Toggle light / dark theme

Quantum entanglement could connect drones for disaster relief, bypassing traditional networks

Any time you use a device to communicate information—an email, a text message, any data transfer—the information in that transmission crosses the open internet, where it could be intercepted. Such communications are also reliant on internet connectivity, often including wireless signal on either or both ends of a transmission.

But what if two—or 10, or 100, or 1,000—entities could be connected in such a way that they could communicate information without any of those security or connectivity concerns?

That’s the challenge that Alexander DeRieux, a Virginia Tech Ph.D. student and Bradley Fellow in the Bradley Department of Electrical and Computer Engineering, under the advisement of Professor Walid Saad, set out to tackle using quantum entanglement. In short, they used the unique properties of quantum bits, or qubits, as a method of transmitting information.

NitroGen: A Foundation Model for Generalist Gaming Agents

We introduce NitroGen, a vision-action foundation model for generalist gaming agents that is trained on 40,000 hours of gameplay videos across more than 1,000 games. We incorporate three key ingredients: 1) an internet-scale video-action dataset constructed by automatically extracting player actions from publicly available gameplay videos, 2) a multi-game benchmark environment that can measure cross-game generalization, and 3) a unified vision-action policy trained with large-scale behavior cloning. NitroGen exhibits strong competence across diverse domains, including combat encounters in 3D action games, high-precision control in 2D platformers, and exploration in procedurally generated worlds. It transfers effectively to unseen games, achieving up to 52% relative improvement in task success rates over models trained from scratch.

The Governance Case for Tesla Taking a Pre-IPO Stake in SpaceX

Elon Musk is considering Tesla taking a pre-IPO stake in SpaceX to integrate their businesses, accelerate ambitious projects, and increase the value of both companies ## ## Questions to inspire discussion.

Strategic Governance Alignment.

🔄 Q: Why should Tesla acquire a pre-IPO stake in SpaceX rather than waiting until after the IPO? A: A pre-IPO stake resolves governance and conflict risks before SpaceX’s planned $30B IPO in mid-2026, ensuring all transactions are recorded as part of the IPO and avoiding complications that could impact IPO pricing or create persistent post-IPO conflicts between the two companies.

🎯 Q: What is the core governance problem Tesla shareholders currently face with SpaceX? A: Tesla shareholders are exposed to SpaceX outcomes through dependencies on Starlink connectivity, orbital compute, and launch cadence without any ownership rights, governance rights, or downside protection as the companies converge operationally but not financially.

⚖️ Q: How would a pre-IPO stake transaction affect Tesla’s ownership structure and Musk’s control? A: The transaction would dilute Tesla by 20% but could raise market cap to $1.62-2T, increasing Musk’s stake to 22.1–24% and his net worth approaching $1T, enabling him to achieve 25% control significantly earlier than under the compensation plan.

Capital Requirements and Infrastructure.

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme.

The Nigeria Police Force National Cybercrime Centre (NPF–NCCC) said investigations conducted in collaboration with Microsoft and the Federal Bureau of Investigation (FBI) led to the identification of Okitipi Samuel, also known as Moses Felix, as the principal suspect and developer of the phishing infrastructure.

“Investigations reveal that he operated a Telegram channel through which phishing links were sold in exchange for cryptocurrency and hosted fraudulent login portals on Cloudflare using stolen or fraudulently obtained email credentials,” the NPF said in a post shared on social media.

Over 25,000 FortiCloud SSO devices exposed to remote attacks

Internet security watchdog Shadowserver has found over 25,000 Fortinet devices exposed online with FortiCloud SSO enabled, amid ongoing attacks targeting a critical authentication bypass vulnerability.

Fortinet noted on December 9th, when it patched the security flaw tracked as CVE-2025–59718 (FortiOS, FortiProxy, FortiSwitchManager) and CVE-2025–59719 (FortiWeb), that the vulnerable FortiCloud SSO login feature is not enabled until admins register the device with the company’s FortiCare support service.

