• About TC
  • Affiliate Disclaimer
  • Privacy Policy
  • TOS
  • Contact
Tuesday, September 9, 2025
Techcratic
No Result
View All Result
  • AI
    Artificial Intelligence

    How Yichao “Peak” Ji became a global AI app hitmaker

    Artificial Intelligence

    How Amazon Finance built an AI assistant using Amazon Bedrock and Amazon Kendra to…

    Artificial Intelligence

    5 Reasons Why Vibe Coding Threatens Secure Data App Development

    Artificial Intelligence

    Unlocking the future of professional services: How Proofpoint uses Amazon Q Business

    Artificial Intelligence

    Exploring the Real-Time Race Track with Amazon Nova

    Artificial Intelligence

    Accelerating HPC and AI research in universities with Amazon SageMaker HyperPod

    Artificial Intelligence

    Building the AI-enabled enterprise of the future

    Artificial Intelligence

    From JSON to Dashboard: Visualizing DuckDB Queries in Streamlit with Plotly

    Artificial Intelligence

    The “Super Weight:” How Even a Single Parameter can Determine a Large Language Model’s…

  • Apple
    Spigen’s iPhone 17 Pro Max clear cases give Apple logo space

    Spigen’s iPhone 17 Pro Max clear cases give Apple logo space

    This is Apple’s new Crossbody Strap accessory for iPhone

    This is Apple’s new Crossbody Strap accessory for iPhone

    Apple launches new TechWoven material for iPhone 17 cases

    Apple launches new TechWoven material for iPhone 17 cases

    Apple loses to HP in ACSI personal computer satisfaction survey

    Apple loses to HP in ACSI personal computer satisfaction survey

    Skipping the iPhone 17? This M4 MacBook Pro with 24GB of RAM is just $1,399

    Skipping the iPhone 17? This M4 MacBook Pro with 24GB of RAM is just $1,399

    This one new feature might finally bring me back to the Mac in 2025

    Next year’s MacBook Pro redesign with OLED gets timeline update

    OWC dock brings Thunderbolt 5 & 20GbE speed to Mac & PC

    OWC dock brings Thunderbolt 5 & 20GbE speed to Mac & PC

    Another Plex data breach sees company urge users to change their password

    Another Plex data breach sees company urge users to change their password

    9 ways to use your iPhone’s USB-C port

    9 uses for your iPhone’s USB-C port other than fast charging

  • ComputerWorld
    Intel announces leadership overhaul, underscoring long road to recovery

    Intel announces leadership overhaul, underscoring long road to recovery

    Atlassian exec details the $610M Browser Company acquisition

    Atlassian exec details the $610M Browser Company acquisition

    Uber turns drivers into AI data labelers in India pilot

    Uber turns drivers into AI data labelers in India pilot

    Tech employment is a mixed bag, selective hiring marks a shift

    Tech employment is a mixed bag, selective hiring marks a shift

    Why generative AI projects fail

    Why generative AI projects fail

    Here are the top AI certifications that will get you hired and promoted

    Here are the top AI certifications that will get you hired and promoted

    Relief for European Commission as court upholds EU Data Privacy Framework agreement with…

    Relief for European Commission as court upholds EU Data Privacy Framework agreement with…

    Bill Gates’ early BASIC code for MOS 6502 released as open source

    Bill Gates’ early BASIC code for MOS 6502 released as open source

    Apple may twin with Gemini for AI as iPhone 17 looms

    Apple may twin with Gemini for AI as iPhone 17 looms

  • Gaming
    Maybe release a game in May sometimes? ‘Fixation on the holiday window’ is hurting game publishers, says industry analyst Newzoo

    Maybe release a game in May sometimes? ‘Fixation on the holiday window’ is hurting game publishers, says industry analyst Newzoo

    HUGE FNAF NEWS!! Movie trailer, Security breach DLC, Help wanted VR 2

    HUGE FNAF NEWS!! Movie trailer, Security breach DLC, Help wanted VR 2

    Serve and Protect: Detect 6 Violations | RoboCop Rogue City

    Serve and Protect: Detect 6 Violations | RoboCop Rogue City

    THYMESIA | 16 MINUTES OF GAMEPLAY | [1080P 60 FPS]

    THYMESIA | 16 MINUTES OF GAMEPLAY | [1080P 60 FPS]

    There’s another golden RTX 5090 made of over 1,000x more gold than the first, and I’m pleased to say it’s absolutely hideous

    XFX says its ‘V3’ Radeon RX 9060 XT GPUs with Samsung GDDR6 run much cooler and quieter than previous models with SK Hynix memory

    Starship Troopers Extermination: Last Man Standing

    Starship Troopers Extermination: Last Man Standing

    Watch The PC Gamer Streamer Showdown live today on Twitch

    Watch The PC Gamer Streamer Showdown live today on Twitch

    As Dusk Falls Pt.2: WHO THE F IS BRUCE?!

    As Dusk Falls Pt.2: WHO THE F IS BRUCE?!

