You are viewing a single comment's thread from:

RE: LeoThread 2024-12-07 11:02

in LeoFinance10 months ago

Here is the daily technology #threadcast for 12/7/24. The goal is to make this a technology "reddit".

Drop all question, comments, and articles relating to #technology and the future. The goal is make it a technology center.

Sort:  
There are 2 pages
Pages

Cool how when I face an error I could just take a snap of the screen to Copilot or Chatgpt and it just guides me through.

Why the fuck are people still paying for college.

That is a point that will get drilled home in a year or two.

People better get ready.

YouTube made college inefficient and irrelevant. Actually p2p software in 2004 did. I’m only glad I got a degree to help me get a visa. That’s it. Shoulda got a cheaper one.

Haha 😂

Shoulda got a cheaper one.

I don't know if I should call this a problem.

Since I am heavy on using the summarizer the notifications sometimes makes me miss other peoples response.

Is there a way of muting the summarizer from my notifications but it still works so I don't miss when people respond to me.

I use both my phone and laptop but mostly the phone for posting so the notification feed is flooded.

I didn't know task had responded to me until I scrolled through.

@mightpossibly

Yeah it is a pain in the ass. That would likely have to be something built into the UI itself.

Oh so it would take the Leo Team for this to happen?

Yeah something they are not likely to take on.

yeah.. I'd do something about it if I could

I need to get a database to filter out already published YouTube links when I call for the RSS.

Any thoughts on that?

@mightpossibly

I'm using N8n to fetch the rss feed of published YouTube videos. But sometimes if the channel hasn't posted over 15 videos it joins old and already published videos to make it 15.

I think I might need some kind of database to store and filter out those that have already passed through.

You mean a way to know which videos have been summarized or not? I'm actually planning to build something like that, that perhaps you could use for this. I just have a side-gig I need to complete first before I can get down to it.

In the meantime, can you try to explain a bit more in-depth what you're trying to do? I'm having trouble understanding exactly what the purpose of this will be.

Okay here is what I'm doing:

I'm using an automation system called N8N, which can help automate fetching the links of YouTube videos without me having to go through YouTube to copy sometimes.

It then sends those links straight to my telegram bot then I can copy it from there and paste it in my Threadcast. That way it makes it easier and faster to load more videos.

If I put the RSS feed of a YouTube channel in the workflow, anytime the channel makes a post, it would automatically be sent as a message to my telegram bot and I bring it here.

Now if Inleo had an API, I could connect it to my workflow and it would automatically paste the link with the summarize command when new videos are posted.

Exampl: I have linked the BBC channel in the workflow so all BBc YouTube videos would be linked to my telegram bot.

aha! That's very cool. Less clicks are always better 😎 I'll see what I can do about making a way for you to know which videos has already been summarized or not.

I don't think a future inleo api will feature a way to post threads automatically, since they want to funnel traffic through the front-end. If they do make that available and people start completely automating requests, I'd probably need to impose some form of upper limit to the amount of requests that can be done per account per day. There is a cost to every summary after all and I'm barely breaking even as it is 🫠 Totally worth it though

Oh my 😧, haven't thought about the fact that you're paying for the ApI service.

Boy what amount of videos do you think would be okay per day of you had to at least make a profit.

Hi, @mightpossibly,

This post has been voted on by @darkcloaks because you are an active member of the Darkcloaks gaming community.


Get started with Darkcloaks today, and follow us on Inleo for the latest updates.

As long as it is not possible to automate it, as many as you can. No worries :) We're still well within what's economically viable for me, even on the days with the all-time-highs and beyond. In other words there is plenty of room to grow, and you don't need to worry about it. Please keep going hard as you have been, I love to see it.

My main goal with this application is not to make a ton of money, but to provide a way to add massive amounts of data to the chain, thus increasing the value of the network as a whole (including token values hopefully)

This only becomes an issue if full-auto mode becomes possible. And in that case, I'd probably look at imposing a limit of maybe a thousand videos per account per day or something.

Hi, @mightpossibly,

This post has been voted on by @darkcloaks because you are an active member of the Darkcloaks gaming community.


Get started with Darkcloaks today, and follow us on Inleo for the latest updates.

X helps update Kids Online Safety Act in final push for passage in the Republican-led House

With just weeks left to pass legislation before Congress adjourns, X CEO Linda Yaccarino announced she worked with the authors of the Kids Online Safety Act (KOSA) to update the bill in what seems like a play to win over the Republican House leaders standing in the way of it becoming law.

#technology #x

The striking announcement is the latest example of how Elon Musk and his companies are taking on significant roles in influencing government output. While it’s not unusual for outside stakeholders, including companies, to weigh in on pending legislation, the fact that the bill’s sponsors, Sens. Richard Blumenthal (D-CT) and Marsha Blackburn (R-TN), announced X’s input indicates they view it as helpful to the bill’s chances of passing.

“Led by X, the new changes made to the Kids Online Safety Act strengthen the bill while safeguarding free speech online and ensuring it is not used to stifle expression,” Blumenthal and Blackburn said in a joint statement. “These changes should eliminate once and for all the false narrative that this bill would be weaponized by unelected bureaucrats to censor Americans. We thank Elon and Linda for their bold leadership and commitment to protecting children online and for helping us get this bill across the finish line this Congress.”

