Your Hub for Tech News and Handy Online Tools.

Legal/Business

DoorDash Fights Back Against Uber's Anti-Competition Lawsuit

DoorDash is seeking to dismiss a lawsuit filed by Uber, which accuses DoorDash of stifling competition through exclusive deals with restaurants.
DoorDash argues that Uber's claims lack merit and describes the lawsuit as a 'cynical and calculated scare tactic.'
Uber alleges that DoorDash threatens restaurants with penalties for not adhering to exclusive deals.
DoorDash has also made offer to buy Deliveroo for $3.6 billion.
A hearing is scheduled for July 11 in California Superior Court.

Artificial Intelligence

OpenAI's Codex CLI Gains Developer Favor Over Anthropic's Claude Code Due to Licensing and Open Source Approach

The competition between Anthropic's Claude Code and OpenAI's Codex CLI, both AI-powered coding tools, reveals a preference among developers for the latter. This is largely attributed to Anthropic's restrictive usage license and takedown notices issued to developers attempting to reverse-engineer Claude Code, contrasting with Codex CLI's open-source Apache 2.0 license.

OpenAI has been more receptive to developer suggestions, incorporating them into Codex CLI's codebase, even allowing integration with AI models from competitors like Anthropic. While Anthropic's Claude Code is still in beta and has faced some issues, its obfuscated source code and strict licensing have drawn criticism from the developer community. This situation presents a surprising PR advantage for OpenAI, which has been shifting away from open source in recent times.

Automotive

Slate Auto Targets Indiana Plant for EV Truck Production

Slate Auto, an EV startup, is nearing a deal to lease a 1.4 million-square-foot former printing plant in Warsaw, Indiana for its electric truck production. The factory, previously owned by R.R. Donnelly, has been dormant for about two years.

The company anticipates employing up to 2,000 people at the facility, with potential incentives from the county. Slate plans to manufacture its EVs in the USA, with a focus on domestic manufacturing.

Backed by investors like Jeff Bezos and General Catalyst, Slate has raised over $100 million. The company aims to reduce costs by using wraps instead of paint, eliminating the need for a paint shop in the factory.

Cybersecurity

Decoding Cybersecurity: A Comprehensive Glossary of Terms

This glossary defines key cybersecurity terms, explaining their relevance and usage.

Key Definitions:

  • Advanced Persistent Threat (APT): Hackers maintaining unauthorized system access for espionage, data theft, or sabotage, often linked to nation states.
  • Adversary-in-the-Middle (AitM) Attack: Interception of network traffic to eavesdrop or modify data.
  • Arbitrary Code Execution: Running commands or malicious code on a system due to a security vulnerability.
  • Attribution: Identifying the source of a cyberattack.
  • Backdoor: A means to gain future access to a system, which can be legitimate or malicious.
  • Black/White Hat: Categories of hackers based on motivations (illegal vs. ethical).
  • Botnet: Networks of compromised devices used for cyberattacks.
  • Brute Force: Guessing passwords through automated combinations.
  • Bug: A software glitch causing errors or unexpected behavior.
  • Command-and-Control (C2) Server: Servers used by cybercriminals to manage compromised devices.
  • Crypto: Can refer to cryptography or cryptocurrency, depending on context.
  • Cryptojacking: Using a device's power to generate cryptocurrency without permission.
  • Dark and Deep Web: The dark web allows anonymity, while the deep web includes content behind paywalls.
  • Data Breach: Improper removal of data from its secure location.
  • Data Exposure: Unprotected data stored without access controls.
  • Data Leak: Data escaping a system due to vulnerabilities or insider access.
  • Deepfake: AI-generated media designed to look real.
  • Distributed Denial-of-Service (DDoS): Overloading targets with junk traffic to crash servers.
  • Encryption: Scrambling data to make it unreadable without a key.
  • End-to-End Encryption (E2EE): Securing communications so only the sender and recipient can read them.
  • Escalation of Privileges: Gaining more access rights than intended.
  • Espionage: Stealthy hacking to spy and collect data.
  • Exploit: Abusing a vulnerability to break into a system.
  • Extortion: Demanding payment under threat of data damage or exposure.
  • Forensics: Analyzing data for evidence of cybercrime.
  • Hacker: Someone who alters how something works, which can be ethical or malicious.
  • Hack-and-Leak: Stealing and leaking data to embarrass victims or expose malfeasance.
  • Hacktivist: Hacking for perceived good causes.
  • Infosec: Information security, focused on protecting data.
  • Infostealers: Malware that steals information from devices.
  • Jailbreak: Circumventing device security restrictions.
  • Kernel: The core part of an operating system controlling hardware and software.
  • Malware: Malicious software.
  • Metadata: Information about digital content.
  • Multi-Factor Authentication (MFA): Requiring a second piece of information for login.
  • Operational Security (OPSEC): Keeping information secret through various practices.
  • Penetration Testing: Stress-testing a system's security.
  • Phishing: Tricking targets into clicking malicious links or attachments.
  • Ransomware: Malware that encrypts files and demands ransom.
  • Remote Code Execution: Running code on a system over a network.
  • Sanctions: Penalties for transacting with entities involved in cybercrime.
  • Sandbox: An isolated environment for analyzing malicious code.
  • SIM Swap: Hijacking a phone number to access sensitive accounts.
  • Social Engineering: Deceiving targets into performing actions.
  • Spyware: Surveillance software.
  • Stalkerware: Spyware used to monitor individuals without their consent.
  • Threat Model: Identifying what to protect and potential attackers.
  • Unauthorized: Accessing a system by breaking security features.
  • Virtual Private Network (VPN): Technology allowing access to a private network remotely.
  • Vulnerability: A security flaw causing software to crash or behave unexpectedly.
  • Zero-Click Attack: Compromise without any user interaction.
  • Zero-Day: A vulnerability with no available fix.