    Intel reshuffle puts engineering and ‘a new custom silicon business’ in the spotlight but also ends a 30-year career at Intel for Product CEO Michelle Johnston Holthaus

    Intel reshuffle puts engineering and ‘a new custom silicon business’ in the spotlight but also ends a 30-year career at Intel for Product CEO Michelle Johnston Holthaus

  • Retro Rewind
    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

  • Tech Art
    SUNY New Paltz Presents “Composium,” a Series of Events Exploring Sustainability in the Arts

    SUNY New Paltz Presents “Composium,” a Series of Events Exploring Sustainability in the Arts

    Color Theory Basics for Digital Painters

    Color Theory Basics for Digital Painters

    3D Cube design in Illusion – 3D Optical Illusion Explained in illustrator 2025

    3D Cube design in Illusion – 3D Optical Illusion Explained in illustrator 2025

    Don’t make these shading mistakes

    Don’t make these shading mistakes

    AR Car Showroom App Review – Augmented Reality Vehicle Showcase

    AR Car Showroom App Review – Augmented Reality Vehicle Showcase

    Infinite design tutorial (vector art) step by step | ultimate focus tamil

    Infinite design tutorial (vector art) step by step | ultimate focus tamil

    (877) Awesome Peach and Gold Spray Paint Mixed Media Pour

    (877) Awesome Peach and Gold Spray Paint Mixed Media Pour

    Kirito's Elucidator (Sword Art Online) – MAN AT ARMS

    Kirito's Elucidator (Sword Art Online) – MAN AT ARMS

    The Overlooked Link Between Web Design and Search Success

    The Overlooked Link Between Web Design and Search Success

  • Tech Deals
    ASRock AMD Radeon RX 9070 XT Steel Legend 16GB, Boost Clock Up to 2970 MHz / 20 Gbps,…

    ASRock AMD Radeon RX 9070 XT Steel Legend 16GB, Boost Clock Up to 2970 MHz / 20 Gbps,…

    DUMOS L Shaped Desk Computer Gaming Corner Table 50 Inch Home Office Writing Student…

    DUMOS L Shaped Desk Computer Gaming Corner Table 50 Inch Home Office Writing Student…

    Wired Portable 60% Mechanical Feeling Gaming Keyboard,RGB LED Backlit Compact 68 Keys…

    Wired Portable 60% Mechanical Feeling Gaming Keyboard,RGB LED Backlit Compact 68 Keys…

    Flying Stone Game Set Biseokchigi – Traditional Korean Folk Game – Fun Kit for Family…

    Flying Stone Game Set Biseokchigi – Traditional Korean Folk Game – Fun Kit for Family…

    Avalanche – Retro-2600/2600+/7800/7800+

    Avalanche – Retro-2600/2600+/7800/7800+

    TOSHIBA AC25CEW-BS Large 6-Slice Convection Toaster Oven Countertop, 10-In-One with…

    TOSHIBA AC25CEW-BS Large 6-Slice Convection Toaster Oven Countertop, 10-In-One with…

    Toshiba Canvio Advance 1TB Portable External Hard Drive USB 3.0, Black – HDTCA10XK3AA

    Toshiba Canvio Advance 1TB Portable External Hard Drive USB 3.0, Black – HDTCA10XK3AA

    SanDisk Professional 1TB PRO-Blade SSD Mag – Portable & Modular NVMe SSD Mag,…

    SanDisk Professional 1TB PRO-Blade SSD Mag – Portable & Modular NVMe SSD Mag,…

    Samsung Galaxy A12, Unlocked Smartphone, Android Cell Phone, Multi-Camera System,…

    Samsung Galaxy A12, Unlocked Smartphone, Android Cell Phone, Multi-Camera System,…

  • Techs Got To Eat
    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

  • Tesla
    Coverado Car Seat Covers Full Set, Seat Covers for Cars, Front Seat Covers and Back Seat…

    Coverado Car Seat Covers Full Set, Seat Covers for Cars, Front Seat Covers and Back Seat…

    Pack of 4 Car Floor Mat Clips, Durable Foot Pad Buckle Set, Interior Floor Mat Safety…

    Pack of 4 Car Floor Mat Clips, Durable Foot Pad Buckle Set, Interior Floor Mat Safety…

    Carwiner Center Console Cover for Tesla Model 3 Model Y, PU Leather Armrest Box Cushion…

    Carwiner Center Console Cover for Tesla Model 3 Model Y, PU Leather Armrest Box Cushion…

    Tesla gives up on Cybertruck wireless charging

    DREIEYECAM Dash cam for Tesla Model S AP1 Full HD 1080P WiFi G-Sensor WDR is Auto Video…

    DREIEYECAM Dash cam for Tesla Model S AP1 Full HD 1080P WiFi G-Sensor WDR is Auto Video…

    Car Sun Visor Organizer, Soft Leather Surface Eyeglasses Note Card Holder Car Storage…

    Car Sun Visor Organizer, Soft Leather Surface Eyeglasses Note Card Holder Car Storage…

    Tesla unveils Megablock and Megapack 3: more power and energy deployed faster

    Tesla unveils Megablock and Megapack 3: more power and energy deployed faster

    Center Console Organizer Tray for Tesla Model Y 2024-2020(Not Fit 2024 2025Model Y…

    Center Console Organizer Tray for Tesla Model Y 2024-2020(Not Fit 2024 2025Model Y…

    Tesla employees try to oust Elon, new Volvo, and Micah’s close call

    Tesla market share drops, Mercedes, BMW, and VW drop new EVs

  • UFO
    Mototo 6 PCS 63 Inch Giant Inflatable Alien 31.5 Inch Jumbo Blow Up Alien Green Inflatable Toy for Space Party Decoration UFO Theme Spaceship Party Birthday Halloween Easter Christmas Home

    Mototo 6 PCS 63 Inch Giant Inflatable Alien 31.5 Inch Jumbo Blow Up Alien Green Inflatable Toy for Space Party Decoration UFO Theme Spaceship Party Birthday Halloween Easter Christmas Home

    UFO evidence finally revealed!

