Welcome to today’s curated collection of interesting links and insights for 2025/11/09. Our Hand-picked, AI-optimized system has processed and summarized 15 articles from all over the internet to bring you the latest technology news.
As previously aired🔴LIVE on Clubhouse, Chatter Social, and TikTok.
Also available as a #Podcast on Apple 📻, Spotify🛜, Anghami, and Amazon🎧 or anywhere else you listen to podcasts.
1. Emails blaming Democrats for shutdown violate First Amendment
A federal judge ruled that the U.S. Department of Education violated career employees’ First Amendment rights by automatically inserting partisan language into their out-of-office email messages during the 2025 government shutdown. The messages, originally drafted neutrally for furloughed staff, were later altered to blame “Democrat Senators” for the funding lapse — changes made without consent, impersonating employees’ voices. The judge emphasised that government workers must remain non-partisan and cannot serve as unwilling conduits of political messaging, ordering the department to remove the content immediately. The case raises questions about the ethical and legal boundaries of using civil-service communications for partisan narratives and reinforces protections for non-political public service.
2. Goodbye Cavities: Scientists Just Found a Way to Regrow Tooth Enamel
Scientists have developed a novel method to regrow tooth enamel, a breakthrough that could eliminate cavities and tooth decay. Researchers discovered that by using a hydrogel infused with a specific protein, enamel-producing cells can be reactivated to generate new enamel layers. This approach overcomes the long-standing challenge of enamel’s inability to self-repair after damage. The advancement suggests a future where dental treatments may focus on restoration rather than repair, improving oral health outcomes significantly. This innovation demonstrates a promising direction for #biomaterials and #regenerative medicine in dental care.
3. A new report shows X is amplifying far-right accounts
A study by @SkyNews found that @X (formerly Twitter) shows a bias towards right-wing content in its “For You” recommendation feed. Researchers created nine new accounts (three left-wing, three right-wing, and three neutral), then tracked what content was recommended over a month in 2025. The right-wing accounts received almost exclusively right-wing content; even the neutral accounts were shown roughly twice as much right-wing content as left-wing. The experiment controlled for follower counts and engagement, meaning the algorithmic tilt could not be explained solely by popularity. The findings raise concerns about political bias in algorithmic curation and how large-scale social platforms shape exposure to extreme or niche content.
Definition: Algorithmic Amplification
Algorithmic amplification is the phenomenon whereby a platform’s recommendation system promotes content not just because it is popular but because the algorithm’s design favours certain types of content—often leading to disproportionate visibility for particular topics or viewpoints. This can happen through filtering, ranking, or prioritising posts based on engagement signals or predictive models, ultimately influencing what users see and amplifying certain voices over others.
4. Bank of America faces lawsuit over alleged unpaid computer boot-up time
Bank of America is facing a class-action lawsuit alleging hundreds of hourly workers were unpaid for up to 30 minutes of pre-shift computer startup and related tasks over several years. The former Business Analyst, Tava Martin, says remote and Jacksonville-area employees had to log into multiple security systems, download spreadsheets, and connect to the VPN before their paid shifts began, a process that took 15 to 30 minutes each morning and could stretch longer with technical issues, including steps like loading Windows, obtaining a security token, and opening required web applications. Unpaid time extended beyond startup to lunch and post-shift wrap‑ups, with 3–5 minutes lost to re‑logins during breaks and another 2–3 minutes after shifts, while pay records reportedly showed exactly 40 hours per week (or 32 when a day was missed). The suit cites 2008 guidance from the #DOL under #FLSA, which says starting computers to download work instructions is a principal activity and requires employers to keep records of pre‑ and post‑shift hours, suggesting the bank may not have determined compensability or may have underpaid for actual work performed. If proven, the case could reflect unpaid nonexempt labor and potential overtime for workers who regularly logged full-time hours, adding to prior similar suits against @Bank of America.
5. LibreOffice says your documents should survive for ‘generations’
LibreOffice and other office suites rely on the Open Document Format (#ODF) to keep documents accessible for years or generations. ODF can embed fonts, images, videos, and metadata inside the file, reducing dependence on external resources that might fail later. The blog of @The Document Foundation notes that documents created with ODF 1.0 in 2005 can be opened by applications released in 2025, illustrating deliberate long-term preservation. While Office documents can be opened by many other apps, they often appear broken due to reverse-engineered dependencies and a lack of transparency around the format. For longevity, the article recommends backing up files in multiple locations and exporting irreplaceable files to PDF/A for unmodifiable versions.
6. The Government Shutdown Is a Ticking Cybersecurity Time Bomb
A US government shutdown poses severe risks to national cybersecurity as critical operations and personnel are furloughed, hindering timely response to cyber threats. Agencies like the Cybersecurity and Infrastructure Security Agency (#CISA) and the Federal Bureau of Investigation (#FBI) experience reduced capacity, impairing the government’s ability to detect and mitigate cyberattacks. This disruption occurs amid increasing cyber threats from nation-states and criminal groups targeting vital infrastructure. The shutdown highlights vulnerabilities in government dependence on continuous funding for maintaining cyber defenses and underscores the need for contingency planning. Without resolution, the exposure of federal digital systems to cyber risks will grow, endangering national security and public safety.