KOSA aims to make the internet safer for kids by imposing a duty of care on tech platforms to prevent and mitigate certain harms when they implement certain design features, including photo filters and infinite scroll. The bill passed overwhelmingly in the Senate over the summer but has stalled in the House, with the bill’s critics fearing it could be weaponized against disliked speech or lead to a more restricted internet due to platforms’ fears of legal risk.

Hi, @coyotelation,

This post has been voted on by @darkcloaks because you are an active member of the Darkcloaks gaming community.


Get started with Darkcloaks today, and follow us on Inleo for the latest updates.

Now I f*en regret not doing IT back at school.

Anyways, AI and YouTube videos are walking me through

LOL there is a lot of knowledge out there.

Thankfully AI is helping me make up for that.

Also does anybody here have experience with docker and fresh RSS feed aggregator. Trying to set it up on windows 11.

The last obstacle and my YouTube summarizer automation system would be complete.

I believe it I can set this up, I can have loads of YouTube videos coming in with ease.

NotebookLM is an extremely undervalued free tool. Being able to provide 50 sources of data in a closed-data model is a game-changer!
See 8 expert tips 👇 #ai

760,000 Employee Records From Several Major Firms Leaked Online

A massive data leak exposed over 760,000 employees' information from major organizations like Bank of America and Morgan Stanley. Originating from last year's MOVEit hack, the breach is attributed to the Cl0p ransomware gang. It revealed names, emails, and work details, potentially enabling sophisticated social engineering attacks.

#technology #infosec #dataleak #breach

These data leaks are getting out of hand. It doesn't seem to matter how "secure" these organizations think they are.

Key leaders behind Google’s viral NotebookLM are leaving to create their own startup

Three key Google NotebookLM members have left to start a new stealth AI venture. The startup aims to leverage the latest AI models to create consumer-facing, user-first AI products. It remains in its early stages without a clear focus or announced funding.

#technology #ai #google #notebooklm

DeepMind’s Genie 2 can generate interactive worlds that look like video games

DeepMind's Genie 2 is an advanced AI model that generates diverse, interactive 3D worlds from images and text descriptions. The model is particularly adept at simulating complex elements like physics and NPC behavior, setting it apart from similar models by maintaining scene consistency. Positioned as a research tool, Genie 2 is designed for prototyping interactive experiences and evaluating AI agents.

#technology #ai #deepmind #genie2 #genai

Welcoming more global news organizations to Perplexity’s Publishers’ Program

Perplexity has added over a dozen international news organizations to its Publishers' Program, offering tools, revenue sharing, and support to strengthen collaboration with global media.

#technology #ai #perplexity

OpenAI o1 System Card

This report outlines the safety work carried out prior to releasing OpenAI o1 and o1-mini, including external red teaming and frontier risk evaluations according to OpenAI's Preparedness Framework.

#technology #ai #openai #safety

Google sues to stop the US from monitoring it like a bank

The Consumer Financial Protection Bureau (CFPB) announced on Friday it had placed Google Payment Corp. under federal supervision, reports Reuters. Google reportedly filed a lawsuit to block the CFPB’s order, which could result in routine inspections and monitoring like those imposed on banks.

#technology #google #us

The agency found that Google’s error resolution and fraud prevention processes pose risks to consumers, citing consumer complaints about Google Pay Balance and Google’s peer-to-peer payments. Those complaints, which Google’s lawsuit claims are “unsubstantiated,” according to The Washington Post, include that the company didn’t seem to fully investigate fraudulent charges and didn’t “adequately explain” the results of those investigations.

The CFPB says its finding that Google should be supervised doesn’t mean the company is “guilty of wrongdoing.” It also notes in its order that Google Pay and the P2P platform were discontinued earlier this year.

X gives Grok a new photorealistic AI image generator

X has given Grok a new AI image generator model called “Aurora” that seems to create far more photorealistic imagery than Grok’s other image generator, with similarly few apparent restrictions on what it will produce, TechCrunch reports. Like Grok, anyone can use Aurora. It lives in a new “Grok 2 + Aurora beta” option in the Grok model selector, though you’ll only get a few queries before you hit the X Premium subscription paywall and have to wait.

#technology #grok #ai

TechCrunch found that the model, which X employee Chris Park posted is available this morning, was willing to create copyrighted characters and public figures, including Mickey Mouse and “a bloodied Donald Trump,” but that it “stopped short of nudes.” Its lack of restrictions isn’t surprising, given our experience with Grok’s other model.

In another example highlighted by TechCrunch, an X user showed off AI-generated images of Ray Romano and Adam Sandler in the X post below — both realistic, but with some very obvious weirdness when it comes to human anatomy and continuity.

single paragraphs

Hi, @taskmaster4450le,

This post has been voted on by @darkcloaks because you are an active member of the Darkcloaks gaming community.


Get started with Darkcloaks today, and follow us on Inleo for the latest updates.

Rather than designing movements around its robotic structure, Clone first replicated human anatomy and then enabled natural motion using artificial muscles. The result is strikingly realistic—almost uncanny in its resemblance to the human body.