    UFO evidence finally revealed!

    Alien Invasion: RPG Idle Space | CrazyLabs

    Alien Invasion: RPG Idle Space | CrazyLabs

    Hangover Terrace

    Hangover Terrace

    Alien Birthday Party Decorations Door Curtain with Foil Fringe Tinsel Spacecraft Flying Saucer Spaceship Hanging Banner for Alien Halloween Party(Fluorescent Yellow)

    Alien Birthday Party Decorations Door Curtain with Foil Fringe Tinsel Spacecraft Flying Saucer Spaceship Hanging Banner for Alien Halloween Party(Fluorescent Yellow)

    #most #famous #encounters of #3types with #extraterrestrial in #history P.1.3 –

    #most #famous #encounters of #3types with #extraterrestrial in #history P.1.3 –

    ANCIENT ALIEN IMAGES FOUND | The Proof Is Out There | #Shorts

    ANCIENT ALIEN IMAGES FOUND | The Proof Is Out There | #Shorts

    #love #truth

    #love #truth

    Flying Saucer UFO Poster Print, Sci-fi Gift, UFO Wall Art, Alien Spacecraft, Area 51 Art, Nerd Geek Gift, Space Art Vintage Paper (11 inch x 14 inch)

    Flying Saucer UFO Poster Print, Sci-fi Gift, UFO Wall Art, Alien Spacecraft, Area 51 Art, Nerd Geek Gift, Space Art Vintage Paper (11 inch x 14 inch)

  • AI
    Artificial Intelligence

    How Yichao “Peak” Ji became a global AI app hitmaker

    Artificial Intelligence

    How Amazon Finance built an AI assistant using Amazon Bedrock and Amazon Kendra to…

    Artificial Intelligence

    5 Reasons Why Vibe Coding Threatens Secure Data App Development

    Artificial Intelligence

    Unlocking the future of professional services: How Proofpoint uses Amazon Q Business

    Artificial Intelligence

    Exploring the Real-Time Race Track with Amazon Nova

    Artificial Intelligence

    Accelerating HPC and AI research in universities with Amazon SageMaker HyperPod

    Artificial Intelligence

    Building the AI-enabled enterprise of the future

    Artificial Intelligence

    From JSON to Dashboard: Visualizing DuckDB Queries in Streamlit with Plotly

    Artificial Intelligence

    The “Super Weight:” How Even a Single Parameter can Determine a Large Language Model’s…

  • Apple
    Spigen’s iPhone 17 Pro Max clear cases give Apple logo space

    Spigen’s iPhone 17 Pro Max clear cases give Apple logo space

    This is Apple’s new Crossbody Strap accessory for iPhone

    This is Apple’s new Crossbody Strap accessory for iPhone

    Apple launches new TechWoven material for iPhone 17 cases

    Apple launches new TechWoven material for iPhone 17 cases

    Apple loses to HP in ACSI personal computer satisfaction survey

    Apple loses to HP in ACSI personal computer satisfaction survey

    Skipping the iPhone 17? This M4 MacBook Pro with 24GB of RAM is just $1,399

    Skipping the iPhone 17? This M4 MacBook Pro with 24GB of RAM is just $1,399

    This one new feature might finally bring me back to the Mac in 2025

    Next year’s MacBook Pro redesign with OLED gets timeline update

    OWC dock brings Thunderbolt 5 & 20GbE speed to Mac & PC

    OWC dock brings Thunderbolt 5 & 20GbE speed to Mac & PC

    Another Plex data breach sees company urge users to change their password

    Another Plex data breach sees company urge users to change their password

    9 ways to use your iPhone’s USB-C port

    9 uses for your iPhone’s USB-C port other than fast charging

  • ComputerWorld
    Intel announces leadership overhaul, underscoring long road to recovery

    Intel announces leadership overhaul, underscoring long road to recovery

    Atlassian exec details the $610M Browser Company acquisition

    Atlassian exec details the $610M Browser Company acquisition

    Uber turns drivers into AI data labelers in India pilot

    Uber turns drivers into AI data labelers in India pilot

    Tech employment is a mixed bag, selective hiring marks a shift

    Tech employment is a mixed bag, selective hiring marks a shift

    Why generative AI projects fail

    Why generative AI projects fail

    Here are the top AI certifications that will get you hired and promoted

    Here are the top AI certifications that will get you hired and promoted

    Relief for European Commission as court upholds EU Data Privacy Framework agreement with…

    Relief for European Commission as court upholds EU Data Privacy Framework agreement with…