7. ID verification laws are fueling the next wave of breaches
New #identity verification laws designed to curb fraud and money laundering are unintentionally increasing the risk of data breaches by requiring companies to collect and store large volumes of sensitive personal data. This data accumulation creates attractive targets for cybercriminals, who can exploit vulnerabilities in ID verification systems and third-party services. Experts warn that relying on centralized repositories for identity information escalates the exposure to theft and misuse, as hackers can breach a single source to access multiple individuals’ data. The article highlights the tension between regulation intent and practical cybersecurity outcomes, emphasizing the need for improved data handling and protection strategies to balance compliance with robust security. Overall, the evolving legal landscape mandates stronger defense mechanisms to prevent a surge in breaches linked to mandated identity data collection.
8. The AI race to reboot feudalism — Protagonist Science
In this analytical essay, author Philipp Markolin argues that today’s AI infrastructure boom looks less like an innovation surge and more like a transformation toward a new digital feudal order. He draws parallels between massive investments in data centres, hyperscale chips, and cloud infrastructure to past economic booms—canals, railroads, fiber-optics—warning that the underlying value for most users remains low while the infrastructure owners accrue power, control, and rent-seeking advantages. He points out that many companies adopting AI report little profit, yet the trillions of dollars are flowing anyway; this creates conditions for concentrated tech lords, digital serfs, and network dependencies rather than broad-based prosperity. The essay cautions that whether AI fulfills its promise or crashes under hype, the disruption for ordinary workers and institutions will be real.
Definition: Digital feudalism
Digital feudalism refers to a socio-technical structure where a small number of tech platforms or infrastructure owners control the means of digital production, access, and data, while large populations of users and dependent services operate under the influence or obligations of those owners. Mirroring medieval feudal systems, this model replaces land-based lords and serfs with data-lords (platforms) and digital serfs (users/developers) whose economic agency, autonomy and access are constrained by the infrastructure and rules set by the few.
9. Tech Billionaires Push a Controversial Vision for Genetically Engineered Babies
Tech billionaires are investing in and advocating for the development of genetically engineered babies, hoping to eradicate genetic diseases and enhance human capabilities. They are funding research that employs #CRISPR gene-editing technology to modify embryos, stirring ethical debates among scientists, policymakers, and the public. Critics warn that this pursuit risks unforeseen genetic consequences and could exacerbate social inequalities, while proponents argue it represents a breakthrough in health and human potential. The controversy highlights the tension between innovation in #biotechnology and the regulatory and moral frameworks governing human genetics. This trend illustrates the growing influence of wealthy tech figures in shaping the future of genetic science and reproductive technologies.
10. The government shutdown is starting to have cosmic consequences
The federal government shutdown has forced the @FAA to issue a temporary emergency order that blocks most commercial rocket launches during peak air-traffic hours and directs airlines to cut flights at 40 high‑impact airports to address safety risks from staffing constraints. Beginning 10 pm–6 am local time, launches and reentries are limited, as the @FAA states the air traffic control system is stressed and delays and unpredictable staffing shortages threaten the safety and efficiency of the @NationalAirspaceSystem #NationalAirspaceSystem. Launch timing is driven by mission requirements and orbital planes, so SpaceX’s @SpaceX can target night-time windows for Starlink launches, while Blue Origin’s New Glenn mission for NASA requires an afternoon window, illustrating how the shutdown reshapes scheduling and licensing for commercial spaceflight. The moves underscore how the shutdown’s ripple effects extend from air travel to space operations, with @NASA’s commercial contracting and FAA licensing central to maintaining safety and efficiency in the face of funding gaps.
11. Air Traffic Controllers Start Resigning as Shutdown Bites
The longest U.S. government shutdown, with unpaid federal workers, has air traffic controllers quitting at a rate that leaves airports nationwide understaffed and stretched to the limit. @NickDaniels, president of the National Air Traffic Controllers Association, says resignations are happening “every day” and the workforce is about 400 controllers short, with many remaining staff working six days a week for 10 hours a day as burnout and bill-paying pressures mount. Some controllers have even taken second jobs, despite warnings from Transportation Secretary @SeanDuffy that they should focus on controlling the airspace, while the administration has curbed traffic by about 10% in 40 high-traffic markets including NYC, Boston, and LA. The disruptions are not temporary; officials warn it will take months to recover after the shutdown ends, risking a choppier holiday season for travelers. The piece shows how political gridlock over spending and ACA subsidies is translating into real operational challenges for the U.S. aviation system, underscoring the immediate costs of the stalemate.