Building on its expertise, Clone Robotics has now developed a humanoid designed to walk naturally. This is achieved through Clone’s move from rigid actuators to soft, water-powered artificial muscles, aiming for more human-like movement.

Advanced artificial muscles
Clone Robotics plans to advance humanoid robotics with its artificial muscle technology, Myofiber. It animates the skeleton by attaching musculotendon units to anatomically precise points on the bones.

These monolithic units eliminate tendon failures and mimic the desirable traits of mammalian skeletal muscles, such as a response time under 50ms, over 30 percent unloaded contraction, and at least 2.2 pounds (1 kilogram) of contraction force for a 3-gram muscle fiber.

According to the firm, Myofiber is the only artificial muscle capable of achieving such power, speed, and efficiency.

The Clone’s skeleton includes all 206 bones of the human body, with minor bone fusions, and features fully articulated joints, artificial ligaments, and connective tissues.

Queries in Cosmos are unable to cryptographically authenticate the querier’s identity; Secret Network solves this by allowing contracts to have an encrypted viewing key that is used to validate the identity of the caller. This viewing key allows for decryption of a range of associated data for any given address. Secret Contracts allowance feature lets accounts designate a portion of their balance to other accounts. This is similar to the allowance feature of ERC-20 contracts, enabling other contracts to manage a portion of the addresses balance. To avoid leaking data, Secret Contracts can enforce constant length messages via padding. The output of transactions can include the following: callbacks to another contract call, a contract init, staking transactions, votes on proposals, instructions for sending funds from the contract’s wallet, an error section, and a data section of free-form bytes to be interpreted by the client or dApp with added support for additional types in the future

Secret Contract State Encryption
While executing a function call inside a TEE of a node as part of a transaction, the Secret Contract code can call the following functions: write_db(field_name, value), read_db(field_name), and remove_db(field_name). Collectively, Secret Contracts’ state is stored on-chain inside a key-value store. As such, the field name remains constant between calls. The encryption key for the functional calls uses HKDF-SHA256 from the consensus state IKM, field name, and the contract key. Additional data can also be employed to prevent leaking information about the same value written to the same key at different times. Contract keys are the combination of a signer id as well as an authenticated contract key.

The goal of the contract key is to give each Secret Contract a unique and unforgeable encryption key. As a property, unforgeable is imperative to making sure malicious validators are unable to locally encrypt transactions with their own encryption key and then decrypt the resulting state with the fake key. Additionally, each contract must be unique in order to make sure the state of two contracts with identical code are different.

When a contract is initialized from a validator node – inside the node’s TEE, a contract key is derived using HMAC-SHA256 from the signer id as well as the authentication key. An authentication key is derived using HKDF from an HKDF salt in addition to an IKM that consists of the concatenation of the consensus state IKM and the signer id. Any time a contract execution is called, the contract key of the Secret Contract is sent to every validator node of the network. Upon receiving the contract key, an assertion/check is made to make sure the received contract key matches the expected value.

Theoretical Attacks
Evaluating potential attack vectors is integral to the formation of a protocol that is designed to be the fundamental privacy layer for all blockchain protocols. It is important to note that the majority of theoretical attacks that occur on TEEs (SGX in particular) happen within research labs. In reality, common attack vectors occur through implementation faults that leverage holes in protocol design. Similar to other protocols, decentralization helps secure the network’s consensus layer against Byzantine attacks. As a starting point examining non-consensus layer attacks, these were assumptions made during the design of the Secret Network protocol.

(1) Each node is untrusted and is run by a malicious host

(2) Each node is equipped with a secure enclave (SGX) that can execute code/data in a trusted manner such that the data cannot be observed or manipulated by the host

(3) Assumed PKI (Public Key Infrastructure) and cryptographic primitives are secure (signatures, encryption, etc.)

(4) Assumed there is shared consensus in the Secret Network

Here is a list of compiled theoretical attacks:

(1) Deanonymizing with ciphertext byte count

(2) Two contracts with the same contract key deanonymize state

(3) Transaction replay attack

(4) Search-to-decision millionaire problem

(5) Partial storage rollback during contract runtime

(6) Transaction output data leakage

(7) TEE vulnerability enabling a Byzantine node to acquire the consensus seed from the enclave

Governance
Because Secret Network uses the Cosmos SDK, there is a heavy crossover between other Cosmos protocols and Secret Network with both the design and implementation of governance. Current Secret Network governance parameters, which are subject to change, are as follows:

Deposit period – 1 week Voting period – 1 week Minimum deposit amount – 1000 SCRT Quorum – 33.4% Threshold – 50% Veto – 33.4%

There are five stages to on-chain governance proposals with Secret Network: submission, deposits, voting, tallying, and implementation. Submission can be done by any user, with the caveat that nothing is broadcasted on-chain until a proposal reaches the minimum deposit amount. This is in place to protect the network from proposal spam. Anyone can contribute to the deposit minimum. If the proposal does not reach the minimum deposit threshold, deposits are refunded. If the proposal is approved or if the proposal is rejected but not vetoed, the deposits will automatically be refunded to the respective proposal depositors. Critical to note is that if a proposal is vetoed with a supermajority, deposits are burned. Upon reaching the minimum deposit required, a one week voting period begins. During this timeframe, bonded SCRT holders are able to cast their vote with one of four options – yes, no, no with veto, and abstain.