    Bill Gates’ early BASIC code for MOS 6502 released as open source

    Bill Gates’ early BASIC code for MOS 6502 released as open source

    Apple may twin with Gemini for AI as iPhone 17 looms

    Apple may twin with Gemini for AI as iPhone 17 looms

  • Gaming
    Maybe release a game in May sometimes? ‘Fixation on the holiday window’ is hurting game publishers, says industry analyst Newzoo

    Maybe release a game in May sometimes? ‘Fixation on the holiday window’ is hurting game publishers, says industry analyst Newzoo

    HUGE FNAF NEWS!! Movie trailer, Security breach DLC, Help wanted VR 2

    HUGE FNAF NEWS!! Movie trailer, Security breach DLC, Help wanted VR 2

    Serve and Protect: Detect 6 Violations | RoboCop Rogue City

    Serve and Protect: Detect 6 Violations | RoboCop Rogue City

    THYMESIA | 16 MINUTES OF GAMEPLAY | [1080P 60 FPS]

    THYMESIA | 16 MINUTES OF GAMEPLAY | [1080P 60 FPS]

    There’s another golden RTX 5090 made of over 1,000x more gold than the first, and I’m pleased to say it’s absolutely hideous

    XFX says its ‘V3’ Radeon RX 9060 XT GPUs with Samsung GDDR6 run much cooler and quieter than previous models with SK Hynix memory

    Starship Troopers Extermination: Last Man Standing

    Starship Troopers Extermination: Last Man Standing

    Watch The PC Gamer Streamer Showdown live today on Twitch

    Watch The PC Gamer Streamer Showdown live today on Twitch

    As Dusk Falls Pt.2: WHO THE F IS BRUCE?!

    As Dusk Falls Pt.2: WHO THE F IS BRUCE?!

    Intel reshuffle puts engineering and ‘a new custom silicon business’ in the spotlight but also ends a 30-year career at Intel for Product CEO Michelle Johnston Holthaus

    Intel reshuffle puts engineering and ‘a new custom silicon business’ in the spotlight but also ends a 30-year career at Intel for Product CEO Michelle Johnston Holthaus

  • Retro Rewind
    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

  • Tech Art
    SUNY New Paltz Presents “Composium,” a Series of Events Exploring Sustainability in the Arts

    SUNY New Paltz Presents “Composium,” a Series of Events Exploring Sustainability in the Arts

    Color Theory Basics for Digital Painters

    Color Theory Basics for Digital Painters

    3D Cube design in Illusion – 3D Optical Illusion Explained in illustrator 2025

    3D Cube design in Illusion – 3D Optical Illusion Explained in illustrator 2025

    Don’t make these shading mistakes

    Don’t make these shading mistakes

    AR Car Showroom App Review – Augmented Reality Vehicle Showcase

    AR Car Showroom App Review – Augmented Reality Vehicle Showcase

    Infinite design tutorial (vector art) step by step | ultimate focus tamil

    Infinite design tutorial (vector art) step by step | ultimate focus tamil

    (877) Awesome Peach and Gold Spray Paint Mixed Media Pour

    (877) Awesome Peach and Gold Spray Paint Mixed Media Pour

    Kirito's Elucidator (Sword Art Online) – MAN AT ARMS

    Kirito's Elucidator (Sword Art Online) – MAN AT ARMS

    The Overlooked Link Between Web Design and Search Success

    The Overlooked Link Between Web Design and Search Success

  • Tech Deals
    ASRock AMD Radeon RX 9070 XT Steel Legend 16GB, Boost Clock Up to 2970 MHz / 20 Gbps,…

    ASRock AMD Radeon RX 9070 XT Steel Legend 16GB, Boost Clock Up to 2970 MHz / 20 Gbps,…

    DUMOS L Shaped Desk Computer Gaming Corner Table 50 Inch Home Office Writing Student…

    DUMOS L Shaped Desk Computer Gaming Corner Table 50 Inch Home Office Writing Student…

    Wired Portable 60% Mechanical Feeling Gaming Keyboard,RGB LED Backlit Compact 68 Keys…

    Wired Portable 60% Mechanical Feeling Gaming Keyboard,RGB LED Backlit Compact 68 Keys…

    Flying Stone Game Set Biseokchigi – Traditional Korean Folk Game – Fun Kit for Family…

    Flying Stone Game Set Biseokchigi – Traditional Korean Folk Game – Fun Kit for Family…

    Avalanche – Retro-2600/2600+/7800/7800+

    Avalanche – Retro-2600/2600+/7800/7800+

    TOSHIBA AC25CEW-BS Large 6-Slice Convection Toaster Oven Countertop, 10-In-One with…

    TOSHIBA AC25CEW-BS Large 6-Slice Convection Toaster Oven Countertop, 10-In-One with…

    Toshiba Canvio Advance 1TB Portable External Hard Drive USB 3.0, Black – HDTCA10XK3AA

    Toshiba Canvio Advance 1TB Portable External Hard Drive USB 3.0, Black – HDTCA10XK3AA

    SanDisk Professional 1TB PRO-Blade SSD Mag – Portable & Modular NVMe SSD Mag,…

    SanDisk Professional 1TB PRO-Blade SSD Mag – Portable & Modular NVMe SSD Mag,…

    Samsung Galaxy A12, Unlocked Smartphone, Android Cell Phone, Multi-Camera System,…

    Samsung Galaxy A12, Unlocked Smartphone, Android Cell Phone, Multi-Camera System,…

