Tuesday, April 29, 2025

Polaris of Enlightenment

Ad:

China activates world’s first thorium reactor

Published today 7:22
– By Editorial Staff
The thorium reactor in the Chinese Gobi Desert.

Chinese researchers have succeeded for the first time in refueling a working thorium molten salt reactor. This is described as a technical breakthrough that could have a major impact on the future of nuclear power.

At a closed meeting on April 8 at the Chinese Academy of Sciences (CAS), the project’s chief researcher, Xu Hongjie, announced that the team had successfully loaded thorium fuel into an active reactor without interrupting operation. According to Chinese media, the experimental reactor is located in the Gobi Desert and produces two megawatts of thermal energy.

– We now lead the global frontier, Xu boasted at the meeting, comparing China’s progress to a classic fable: “Rabbits sometimes make mistakes or grow lazy. That’s when the tortoise seizes its chance”.

The reactor uses molten salt to transport the fuel and manage heat, while thorium serves as the radioactive fuel.

Thorium – a safer and cleaner alternative

Thorium is widely considered to have significant advantages over uranium: greater availability in the earth’s crust, less long-lived waste, and a lower risk of weapons proliferation. Combined with molten salt technology, which allows operation at atmospheric pressure and natural limitation of overheating, safety is further improved.

Xu pointed out that American researchers developed early molten salt reactors in the 1960s, but that these projects were abandoned.

– The US left its research publicly available, waiting for the right successor – we were that successor.

Thorium-powered container ships

Work at CAS began in 2018, and the research team grew to over 400 people. The reactor reached criticality in October 2023, full operating power in June 2024, and four months later successfully completed refueling during operation.

We chose the hardest path, but the right one, said Xu, pointing out the symbolism of the timing: exactly 57 years after China’s first hydrogen bomb test.

China is now building a larger thorium reactor, which is scheduled to reach criticality in 2030, and is developing thorium-powered container ships for future emission-free transport.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

British scientists start outdoor geoengineering experiments

The exaggerated climate crisis

Published 27 April 2025
– By Editorial Staff
The UK government supports research and experiments on blocking the sun.

According to reports, British researchers are planning small-scale outdoor experiments with the controversial technology of geoengineering as part of a new government research program worth over £50 million. Critics warn of the risks and want to see a temporary halt to the plans.

The program, led by the Advanced Research and Invention Agency (Aria), aims to investigate techniques for blocking sunlight and thus slowing down alleged climate change, according to reports in The Guardian, among others.

The technology, which involves spraying reflective particles into the atmosphere or enhancing cloud formation with seawater spray, is intended, according to its proponents, to temporarily lower the Earth’s surface temperatures.

Professor Mark Symes, program manager at Aria, says there is considerable interest in cooling the Earth.

– The uncomfortable truth is that our current warming trajectory makes a number of such tipping points distinctly possible over the next century. This has driven increased interest in approaches that might actively cool the world in a short timeframe in order to avoid those tipping points, says Mark Symes.

Proponents of geoengineering argue that the technology could act as an emergency brake if climate change threatens to reach what are considered irreversible levels.

Aria emphasizes that the experiments will be carefully controlled and designed to provide the necessary data on the possibilities and risks.

Critics, however, warn that the initiative, which is supported by Bill Gates, among others, could divert attention from the alleged need to reduce carbon dioxide emissions.

Dangerous distraction

Senior scientists have called the project a dangerous distraction, comparing the technology to treating cancer with aspirin.

However, Aria insists that the trials do not release any toxic substances and promises to consult with the local community and carry out environmental impact assessments before each test.

In parallel with Aria’s program, the UK’s National Environment Research Council (NERC) has launched a £10 million project to analyze the effects of geoengineering, but without conducting new field experiments.

Dr. Sebastian Eastham at Imperial College London, one of the researchers involved in the NERC project, emphasizes the importance of international cooperation.

We know that SRM, or even the prospect of SRM, would affect international relations – this is a serious research question.

Geoengineering remains a controversial field of research. There is currently no global agreement on regulation, and critical experts are calling for a moratorium on large-scale interventions in the Earth’s atmosphere.