Only bonded tokens can participate in Secret Network governance; this encourages users to bond their tokens to the network, which is an essential part of securing the network. Voting power is measured in terms of bonded SCRT. Delegators inherit the vote of the validator they are delegated to unless the delegator casts their own vote (which automatically overwrites the validator’s voting decision). Tallying the results of a proposal vote can result in an accepted proposal if the following requirements are met: quorum, threshold, and no veto. The quorum requirement programmatically checks that more than 33.4% of total bonded tokens participated in the vote by the end of the one week voting period.

The threshold requirement programmatically checks that more than 50% of tokens that participated in the vote, after exclusion of abstain votes, voted in favor of the proposal. The no veto requirement confirms that less than 33.4% of bonded tokens that participated in the vote, after exclusion of abstain votes, vetoed the proposal. Finally, the code the proposal wishes to modify is altered by developers of the network and implemented during the next hard fork of the network – the updated version of the protocol then gets pushed to all nodes supporting the network.

Tokenomics
Secret Network leverages inflation, block rewards, and staking to incentivize SCRT holders and validators to bond their tokens to the network. The less supply that is in circulation, the more difficult it is for a Byzantine actor to successfully execute a Byzantine attack against the Secret Network consensus layer. In addition, in order to drive adoption of the protocol, a generous inflation rate helps pull users, developers, and stakers into the network with the understanding that the inflation rate can be modified in the future through a governance proposal. Secret Network has a variable inflation rate that ranges from 7% – 15% based on the ratio of bonded to unbonded SCRT in relation to the target goal % bonded rate which is 67%. Secret Network has a twenty-one day unbonding period, with a circulating supply of approximately 70 million SCRT and a total supply of approximately 190 million SCRT.

Validator nodes can charge a commission rate on delegated SCRT. Currently, the commission rate floor is 0%, with a maximum rate of 20%. The commission rate of validators is only capable of changing by up to 1% every twenty-four hours. Separate from commission rate, there are two additional sets of fees on earned block rewards: the community fee (2%) and the Secret Foundation fee (15%). The annual approximate ROI for Secret Network staking ranges between 22% to 27% depending on the validator of choice. The community fee gets pulled from all block rewards and is sent to a pool of funds known as the Community Pool. This pool is used to help fund on-chain governance proposals that help advance the Secret Network ecosystem and protocol. No single entity owns these funds; they are governed in a completely decentralized fashion, empowering the community to voice their opinions and help shape the identity of Secret Network.

The Secret Foundation is an organization dedicated to building, researching, and scaling open-source, privacy-centric technologies for the public good. The Secret Foundation helps establish efficient and effective governance practices for the community and the Foundation itself. Additionally, it produces educational content and supports a range of committees that are helping empower individuals and projects created organically within the Secret Network community. The foundation uses its block reward fees to aggressively expand the Secret Network ecosystem which includes direct support for valuable community contributors.

Use Cases
Secret Contracts allow developers to create contracts with control over what subsets of data are encrypted. Due to the completely transparent nature of public blockchains, there has never been a protocol that allows for granular control over data transparency as with the Secret Network protocol. The first proof-of-concept use case to rise to the surface was SafeTrace. SafeTrace is a privacy-preserving contact tracing application that leverages the TEEs of Secret Network to enable summarization of sensitive data, individual high-risk interaction awareness, and data set research empowerment without ever exposing an individual’s private data. Computations are run within an SGX enclave, with summary results as output – safeguarding against any single individual’s data sovereignty being abused. Next came simple Secret dApps such as SecretPoker and rock-paper-scissors.

This allows users to play against each other with assurance that no one is able to front-run data or modify decision making due to data that should not be publicly visible within a game environment. Next, the SNIP-20 standard was created which enabled the creation of private, fungible tokens using Secret Contracts. Combining the programmability of ERC-20s with the privacy of Zcash or Monero, Secret Tokens unlock important use cases and create new value. This allowed tokens not native to Secret Network to be able to gain wrapped privacy properties enabled by Secret Contracts using IBC. Examples of SNIP-20 tokens were secretEthereum, secretDai, secretLink, secretMKR, etc. Secret Auctions are another Secret Contract created in 2020. When a user interacts with an exchange, individuals should be able to query multiple OTC exchanges for their price, and then execute the trade based on the best price.

Throughout this entire process, OTC desks shouldn’t know each other’s bids. If the OTC exchanges are aware of each other’s bids then there is potential for collusion against the user. Secret Actions use Secret Contracts to hide this type of vulnerable data in a neutral and programmatic fashion – creating a neutral program that can be trusted by mutually distrustful and privacy-aware entities. Secret Auctions have the potential to turn into Secret Dark Pools which would be a significant contribution to the DeFi ecosystems of the blockchain domain. PadLock helps artists monetize creative work via the decentralized web. Users can buy or sell access to exclusive content hosted on IPFS and Filecoin. The app will generate unique encryption and decryption keys and store them in the encrypted state of a privacy-preserving smart contract on Secret Network.