  • Techs Got To Eat
    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

  • Tesla
    Coverado Car Seat Covers Full Set, Seat Covers for Cars, Front Seat Covers and Back Seat…

    Coverado Car Seat Covers Full Set, Seat Covers for Cars, Front Seat Covers and Back Seat…

    Pack of 4 Car Floor Mat Clips, Durable Foot Pad Buckle Set, Interior Floor Mat Safety…

    Pack of 4 Car Floor Mat Clips, Durable Foot Pad Buckle Set, Interior Floor Mat Safety…

    Carwiner Center Console Cover for Tesla Model 3 Model Y, PU Leather Armrest Box Cushion…

    Carwiner Center Console Cover for Tesla Model 3 Model Y, PU Leather Armrest Box Cushion…

    Tesla gives up on Cybertruck wireless charging

    DREIEYECAM Dash cam for Tesla Model S AP1 Full HD 1080P WiFi G-Sensor WDR is Auto Video…

    DREIEYECAM Dash cam for Tesla Model S AP1 Full HD 1080P WiFi G-Sensor WDR is Auto Video…

    Car Sun Visor Organizer, Soft Leather Surface Eyeglasses Note Card Holder Car Storage…

    Car Sun Visor Organizer, Soft Leather Surface Eyeglasses Note Card Holder Car Storage…

    Tesla unveils Megablock and Megapack 3: more power and energy deployed faster

    Tesla unveils Megablock and Megapack 3: more power and energy deployed faster

    Center Console Organizer Tray for Tesla Model Y 2024-2020(Not Fit 2024 2025Model Y…

    Center Console Organizer Tray for Tesla Model Y 2024-2020(Not Fit 2024 2025Model Y…

    Tesla employees try to oust Elon, new Volvo, and Micah’s close call

    Tesla market share drops, Mercedes, BMW, and VW drop new EVs

  • UFO
    Mototo 6 PCS 63 Inch Giant Inflatable Alien 31.5 Inch Jumbo Blow Up Alien Green Inflatable Toy for Space Party Decoration UFO Theme Spaceship Party Birthday Halloween Easter Christmas Home

    Mototo 6 PCS 63 Inch Giant Inflatable Alien 31.5 Inch Jumbo Blow Up Alien Green Inflatable Toy for Space Party Decoration UFO Theme Spaceship Party Birthday Halloween Easter Christmas Home

    UFO evidence finally revealed!

    UFO evidence finally revealed!

    Alien Invasion: RPG Idle Space | CrazyLabs

    Alien Invasion: RPG Idle Space | CrazyLabs

    Hangover Terrace

    Hangover Terrace

    Alien Birthday Party Decorations Door Curtain with Foil Fringe Tinsel Spacecraft Flying Saucer Spaceship Hanging Banner for Alien Halloween Party(Fluorescent Yellow)

    Alien Birthday Party Decorations Door Curtain with Foil Fringe Tinsel Spacecraft Flying Saucer Spaceship Hanging Banner for Alien Halloween Party(Fluorescent Yellow)

    #most #famous #encounters of #3types with #extraterrestrial in #history P.1.3 –

    #most #famous #encounters of #3types with #extraterrestrial in #history P.1.3 –

    ANCIENT ALIEN IMAGES FOUND | The Proof Is Out There | #Shorts

    ANCIENT ALIEN IMAGES FOUND | The Proof Is Out There | #Shorts

    #love #truth

    #love #truth

    Flying Saucer UFO Poster Print, Sci-fi Gift, UFO Wall Art, Alien Spacecraft, Area 51 Art, Nerd Geek Gift, Space Art Vintage Paper (11 inch x 14 inch)

    Flying Saucer UFO Poster Print, Sci-fi Gift, UFO Wall Art, Alien Spacecraft, Area 51 Art, Nerd Geek Gift, Space Art Vintage Paper (11 inch x 14 inch)

No Result
View All Result
Techcratic
No Result
View All Result
Home Hacker News

Computer Scientists Figure Out How To Prove Lies

Hacker News by Hacker News
July 10, 2025
in Hacker News
Reading Time: 14 mins read
129
A A
0

2025-07-10 05:48:00
www.quantamagazine.org

Randomness is a source of power. From the coin toss that decides which team gets the ball to the random keys that secure online interactions, randomness lets us make choices that are fair and impossible to predict.

But in many computing applications, suitable randomness can be hard to generate. So instead, programmers often rely on things called hash functions, which swirl data around and extract some small portion in a way that looks random. For decades, many computer scientists have presumed that for practical purposes, the outputs of good hash functions are generally indistinguishable from genuine randomness — an assumption they call the random oracle model.

“It’s hard to find today a cryptographic application… whose security analysis does not use this methodology,” said Ran Canetti of Boston University.

Now, a new paper has shaken that bedrock assumption. It demonstrates a method for tricking a commercially available proof system into certifying false statements, even though the system is demonstrably secure if you accept the random oracle model. Proof systems related to this one are essential for the blockchains that record cryptocurrency transactions, where they are used to certify computations performed by outside servers.

There’s “a lot of money relying on this stuff,” said Eylon Yogev of Bar-Ilan University in Israel. For blockchain proof protocols, “there’s a huge motivation for attackers to break the security of the system.”