Google develops AI to communicate with dolphins

The future of AI

Published 26 April 2025
– By Editorial Staff

Google has developed a new AI model to communicate with dolphins. The AI model, named DolphinGemma, is designed to interpret and recreate dolphins’ complex sound signals.

Dolphins are known as some of the world’s most communicative animals, and their social interactions are so advanced that researchers at the Wild Dolphin Project (WDP) have spent over 40 years studying them.

In particular, a dolphin population in the Bahamas has been documented for decades through audio recordings and video footage, where researchers have been able to link specific sounds to behaviors such as mating rituals, conflicts, and even individual names.

The ability to communicate with dolphins has long fascinated researchers, but until now the technology to analyze and mimic their sounds has been lacking. However, breakthroughs in AI language models have raised new hopes, and a collaboration between Google, Georgia Institute of Technology and WDP has produced DolphinGemma.

The goal: Common vocabulary between humans and animals

The model is based on the same technology as Google’s Gemini system and works basically like a language model – similar to ChatGPT – but trained for dolphin sounds. It receives whistles, clicks and pulses, analyzes them and predicts what is likely to come next. In practice, it connects to a CHAT system installed on modified Google Pixel phones.

The aim of the project is not to translate the dolphins’ language in its entirety, but rather to establish a basic common vocabulary between humans and animals. In the coming months, the model will be tested in the field, where researchers will try to teach the dolphins synthetic whistles linked to their favorite objects, such as seagrass and seaweed. Specifically, the ambition is for the dolphins themselves to be able to “ask for” what they want to play with, reports Popular Science.

 

The most dangerous thing in your browser

The dark side of browser extensions.

Published 26 April 2025
– By Naomi Brockwell
You’re browsing the web, trying to make life a little easier. Maybe you install an extension to block annoying popups, write better emails, or even just save a few bucks with coupon codes.

Seems harmless, right?

Extensions are way more permissive and dangerous than people realize.

They might be spying on you, logging your browsing history, injecting malicious code, even stealing your passwords and cookies – all without you even realizing it.

Let’s talk about the dark side of browser extensions. Because once you see what they’re capable of, you might think twice before installing another one.

Real-world attacks: From spyware to crypto theft

This isn’t a “worst-case scenario”. It’s already happening.

  • North Korean hackers have used malicious browser extensions to spy on inboxes and exfiltrate sensitive emails.
  • The DataSpii scandal exposed the private data of over 4 million users—collected and sold by innocent-looking productivity tools.
  • Mega.nz, a privacy-respecting file storage service, had its Chrome extension hacked. Malicious code was pushed to users, silently stealing passwords and crypto wallet keys. It took them four hours to catch it—more than enough time for real damage.
  • Cyberhaven, a cybersecurity company, was breached in late 2024. Their extension was hijacked and used to scrape cookies, session tokens, and authentication credentials—compromising over 400,000 users.

How is this even allowed to happen?

  1. Extensions can silently update themselves. The code running on your device can change at any time—without your knowledge or approval.
  2. Permissions are ridiculously broad. Even if a malicious extension has the same permissions as a good one, it can abuse them in ways the browser can’t distinguish. Once you grant access, it’s basically an honor system.
  3. Extensions can’t monitor each other. If you think that installing a malware-blocking extension is going to protect you, think again. Your defense extensions have no way of knowing what your other extensions are up to. Malicious ones can lurk undetected, even alongside security tools.

A Shadow market for extensions

Extensions aren’t just targets for hackers—they’re targets for buyers. Once an extension gets popular, developers often start getting flooded with offers to sell. And because extensions can silently update, a change in ownership can mean a complete change in behavior—without you ever knowing.

Got an extension with 2 million Facebook users? Buy it, slip in some malicious code, and suddenly you’re siphoning data from 2 million people.

There are entire marketplaces for buying and selling browser extensions—and a thriving underground market too.

Take The Great Suspender, for example. It started as a widely trusted tool that saved memory by suspending unused tabs. Then the developer quietly sold it. The new owner injected spyware, turning it into a surveillance tool. Millions of users were compromised before it was finally flagged and removed.