As cybersecurity company Arctic Wolf reported on Monday, the vulnerability is now actively exploited to compromise admin accounts via malicious single sign-on (SSO) logins.

SpaceX sets plans for massive $20M H-E-B sized Texas project

So, essentially SpaceX’s new parking garage will be bigger than your local H-E-B (excluding the largest H-E-B in San Antonio of course). Construction on the garage began earlier this year in February, but it’s expected to be completed by January 7, 2027, according to the TDLR.

SpaceX’s Bastrop facility is a major manufacturing hub for its Starlink satellite internet service, producing terminals and components. It’s located across the street from Hyperloop Plaza, a Musk-owned shopping center which houses The Boring Company, and the new X (formerly Twitter) headquarters.

Clop ransomware targets Gladinet CentreStack in data theft attacks

The Clop ransomware gang (also known as Cl0p) is targeting Internet-exposed Gladinet CentreStack file servers in a new data theft extortion campaign.

Gladinet CentreStack enables businesses to securely share files hosted on on-premises file servers through web browsers, mobile apps, and mapped drives without requiring a VPN. According to Gladinet, CentreStack “is used by thousands of businesses from over 49 countries.”

Since April, Gladinet has released security updates to address several other security flaws that were exploited in attacks, some of them as zero-days.

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 in attacks targeting Cisco Secure Email Gateway and Cisco Secure Email and Web Manager.

The networking equipment major said it became aware of the intrusion campaign on December 10, 2025, and that it has singled out a “limited subset of appliances” with certain ports open to the internet. It’s currently not known how many customers are affected.

“This attack allows the threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance,” Cisco said in an advisory. “The ongoing investigation has revealed evidence of a persistence mechanism planted by the threat actors to maintain a degree of control over compromised appliances.”

The mind-bending reality of quantum mechanics — with Jim Al Khalili

Jim Al-Khalili explores emerging technologies powering the future of quantum, and looks at how we got here.

This Discourse was recorded at the Ri on 7 November 2025, in partnership with the Institute of Physics.

Watch the Q&A session for this talk here (exclusively for our Science Supporter members):
Join this channel as a member to get access to perks:
/ @theroyalinstitution.

Physicist and renowned broadcaster Jim Al-Khalili takes a look back at a century of quantum mechanics, the strangest yet most successful theory in all of science, and how it has shaped our world. He also looks forward to the exciting new world of Quantum 2.0 and how a deeper understanding of such counterintuitive concepts as quantum superposition and quantum entanglement is leading to the development of entirely new technologies, from quantum computers and quantum sensors to quantum cryptography and the quantum internet.

The United Nations has proclaimed 2025 as the International Year of Quantum Science and Technology, to celebrate the centenary of quantum mechanics and the revolutionary work of the likes of Werner Heisenberg and Erwin Schrödinger. Together with the Institute of Physics, join us to celebrate the culmination of the International Year of Quantum at the penultimate Discourse of our Discover200 year.

-

2.8 days to disaster: Why we are running out of time in low earth orbit

A “House of Cards” is a wonderful English phrase that it seems is now primarily associated with a Netflix political drama. However, its original meaning is of a system that is fundamentally unstable. It’s also the term Sarah Thiele, originally a Ph.D. student at the University of British Columbia, and now at Princeton, and her co-authors used to describe our current satellite mega-constellation system in a new paper available in pre-print on arXiv.

They have plenty of justification for using that term. Calculations show that, across all low-Earth orbit mega-constellations, a “close approach,” defined as two satellites passing by each at less than 1km separation, occurs every 22 seconds. For Starlink alone, that number is once every 11 minutes. Another known metric of Starlink is that, on average, each of the thousands of satellites have to perform 41 maneuvers per year to avoid running into other objects in their orbit.

That might sound like an efficiently engineered system operating the way it should, but as any engineer will tell you, “edge cases”—the things that don’t happen in a typical environment, are the cause of most system failures. According to the paper, solar storms are one potential edge case for satellite mega-constellations. Typically, solar storms affect satellite operation in two ways.

/* */