In the new paper — by Dmitry Khovratovich of the Ethereum Foundation, Ron Rothblum of the zero-knowledge proof technology company Succinct and the Technion in Haifa, Israel, and Lev Soukhanov of the blockchain-focused start-up [[alloc] init] — the researchers are able to prove lies no matter which hash function is used to generate the “randomness” the proof system relies upon.

When Yogev heard about the team’s result, he said, “I had the feeling that someone is pulling the carpet from under my feet.” He and others have been working to patch up these vulnerabilities. But “it’s far from being a solved issue,” he said.

More broadly, the new result is forcing a reckoning about the random oracle model. “This is a time to rethink,” Canetti said.

A Mathematical Blender

A host of different computing applications — from cryptocurrencies to cloud computing — involve convincing a bunch of strangers on the internet that you’ve performed a computation correctly. The new paper shows how to hijack a fundamental technique that enables people to certify such computations. The technique, called the Fiat-Shamir transformation, is useful not just in blockchains and cloud computing but also in many other cryptographic applications, such as the key exchanges that safeguard web transactions and encrypt text messages. It’s so ubiquitous that it has become a verb, as in “Let’s Fiat-Shamir this.”

Ron Rothblum, a computer scientist, wearing a dark blue shirt and smiling at the camera.

Ron Rothblum, together with Dmitry Khovratovich and Lev Soukhanov, have upended the prevailing thinking on a fundamental proof technique.

The Fiat-Shamir transformation is used in settings where you can verify a computation by inspecting it in random spots. For instance, if a professor has assigned 100 problems for homework but doesn’t want to grade a student’s entire assignment, she can randomly choose 10 problems to grade. In the language of computer scientists, she is making 10 “random challenges” to the student’s homework. If the answers to those 10 problems are correct, the professor can feel confident that most of the other answers are correct too. (There are ways to modify this setup if she wants to be convinced that the student got every single problem right, not just most of them.)

This particular scenario would probably play out on the professor’s desk. But since the Fiat-Shamir transformation is about convincing a bunch of distant strangers, let’s instead imagine that the student wants to prove the correctness of his homework not just to the professor, but to an entire auditorium full of people.

Imagine that the student starts by “turning in” his assignment by locking each of his answers in a separate box. Next, the professor picks 10 numbers out of a hat to determine her 10 random challenges. The student unlocks those 10 boxes, and the professor grades the contents. Since the student locked up his answers before knowing what the random challenges would be, the professor can feel confident that the problems she is grading are representative of his homework as a whole.

But people in the audience might question whether they’ve witnessed a legitimate process. For all they know, the student may have bribed the professor to put only certain numbers into the hat, instead of all the numbers from 1 to 100. Or maybe the professor failed to notice trapdoors in the locked boxes, and the student had an accomplice behind the scenes who was hastily solving problems and slipping the solutions into the right boxes before they got opened.

You might suppose that to be truly convinced, each audience member would have to carry out their own interaction with the student. But computer scientists have figured out how the student can satisfy the audience members’ concerns using hash functions.

A hash function is like a mathematical blender — it swirls a bunch of data around according to some chosen set of operations, then outputs a small portion of the resulting smoothie. For cryptographic purposes, a hash function has two attractive properties. First, it outputs random-seeming gibberish with no apparent correlation to the input that produced it. And second, a hash function is easy to perform, but hard to reverse. If someone shows you an output, it’s virtually impossible to find an input that would have produced it.

Many programmers assumed that no real-world protocol could be susceptible to such an attack.

In the homework example, the student can reassure the audience that the boxes don’t have trapdoors by “locking” the boxes with a hash function instead of a physical key. To do so, the student hashes each of his 100 answers and posts the result of each hash on the lid of the appropriate box. Computer scientists call these posts the student’s “commitment.” Now if an accomplice tries to change the contents of the box after the fact, the altered contents will not agree with the commitment — something audience members can easily check for themselves.

In 1986, Amos Fiat and Adi Shamir proposed a way to use hash functions to address the audience’s other concern: that the student might have bribed the professor to pick certain boxes. In the Fiat-Shamir protocol, instead of picking numbers out of a hat, the professor uses the hash function to generate the random challenges. She starts by throwing the student’s commitment back into the blender to get new gibberish. Then she uses some previously agreed-upon formula to convert that gibberish into a number from 1 to 100. This number dictates which box she opens first. She then repeats the process: She throws both the commitment and the answer from that first box into the blender to choose the second box to open, and so on.

This approach accomplishes something remarkable: It eliminates the need for the back-and-forth between the student and the professor (or any audience member). The student can use the hash function to generate the random challenges himself. Anyone in the audience can satisfy themselves that the student did this correctly.

By turning interactive proofs into noninteractive ones, the Fiat-Shamir transformation enabled computers to generate proofs that anyone could inspect at any time, without needing to interact with the prover. Soon, it was being used everywhere. But was it secure, or could an attacker somehow use it to convince people of a false statement?

Proving Lies

In 1996, David Pointcheval and Jacques Stern proved that Fiat-Shamir is secure in the random oracle model — that is, if you assume that the hash function is an idealized source of pure randomness. But real hash functions are not truly random. Researchers worried that a clever attacker might be able to break Fiat-Shamir by exploiting the details of what a particular hash function was doing.