In other words, PadLock uses Secret Contracts to enable programmatic contract interactions that unlock access control via decryption of viewing keys. Secret Non-Fungible Tokens (NFTs) will allow for the creation of NFTs that have verifiable ownership of goods and experiences without ever exposing the underlying owner or their data – all made possible with Secret Contracts. Secret Automated Market Makers (AMMs) will help prevent front-running, a problem that has plagued DeFi since its inception. Due to the public nature of blockchains, front-running attacks happen all the time. Because users can see transactions in the mem-pool and their corresponding gas prices before a block is mined, it is easy for attackers to submit a transaction with a higher gas price, which would result in their own transaction being mined first.

The result is an unfairly executed bid or ask with the foreknowledge of the incoming trade – resulting in arbitrage profit due to the modification of supply and demand on a microscale that ultimately the user has to pay for. Because a Secret AMM would keep the mempool private, front-running would be impossible by default.

The use cases of Secret Network will conceivably impact every domain impacted by blockchain. Healthcare, finance, banking, governance, communications, media, supply-chain, voting, identity-fraud, key-access control, exchanges, IoT & mesh networks, forecasting and data set analytics, music and entertainment, real-estate, insurance, wills and inheritance, charity, credit histories, crowdfunding, publishing, gaming, gambling, and messaging. Secret Network protocol leveraging TEEs is the programmable privacy de-facto standard for contract development for the future of Web 3.0.

History
The Secret Network protocol and community have grown at a breathtaking rate since the launch of Secret Network on February 13th, 2020. Secret Network launched as a proof-of-stake protocol based on Cosmos SDK/Tendermint featuring the native token SCRT. The launch of Secret Network was assisted by 20+ validators looking to support the network. This represented the move towards decentralized governance, sustainability, and a critical step towards making a layer one solution that would enable both scalability and programmable privacy for Web 3.0. The next critical step in the ecosystem occurred in early June with the creation of the Secret Foundation – an organization committed to sustainably promoting the growth of the Secret Network ecosystem.

The Secret Foundation did so by advancing privacy as a public good: empowering people by providing tools, technologies, education, and support necessary to preserve their freedom. On June 19th, the Secret Games Incentivized Testnet was announced. Over the course of 56 days (starting on July 20th) there were over 100+ combined participants between the two different test phases. All of these participants played a key role in helping create the future of programmable privacy – secret contracts. In particular, the protocol needed to be stress tested by validator nodes and users in preparation for mainnet upgrade “Vulcan” which would bring Secret Contracts to mainnet after a hard fork of the Secret Network.

On June 24th the burn contract for SCRT was initiated. This burn contract enabled owners of ERC-20 token ENG to convert their cryptocurrency to SCRT — the native token of the Secret Network. Since June 24th, approximately 62 million SCRT had been sent from the burn contract. Importantly, over 35 million SCRT were swapped by Binance on September 29th; Binance was the first major exchange to list SCRT pairs for trading. Overall, the swap was an absolutely resounding success as SCRT gained adoption of governance, staking, and secret contract functionality. An integral part of any ecosystem is the availability of wallets to store and use the native cryptocurrency of the blockchain.

Secret Network had early wallet support from both Keplr and MathWallet. Governance proposal #19 saw community pool funding support for Keplr to create a MetaMask UX equivalent for the Secret Network with long term integration and support for Secret Contracts and applications.

On September 15th, 2020 at 14:00:00 UTC the Secret Network successfully hard forked and upgraded the protocol from “secret-1” to “secret-2”. This upgrade enabled Secret Contracts – the core value proposition of the Secret Network. On December 4th, Secret Network officially reached fifty active validators.

This was an important milestone for network security, decentralization, and node-onboarding. Along the way to this goal there was an amazing amount of collaboration between validators with a range of experience – all with the shared goal of building a network where programmable privacy is the default for Web 3.0. December 15th, 2020 saw the successful launch of the Secret Ethereum Bridge, the first of many bridges to other ecosystems. This bridge empowered users to wrap Ethereum and fourteen other ERC-20s to their secret SNIP-20 equivalent. To encourage liquidity and adoption, over two million SCRT were offered up as bridge mining rewards.

Philosophy
The Secret Network community is united by a common mission: to advance privacy as a public good, empowering people by providing the tools, technologies, education, and support necessary to preserve their freedom. Fundamentally, we believe privacy is a human right. An overly centralized internet and giant data monopolies have jeopardized our privacy, our security, and our society. We must scale privacy preserving technologies that can help us confront and overcome these systemic risks. We must continue to push for better education surrounding individuals’ right to privacy.

Privacy is inextricably intertwined with liberty. In the 21st century data economy there are rarely alternatives that offer a comparable product or experience while preserving users’ privacy. Secret Network is the first protocol ever to have a privacy-first, permissionless network for computational privacy; this platform aims to offer up an alternative to perfectly transparent data in the blockchain domain and by extension the world. We believe Secret Network is the privacy sandbox of the future – allowing the sustainable creation of Secret dApps that will permit individuals the freedom to traverse and use Web 3.0 with its full potential realized and implemented. The guiding principles of our community are usability, sustainability, impact, and empowerment. Every individual is key to the future of Secret Network and privacy. A committed and collaborative community is the most important thing any of us can build – it is the fundamental source for any meaningful change.

The Internet of Intelligence (IOI for short) is a new form of the internet. The goal of this article is to explore why it will become ubiquitous, how it works and what's the path of getting there.

