger universities run sprawling and sophisticated health networks that serve whole communities and regions; indeed, much of the $9 billion in federal money at issue in the Harvard case was going to Harvard’s medical system of labs and hospitals.

If it seems unthinkable to you that the US government would treat the health of its own people as collateral damage in a war to become the Thought Police, remember that this is the same administration that has already tried to stop funds to the state of Maine—funds used to “feed children and disabled adults in schools and care settings across the state”—just because Maine allowed a couple of transgender kids to play on sports teams. What does the one have to do with the other? Nothing—except that the money provides leverage.

But health systems are not simply weapons for the Trump administration to use by refusing or delaying contracts, grants, and reimbursements. Health systems can improve people’s lives in the most tangible of ways. And that means they ought to be shining examples of community support and backing, providing a perfect opportunity to highlight the many good things that universities do for society.

Now, to the extent that these health care systems in the US have suffered from the general flaws of all US health care—lack of universal coverage leading to medical debt and the overuse of emergency rooms by the indigent, huge salaries commanded by doctors, etc.—the Trump war on these systems and on the universities behind them might provide a useful wake-up call from “business as usual.” Universities might use this time to double down on mission-driven values, using these incredible facilities even more to extend care, to lower barriers, and to promote truly public and community health. What better chance to show one’s city, region, and state the value of a university than massively boosting free and easy access to mental and physical health resources? Science research can be esoteric; saving someone’s body or mind is not.

Conclusion

This moment calls out for moral clarity and resolve. It asks universities to take their mission in society seriously and to resist being co-opted by government forces.

But it asks something of all of us, too. University leaders will make their choices, but to stand strong, they need the assistance of students, faculty, and alumni. In an age of polarization, parts of society have grown skeptical about the value of higher education. Some of these people are your friends, family, and neighbors. Universities must continue to make changes as they seek to build knowledge and justice and community, but those of us no longer within their halls and quads also have a part to play in sharing a more nuanced story about the value of the university system, both to our own lives and to the country.

If we don’t, our own degrees may be from institutions that have become almost unrecognizable.

Resist, eggheads! Universities are not as weak as they have chosen to be. Read More »