Eylon Yogev, a computer scientist, wearing a mid blue T-shirt and smiling at the camera.

When Eylon Yogev heard about the new paper, he said, “I had the feeling that someone is pulling the carpet from under my feet.”

In the early 2000s, computer scientists showed how to do just that, contriving interactive proof protocols that were specifically designed to fail when they underwent Fiat-Shamir. But “nobody in their right mind would design a protocol this way,” Canetti said. Many programmers assumed that no real-world protocol could be susceptible to such an attack, and they continued to integrate the Fiat-Shamir transformation into the foundations of how people exchange information over the internet. It was “a leap of faith,” Canetti said.

Some computer scientists had serious reservations about this leap of faith. Ron Rothblum, for one, had long been trying to attack some real-world protocol. Then one day last October, he received a surprising email from a blockchain organization called the Ethereum Foundation, which hosts a widely used cryptocurrency called ether.

The blockchains that underlie cryptocurrencies have an unfortunate but inescapable feature: They run incredibly slowly. To handle heavy traffic from financial transactions, a blockchain must offload most computations to outside computers. It can’t assume that those computers are trustworthy, so it requires them to provide Fiat-Shamir proofs that their computations are valid. If someone could use Fiat-Shamir to “prove” a false statement such as “Person A sent Person B a million dollars,” the whole system would come crashing down.

It’s a fantastic result. There’s definitely broad agreement about that.

Justin Thaler

Since so much rides on these proofs, the Ethereum Foundation decided to test their security by offering a bounty to anyone who could attack Fiat-Shamir for any proof protocol of their choice, using a popular hash function called Poseidon. Before announcing the bounty, the foundation invited Rothblum to review a draft of its announcement.

Rothblum’s reaction was that the foundation had phrased things too loosely. After all, cryptographers have known for decades about contrived proof protocols that are vulnerable to attack, no matter which hash function you use. When he shared his thoughts with Ethereum’s cryptographers, he was startled to learn that they were unfamiliar with this work. Rothblum began collaborating with Khovratovich and Soukhanov (who worked at Ethereum at the time) to explore more deeply.

Soukhanov had the idea to target a Fiat-Shamir proof system based on something called the GKR protocol, co-developed by Rothblum’s brother Guy Rothblum — the “R” in “GKR.” This is a protocol for proving that a computer program produces a certain output when given a secret input that only the prover knows. For example, if you had a homework grading program, a student could use this protocol to prove the statement “I have a set of homework answers that, when I input them into the grading program, make the program produce the output ‘correct.’” As long as the grading program is one that you approve of, you can then feel confident that the student did the homework correctly.

To verify such a claim, the GKR protocol (as it’s used today) starts by hashing the program itself to form the commitment. That way, the person making the claim can’t surreptitiously switch to a different program later on. Next, the protocol does further hashes to come up with random challenges — steps in the program’s execution that the protocol inspects.

But as the researchers showed, this protocol has an Achilles’ heel.

They were able to come up with a malicious program that, if presented with its own hash as the secret input, could compute the random challenges and then arrange its internal workings so the spots being challenged would pass inspection. The verifier would see no reason to doubt that the program really did output what the prover claimed, even though it did not.

What’s more, the researchers showed how to embed this malicious program in any task. For example, if you want to falsely prove that you possess correct answers to a homework assignment, you can replace the homework-grading program with a new one that contains the malicious program. The new program is still a valid grading program — it produces exactly the same grades as the original grading program. But you can nevertheless feed this program a set of incorrect homework answers and then use the GKR protocol to convince people that the program outputted “correct” when it really outputted “incorrect.”

“It’s a fantastic result,” said Justin Thaler of Georgetown University and the venture capital firm Andreessen Horowitz. “There’s definitely broad agreement about that.”

A Leaking Boat

A company called Polyhedra offers a version of the proof system that the researchers attacked under the name Expander. When the researchers were getting ready to post their paper online in late January, they notified Polyhedra. The researchers had suggested a modification to Fiat-Shamir to mitigate the attack in their paper, and Polyhedra quickly used it to put out a patch.

Gal Arnon, a computer scientist, is wearing a purple T-shirt and blue denim shorts, and is sitting on a wooden bench with plants in the background.

Gal Arnon has been working with Eylon Yogev to come up a way to defend against the new attack.

The Simons Institute for the Theory of Computing

A month later, Yogev and Gal Arnon, a researcher at the Simons Institute for the Theory of Computing, came up with another way to modify Fiat-Shamir to defend against the new attack. Both of these modifications used the fact that the malicious program must contain the code for the hash function so it can compute the challenges. The modified versions of Fiat-Shamir require that the program being checked be less complex than the hash, so that they cannot include the malicious program. “That’s allowed us to break the cycle,” Yogev said.

But not all applications may be amenable to such a requirement. What’s more, even if some applications switch to a modified version of Fiat-Shamir, “the fact that the current attack doesn’t work doesn’t mean that there isn’t another attack,” Rothblum said. This “leaves us very unhappy as cryptographers.”

In the near term, Thaler is more worried about potential bugs in Fiat-Shamir implementations than about the new attack. Programs containing the malicious one are unlikely to be chosen for real-world applications, he said, since other programs would likely be more efficient.