Unlike the Web, where users seek information and content, or web3, where users can manage digital assets and use self-executing applications, Internet of Intelligence allows users to engage directly with intelligence capabilities. You just ask and it does things for you. An intent is directly converted into the result, and all the magic is hidden from the user.

It functions as an open, decentralized, two-sided marketplace, transforming how technology is helping people to achieve more. Demand side is anyone who has a job to be done. Supply side is an interconnected network of AI models, agents and multi-agentic workflows. Together, this forms a self-improving network of AI capabilities.

Internet of Intelligence is an environment where software and hardware gain agency. Unlike ML models or hardware, IOI can actively accomplish tasks for you. It seamlessly routes between agents and services, employing the most relevant and capable AI systems to deliver results. Indistinguishable from magic, yet already possible technologically.

How will we interact with Internet of Intelligence?
In the IOI, the end-user experience resembles using a search engine. Users input tasks they need help with—from finding a new apartment to diagnosing medical issues, reviewing legal documents, designing interiors, or building applications. Unlike a list of links or generated text, IOI provides the final result immediately. It's akin to hiring someone to complete a job, but the work begins instantly and requires less time and money. This process is more cost-effective, and users maintain full control over the workflow. IOI offers intelligence for hire with all the conveniences of software: infinite scalability, low marginal and transaction costs, and cheap global distribution.

Alpha: Water-powered humanoid robot with synthetic organs, muscles unveiled

Clone’s Myofiber technology uses artificial muscles to move the skeleton by attaching them to precise bone points, like animals.

Striving to stand out in the competitive humanoid robotics market, Polish-frim Clone Robotics has unveiled its first full-scale humanoid robot, Clone Alpha.

The humanoid integrates synthetic organs and artificial muscles, replicating skeletal, muscular, vascular, and nervous functions.

Clone’s muscular system uses Myofiber, an artificial muscle technology introduced by the firm in 2021, to move its skeleton. It works by attaching muscles to precise points on the bones, just like in real animals.

#humanoid #innovation #robot #synthetic #future

Clone Robotics is now accepting preorders for the first 279 units of its humanoid robot, Clone Alpha.

Last month, the company revealed its latest innovation: a humanoid torso with human-like movements.

Biomimetic robotics
While companies like Tesla develop bots for household tasks, Clone Robotics focuses on biomimetic robotics. Founded in 2021, it aims to replicate the strength and dexterity of biological beings, tackling the complex challenge of mimicking the human body

The firm started by creating a robotic hand with artificial bones and muscles, designed to mimic human functionality. Its thumb rotates and can even catch a ball with ease. Building on this, the company developed a humanoid torso with lifelike features, including a movable elbow, cervical spine, and realistic shoulder joints.

With precise ligament and tendon placement, the android achieves 164 degrees of freedom in its upper torso, including the shoulder with 20 degrees of freedom, the spine with 6 degrees per vertebra, and 26 degrees in the hand, wrist, and elbow.

The nervous system allows instantaneous control over the muscles with proprioceptive and visual feedback. The Clone is equipped with 4 depth cameras, 70 inertial sensors for joint-level feedback, and 320 pressure sensors for muscle force feedback. These are linked to microcontrollers that send data to the NVIDIA Jetson Thor GPU running Clone’s Cybernet model.

The Clone’s vascular system is powered by a compact, 500-watt electric pump resembling the human heart, delivering 40 SLPM at 100 psi. Its Aquajet valve technology operates under 1 watt of power, providing efficient hydraulic pressure to the muscles in a miniaturized design.

Tokamak Energy’s fusion facility to get game-changer upgrade as US, UK join hands

This program will advance fusion science and technology for spherical tokamaks.

The governments of the United States and the United Kingdom have joined hands with Tokamak Energy to advance the nuclear fusion science and technology needed for a future pilot plant.

The new collaboration plans to jointly sponsor a $52 million upgrade to the ST40 experimental fusion facility.

The partnership aims to achieve fusion conditions with good confinement suitable for sustained operation in a future pilot plant. This will be done by coating the inner wall of the ST40 device with lithium.

#tokamak #energy #fusion #uk #unitedstates

Project to start in 2025
The project is scheduled to start in 2025, and the total funding of $52 million is divided equally among the three partners.

Tokamak Energy’s partnership with the U.S. Department of Energy (DOE) and the U.K.’s Department of Energy Security and Net Zero (DESNZ) aims to establish shared access and development of facilities needed for fusion research and development (R&D).

“This represents a huge leverage opportunity for advancing fusion science and technology. These new investments will strengthen our partnerships with the private sector and our international allies. Each partner stands to gain significantly more than the funds committed,” said Dr Geraldine Richmond, DOE Under Secretary for Science and Innovation.

Face of real Santa Claus reconstructed with 3D tech after 1,700 years

Through forensic analysis of St. Nicholas of Myra’s skull, scientists have digitally reconstructed the face of the man who inspired the legend of Santa Claus.

Scientists have made this Christmas season a little brighter by bringing the face of the real Santa Claus to life.

Saint Nicholas of Myra, who lived over 1,700 years ago, has been a beloved figure for centuries. His legacy of kindness and generosity inspired the legend of Santa Claus, who delivers gifts to children worldwide on Christmas Eve.