Immigration and AI

AI Talent Exodus: OpenAI Researcher's Green Card Denial Sparks Concern Over US Innovation

Kai Chen, an AI researcher at OpenAI who contributed to GPT-4.5, was denied a U.S. green card after living in the country for 12 years. This decision has raised concerns about the U.S. potentially losing its leadership in AI due to strict immigration policies.

Another OpenAI employee mentioned Chen was crucial for GPT-4.5. Chen will be working remotely from Vancouver while the situation is being resolved.

This incident reflects a broader trend of increased barriers for foreign talent in the U.S., including visa challenges for international students and stricter scrutiny of green card applications.

OpenAI filed over 80 H1-B visa applications last year alone, highlighting their reliance on foreign research talent. Immigration officials are also issuing more requests for evidence for H-1B visas, which might increase denied applications.

Immigrants have significantly contributed to the U.S. AI industry, with a large percentage of AI startups having immigrant founders and international students making up a majority of graduate students in AI-related fields.

Concerns over immigration policies and funding cuts are causing many researchers to consider leaving the U.S. for jobs abroad.

Technology & Social Impact

Youth Leaders Unite with Prince Harry to Tackle Tech's Harms

Prince Harry convened with youth leaders in Brooklyn to address the impact of technology on young people, focusing on social media and AI safety. The Duke of Sussex emphasized the need for tech platforms to prioritize user safety over profit, acknowledging their immense power.
The event, hosted by the Responsible Tech Youth Power Fund (RTYPF), showcased young innovators working to shape the future of technology. Discussions centered on the addictive nature of social media, the proliferation of AI-generated content, and the spread of misinformation.
Participants advocated for increased regulation, youth involvement in policy-making, and collaboration between regulatory bodies and tech companies. They stressed the importance of empowering young people with the tools to navigate the online world safely and responsibly.

Data Breach

Yale New Haven Health Data Breach Exposes 5.5 Million Records

Connecticut's Yale New Haven Health experienced a data breach in March, impacting over 5.5 million individuals. Malicious actors accessed patients' personally identifiable information and healthcare-related data. The compromised data includes names, dates of birth, addresses, phone numbers, race/ethnicity, Social Security numbers, and medical record details. This breach follows a similar incident involving Blue Shield of California and Google, highlighting ongoing concerns about healthcare data security.

Automotive

Slate Auto Unveils Affordable, Customizable, and Analog EV Pickup Truck

Slate Auto, a new American EV startup backed by Jeff Bezos, has launched its first vehicle, an affordable, customizable, and analog pickup truck. Priced under $20,000 after the federal EV tax credit, the truck boasts manual windows, no main infotainment screen, and even comes unpainted. With over 100 accessories, buyers can personalize the truck, transforming it from a two-seater pickup to a five-seater SUV. The base model offers 150 miles of range, a 1,400-pound payload capacity, and a 1,000-pound towing capacity. Slate aims to disrupt the EV market by offering a low-cost vehicle with extensive customization options.