12. tvOS 26.2 Lets You Create Apple TV Profiles Without an Account, Adds Dedicated Kids Mode
tvOS 26.2 from @Apple lets you create Apple TV profiles without an @Apple Account and adds a dedicated #KidsMode. In Settings > Profiles, the Add New Profile option no longer requires sign-in; instead you can choose Create Profile with a name, a profile rating, and a yes/no about whether the user is a child. If you mark a profile as a child, the default content is limited to PG with a customizable option for specific ratings, and the Apple TV app only shows content that matches those limits #parental-controls. This kids mode is not a full separate Apple TV experience; when a kids profile is active it applies only to the Apple TV app, while other apps remain accessible and adults can also have profiles without an Apple Account. The feature is in developer and public beta and is expected to launch around mid-December #tvOS26.2.
13. Galaxy S27 Ultra may finally have a key security feature iPhones have had for years
Samsung’s Galaxy S27 Ultra is rumored to include #Polar_ID, a polarized-light face unlock that could rival @Apple’s @Face_ID, according to early test firmware mentioning the “Polar ID v1.0” in a biometric security framework. The logs tie the module to the ISOCELL Vizion front sensor and a new secure enclave routine, with an unlock latency of about 180 ms and improved resistance to spoofing. Polar_ID is a real technology from Metalenz that senses the full polarization state of light, creating a facial signature that is claimed to be harder to spoof than standard 3D masks #PolarizedLight. The tip originates from @SPYGO19726 and notes prior chatter about Polar_ID on Galaxy S25 Ultra and S26 Ultra, with links to Qualcomm and Samsung’s Vizion sensor partnership in 2024, lending plausibility. If confirmed, this would mark a significant security upgrade for Samsung flagships and bring biometrics closer to iPhone-level protection.
14. Scientists transcribe thoughts from brain MRI scans
Researchers have developed a method to transcribe thoughts by analyzing functional MRI scans of brain activity. This approach involves decoding brain signals into language, enabling the reconstruction of imagined or heard sentences directly from neural data. The study demonstrates significant progress in interpreting the brain’s language processing regions, advancing the field of brain-computer interfaces. These findings could improve communication abilities for individuals unable to speak by providing a non-invasive way to translate thoughts into text. The work highlights the potential for technology to bridge neurological activity and language interpretation, expanding possibilities for medical and assistive applications.
15. Landfall spyware used in 0-day attacks on Samsung phones
LANDFALL spyware exploited a zero-day in Samsung’s image-processing library (CVE-2025-21042) to target Galaxy devices across Android 13–16, with activity likely beginning July 2024 and continuing until Samsung patched the flaw in April 2025. Unit 42 researchers, including @Itay_Cohen, described it as a precision espionage campaign targeting specific Samsung Galaxy devices in the Middle East with victims in Iraq, Iran, Turkey, and Morocco. Delivery used a zero-click method via a crafted image sent through a messaging app; once installed, the spyware could record calls, track locations, and harvest photos and logs, indicating a commercial-grade, modular payload design and custom infrastructure. While related campaigns involved CVE-2025-21043 (Apple ImageIO) and CVE-2025-43300 (iOS) or CVE-2025-55177 (WhatsApp), Unit 42 cautions there is no definitive link to Landfall, though the timing and parallels point to a broader wave of #DNG image-parsing exploitation in advanced mobile spyware. Related exploit chains remained active into late 2024 and early 2025, with reports that such campaigns continued to target a very specific, small set of users across platforms.
16. Microsoft Reportedly Readies Windows 11 26H1 for Snapdragon X2 and Nvidia N1X Platforms
Microsoft is preparing the Windows 11 26H1 update to support new hardware platforms including the Snapdragon X2 and Nvidia N1X. This update marks a significant step in integrating #Windows11 with ARM-based processors like Qualcomm’s Snapdragon X2. It reflects Microsoft’s ongoing strategy to expand compatibility and performance for diverse chipsets, particularly focusing on mobile and energy-efficient devices. The update will enable users to leverage the advanced features and optimizations provided by these cutting-edge chips, enhancing device versatility. This effort underlines Microsoft’s commitment to evolving #Windows11 toward a more adaptable and hardware-inclusive ecosystem.
17. UC Berkeley scientists launch NASA mission to Mars
UC Berkeley scientists are playing a leading role in NASA’s mission to Mars by participating in the development of the Perseverance rover and its scientific instruments designed to search for signs of past life on the Red Planet. The rover, equipped with advanced laboratories, will collect samples to better understand Mars’ geology and climate history. In particular, researchers from the university have contributed to creating instruments that analyze rock compositions and atmospheric conditions. This mission highlights the collaboration between NASA and academic institutions to push the boundaries of space exploration and gain insights into planetary science. The work of UC Berkeley scientists advances both the exploration of Mars and the broader scientific quest to understand the potential for life beyond Earth.
That’s all for today’s digest for 2025/11/09! We picked, and processed 15 Articles. Stay tuned for tomorrow’s collection of insights and discoveries.
Thanks, Patricia Zougheib and Dr Badawi, for curating the links
See you in the next one! 🚀