Despite his enduring presence in popular culture and childhood traditions, there has been no accurate visual representation of Saint Nicholas, the benevolent gift-giver from the late Roman Empire until now.

#science #santaclaus #3d #reconstruction

Just in time for the holidays, scientists have used forensic analysis of Saint Nicholas’s skull to reconstruct his face and glean insights into his health, offering a fascinating gift to the world.

It seems that Clement Clarke Moore’s 1823 poem, “‘Twas the Night Before Christmas,” offered a surprisingly accurate portrayal of St. Nick.

According to Cicero Moraes, the study’s lead author, the reconstruction reveals a “strong and gentle face” resembling a realistic version of Santa Claus. Interestingly, evidence suggests that Saint Nicholas may have followed a plant-based diet.

Old military trucks to go autonomous with ARX’s firestick-like platform

ARX Robotics’ latest launch, Mithra OS, is based on an AI-driven operating system and comes with hardware cameras and sensors that can be mounted on military trucks.

Munich-based tech startup ARX Robotics, whose founders are veterans of the German armed forces, has unveiled a new product, named Mithra OS, that turns military vehicles into intelligent, interconnected autonomous units.

The company initially launched with Unmanned Ground Vehicles (UGV) and subsequently secured a major German military government contract, specifically for deployment in Ukraine. In June of this year, the startup raised a $9.5 million (€9 million) seed funding round led by the NATO Innovation Fund, with support from Project A Ventures and Discovery Ventures.

#munich #military #robotics #autonomous

Making military trucks intelligent
ARX’s latest product has an operating system based on AI. The Mithra OS comes with hardware cameras and sensors that can be mounted on military trucks or similar vehicles, and includes over-the-air updates through the ARX Autonomy Kit, TechCrunch reports.

According to Marc Wietfeld, founder and CEO of ARX Robotics, while the “battlefield of the future is digital,” European and other Western armies are still acquiring analog systems with no connection to modern battlefield environments.

“The thing is, we discovered the problem when being in the front line in Ukraine—but especially with the NATO armed forces—that the new assets of warfare such as drones, sensors, software, AI, etc cannot interconnect or collaborate with our existing fleets,” he told TechCrunch.

For instance, Wietfeld mentioned that the German armed forces purchased 3,500 Mercedes trucks but none of them are software capable, interconnected, or equipped with a radio—highlighting the gap between modern battlefield needs and current military procurement.

US fusion research optimizes stellarator performance to improve plasma confinement

To avoid the immense computational challenge of tracking every particle’s movement, the researchers developed a simplified function that accurately predicts the rate of particle loss from the magnetic field.

Researchers at the Princeton Plasma Physics Laboratory (PPPL) have made a breakthrough in enhancing the performance of stellarators, a type of fusion device.

Fusion, the process that powers the sun, involves the heating of light atomic nuclei, such as hydrogen isotopes, to form a plasma, an extremely hot and charged gas.

To achieve this on Earth, scientists are exploring various approaches, with stellarators and tokamaks being the leading contenders.

#fusion #stellarator #plasma #energy

Stellarators, one type of fusion device, have emerged as a promising alternative to traditional tokamaks. Both devices utilize powerful magnetic fields to confine plasma, a hot, charged gas, in a donut shape, facilitating the fusion reaction.

However, they differ in the way these magnetic fields are generated.

Significance of stellarator research
“Tokamaks have three large sets of magnetic field coils. One of them produces an electric current that runs through the center of the plasma. That electric current produces a magnetic field that boosts how well the plasma is confined,” explained the researchers in a press release.

“In contrast, stellarators have many magnet coils that loop around the outside of the plasma. They form twisting magnetic fields that wrap around the donut, without the need for a central current.”

This fundamental difference gives stellarators certain advantages, including inherent steady-state operation and reduced susceptibility to disruptions that can terminate the plasma confinement.

Trexo’s robotic brace helps children walk more than 100 million steps

Founded in 2016, Trexo Robotics is now aiming to reach 500 million steps with its device.

Canada-based wearable robotics developer Trexo Robotics has announced that its robotic brace has helped children with disabilities take over 100 million steps, which is twice the number of steps required to circle the Earth. The device is designed to aid children diagnosed with cerebral palsy, spinal muscular atrophy, hemi and paraplegia, spinal cord injury, Rett syndrome and other neurological conditions that impair mobility.

#trexo #robot #walking #children #technology #canada

Founded in 2016 in Ontario, by CEO Manmeet Maggu and CTO Rahul Udasi to assist Maggu’s nephew, Trexo customizes each brace’s gait to the user and adjusts it over time. The system accommodates changes in gait pattern, step speed, weight bearing, and support level.

Robotic exoskeleton supports movement
The company offers a pair of robotic legs, known as an exoskeleton, integrated into an external walker frame. When a person’s legs are connected to the exoskeleton, they can move independently while being supported by the frame, allowing for exercise and strength-building.

According to Maggu, many of these kids were told they would never take a step. “Every single one of these 100 million steps tells a different story—one of courage, progress, and hope,” Maggu said. “This milestone is made up of countless special moments, each representing improved strength, better health, and brighter possibilities,” the company’s CEO stressed.