Nevertheless, he said, if researchers don’t achieve some sort of clarity about how dangerous the new attack is, “I won’t sleep well at night.”

Other researchers are even more concerned. It’s common, Canetti noted, for programmers to modify computer code to make it work on different operating systems. Complex code can be difficult to audit, so an attacker might be able to slip in the malicious code undetected. “I think it’s probably a pretty serious attack,” he said.

Yogev agrees. “Once you’ve found a hole, then you know the boat is leaking and it’s going to sink soon,” he said. “I don’t think their attack was very limited — I believe it could be easily used to actually steal money.”

Even if that outcome doesn’t come to pass, the attack has shaken cryptographers’ confidence in the Fiat-Shamir protocol, and the random oracle model more generally. “Maybe it’s time to rethink and revise many other things we think we’ve proven,” Canetti said. When you take a leap of faith, you never know where you’re going to land.

Editor’s note: Gal Arnon’s research is supported by the Simons Foundation.

Source Link


Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.

Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!


Unlock unlimited streaming with a free Amazon Prime trial!
Sign up today!

Help Power Techcratic’s Future – Scan To Support

If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.

As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!

BITCOIN

Bitcoin Logo

Bitcoin QR Code

bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge

Scan the QR code with your crypto wallet app

DOGECOIN

Dogecoin Logo

Dogecoin QR Code

D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA

Scan the QR code with your crypto wallet app

ETHEREUM

Ethereum Logo

Ethereum QR Code

0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a

Scan the QR code with your crypto wallet app

Please read the Privacy and Security Disclaimer on how Techcratic handles your support.

Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.

Tags: Hacker News
Share162Share28ShareShare4ShareTweet101
Hacker News

Hacker News

Stay updated with Hacker News, where technology meets entrepreneurial spirit. Get the latest on tech trends, startup news, and discussions from the tech community. Read the latest updates here at Techcratic.

Related Posts

twitter/the-algorithm: Source code for the X Recommendation Algorithm
Hacker News

twitter/the-algorithm: Source code for the X Recommendation Algorithm

September 9, 2025
1.3k
Microsoft to Add New AI-Powered Actions in File Explorer
Hacker News

Microsoft to Add New AI-Powered Actions in File Explorer

September 9, 2025
1.3k
Data from Police Body Camera Apps Routed to Chinese Cloud Servers Over TLS Port 9091
Hacker News

Data from Police Body Camera Apps Routed to Chinese Cloud Servers Over TLS Port 9091

September 9, 2025
1.3k
New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability
Hacker News

New Exploitation Method Discovered for Linux Kernel Use-After-Free Vulnerability

September 9, 2025
1.3k
MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems
Hacker News

MostereRAT Exploits AnyDesk and TightVNC for Remote Access on Windows Systems

September 9, 2025
1.3k
Strong Eventual Consistency – The Big Idea behind CRDTs
Hacker News

Strong Eventual Consistency – The Big Idea behind CRDTs

September 9, 2025
1.3k
Setting up a home VPN server with Wireguard
Hacker News

Setting up a home VPN server with Wireguard

September 8, 2025
1.3k
npm debug and chalk packages compromised
Hacker News

npm debug and chalk packages compromised

September 8, 2025
1.3k
Load More
Next Post
The Google TV Streamer 4K drops to $84 for Prime Day

The Google TV Streamer 4K drops to $84

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Tech Resources

  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Forbes
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo
  • Google News
  • Hacker News
  • Harvard Tech
  • I Like Cats ™
  • I Like Dogs ™
  • LifeHacker
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • PC World
  • Photofocus
  • Physics
  • Random Tech
  • Retro Rewind ™
  • Robot Report
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Art
  • Tech Careers
  • Tech Deals
  • Techcratic ™
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Tech News

  • 30 Second Tech ™
  • AI
  • Apple Insider
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo

Tech News

  • Harvard Tech
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • Physics
  • PC World
  • Random Tech
  • Retro Rewind ™
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Careers

Tech News​

  • Tech Art
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Site Links

  • About Techcratic
  • Affiliate Disclaimer
  • Affiliate Link Policy
  • Contact Techcratic
  • Dealors Discount Store
  • Privacy and Security Disclaimer
  • Privacy Policy
  • RSS Feed
  • Site Map
  • Support Techcratic
  • Techcratic
  • Tech Deals
  • TOS
  • 𝕏
Click For A Secret Deal

Apple Makes Bold Claim For New A19 Pro Chip in iPhone Air and 17 Pro

Waymo vehicles spotted on the road as testing starts in Seattle area – GeekWire

Maybe release a game in May sometimes? ‘Fixation on the holiday window’ is hurting game publishers, says industry analyst Newzoo

Apple announces iPhone 17 with ProMotion display and upgraded selfie cam

iPhone Air vs iPhone 17: What’s the difference?

Enterprise security threats will be key focus at Fal.Con

Techcratic – Your All In One Tech Hub
© 2020 – 2025
All Rights Reserved
∞

No Result
View All Result
  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Gaming
  • I Like Cats ™
  • I Like Dogs ™
  • MacRumors
  • Macworld
  • Tech Deals
  • Techcratic ™
  • Techs Got To Eat ™
  • Tesla
  • UFO
  • Wired