For Udasi, the 100 million steps milestone wasn’t something he set as a goal, as they wanted children to take as many steps as possible. “It’s amazing, each kid starting with one step and going after their own goals, has added up to an unbelievable number,” he added.

Is This $100bn Megacity Failing?

The King Abdullah Economic City is one of the ambitious mega city projects of Saudi Arabia. With a next generation port verification system and luxury properties, its goal is to become a global powerhouse of investment. How successful has it been?

The King Abdullah Economic City is one of the ambitious mega city projects of Saudi Arabia. With a next generation port verification system and luxury properties, its goal is to become a global powerhouse of investment. How successful has it been?

#saudiarabia #city #technology

Direct lithium extraction: securing lithium’s energy future

EnergyX is leading the charge in truly sustainable lithium production with its in-house developed direct lithium extraction technique.

Why is lithium so important?
“Lithium’s physical properties make it one of the best materials for storing energy,” Teague explained to IE. As the third element on the periodic table, lithium is both lightweight and highly energy-dense.

He explained that this combination makes it ideal for applications where portability is crucial. Especially for applications like EVs and smartphones. Egan elaborated on lithium’s unique role in batteries, highlighting its importance for mobility applications.

#lithium #energy

“If you just have a battery sitting on the ground, weight doesn’t matter. But energy density is critical if you have to move it in a car or a plane,” he said. This energy density is why lithium has become the backbone of modern rechargeable batteries.

Before lithium-ion batteries rose to prominence, lithium had limited applications. “The total global market for lithium was in the low hundreds of thousands of tons,” Egan explained.

“It was mostly used in pharmaceuticals, glass, and greases.” However, lithium became indispensable as EVs gained traction and climate change initiatives spurred decarbonization. “Lithium quickly became essential with electric vehicles and the need to store energy without emitting carbon,” he added.

What is EnergyX’s direct lithium extraction?
Traditional lithium extraction processes like evaporation ponds are slow, inefficient, and environmentally damaging. “The old process takes 18 months and only recovers 30–40% of the lithium,” Egan pointed out.

One major problem with this technique, is that it requires vast amounts of land and water, thereby making them unsustainable as demand surges. EnergyX developed Direct Lithium Extraction (DLE) technology to address these challenges, dramatically improving efficiency and sustainability.

“With DLE, instead of 18 months, we can process lithium in one to two days,” Egan explained. The method also boasts recovery rates of over 90% while using only 1/100th of the land footprint compared to traditional evaporation ponds.

DOE Partners with UK’s DESNZ and Tokamak Energy Ltd. to Accelerate Fusion Energy Development through a $52M Upgrade to the Privately Owned ST40 Facility

US and UK governments strengthen ties by partnering with the private fusion sector to advance the development of fusion energy towards demonstration.

The U.S. Department of Energy (DOE), the U.K.’s Department of Energy Security and Net Zero (DESNZ), and the private fusion company Tokamak Energy Ltd. (TE) today announced a plan to jointly sponsor a $52 million upgrade to the ST40 experimental fusion facility to advance fusion science and technology needed to deliver a future fusion pilot plant.

#doe #energy #tokamak #uk #desnz #fusion #nuclear

Fusion powers the sun and stars, and, if harnessed on Earth, could provide an abundant, safe, and carbon-emissions-free energy source. This collaboration was selected through the 2025 fiscal year Office of Science open funding opportunity.

In December 2023, the DOE and DESNZ announced a fusion strategic partnership to advance both the U.S. Bold Decadal Vision for Commercial Fusion Energy and the UK’s Fusion Strategy. A major goal of the partnership is to establish shared access to and development of facilities needed for fusion research and development (R&D). Through the DOE-DESNZ-TE collaboration, researchers at universities, national laboratories, and institutes in both the U.S. and U.K. will be able to benefit from the research carried out on the privately owned ST40 spherical tokamak.

'Breakthrough' dementia drug looks to stop disease in its tracks

Filamon Limited, an Australian biotech company focused on developing next-gen anti-inflammatory drugs, has announced its breakthrough dementia treatment. ALPHA-003 is designed to preserve the integrity of vital brain cell structures and protect them against destruction caused by brain inflammation.

In healthy neurons, the tau protein stabilizes microtubules, crucial tube-like structures that, together with neurofilaments, maintain the neurons’ shape and provide mechanical support. However, when it’s modified, tau can form toxic aggregates – tangles that degrade these key structures. This is seen in a group of diseases called tauopathies, such as dementia, including Alzheimer’s disease, and chronic traumatic encephalopathy (CTE).

#dementia #drug #healthcare

Existing dementia treatments focus on reducing the consequences of this structural damage but have enjoyed only moderate success. Now, an Australian biotech company, Filamon Limited, has announced its breakthrough treatment, ALPHA-003, which is aimed at halting the progression of dementia by preventing microtubular destruction.

“The underlying problem with most forms of dementia is the destruction of a key structural component of brain cells known as microtubules,” said Associate Professor Kieran Scott, Professor of Oncology at Western Sydney University, and co-founder of Filamon. “These long, hollow tubes are vital to healthy brain function. In dementia, these microtubules degrade, resulting in the death of brain cells.

There are 2 pages
Pages