The danger is in the permissions

One of the biggest challenges? Malicious extensions often ask for the same permissions as good ones. So it’s helpful to understand exactly what each permission is capable of, so that you realize how vulnerable it could make you in the wrong hands.

We spoke to Matt Frisbie, author of Building Browser Extensions, to explain the capabilities of some of these permissions:

Browsing history

Matt Frisbie:

The browser will happily dump out your history as an array.

The browsing history permission grants full access to every site you visit—URLs, timestamps, and frequency. This can help build out a detailed profile on you.

Cookies

The cookie permission exposes your browser’s cookies—including authentication tokens. That means a malicious extension can impersonate you and access your accounts without needing a password or 2FA.

Matt Frisbie:

“If someone steals your cookies, they can pretend to be you in all sorts of nasty ways.”

This is exactly how Linus Tech Tips had their YouTube account hijacked.

Screen capture

Allows extensions to take screenshots of what you’re viewing. Some types trigger a popup, but tab capture does not—it silently records the visible browser tab, even sensitive pages like banking or crypto dashboards.

Matt Frisbie:

“It just takes a screengrab and sends it off, and you will never know what’s happening.”

Web requests

This lets the extension monitor all your browser’s traffic, including data sent to and from websites. Even if the data is being sent over HTTPS, to the extension it’s all in the clear. They can read form data, credit card details, everything.

Matt Frisbie:

“It’s basically a man-in-the-middle… I can see what you’re sending to stripe.com—even if their security is immaculate.”

Web navigation

Provides a live feed of your browsing behavior—what pages you visit, how you get there, and when.

Keystroke logging

Records everything you type—searches, passwords, messages—without needing any special permissions. All it takes is a content script, which runs invisibly on websites.

Matt Frisbie:

“It’s incredibly dangerous and very easy to do.”

Input capture

Watches for changes in form fields, allowing extensions to steal autofilled passwords or credit card numbers—even if you don’t type anything.

Matt Frisbie:

“Anytime an input changes—login box, search bar, credit card entry—this extension can capture what’s changed.”

Geolocation

Extensions can’t access your location in the background. But they can render a user interface—like a popup window—and collect your location when you interact with it. If you’ve granted the extension geolocation permission, it can capture your location every time you open that popup.

Even sneakier? Extensions can piggyback off websites that already have location access. If you’ve allowed a site like maps.google.com or hulu.com to use your location, an extension running on that site can silently grab it—no popup required.

Matt Frisbie:

“If the user goes to maps.google.com and they’ve previously said maps.google.com can read my location… then the extension can piggyback on that and grab their location. No pop-ups generated.”

Other Piggybacking

If you’ve granted a site permission—like location, notifications, or potentially even camera and microphone—an extension running on that same site can sometimes piggyback off that access and silently collect the same data.

Matt Frisbie:

“It is actually possible to piggyback off the page’s permissions. … It really shouldn’t work that way.”

So… How Do You Protect Yourself?

Here are some smart rules to follow:

  • Understand permissions
    Know what you’re granting access to, and what that permission might be capable of.
  • Be careful granting any permissions
    Whether it’s a browser setting, a site request, or an extension prompt, even a single permission can open the door to surveillance.
  • Use extensions sparingly
    The more extensions you install, the larger your attack surface—and the more unique your browser fingerprint becomes.
  • Use a privacy-first browser instead
    Browsers like Brave build privacy protections—like ad and tracker blocking—directly into the browser itself, so you don’t need extensions just to stay private.
  • Follow the principle of least privilege
    Only allow an extension to run when you click it, instead of “on all websites.”
  • Use code review tools
    Sites like Extension Total and Secure Annex can help you vet extensions before you install them.

Takeaway

We all want our browser to be faster, cleaner, and more functional. Extensions can help—but they can also turn into powerful surveillance tools. Even a single line of malicious code, slipped in through an update or new owner, can put your most sensitive information at risk.

So before you install that next extension, ask yourself:
Do I really trust this extension not to be hacked, sold, or misused—and is the extra risk worth it?

Stay sharp. Stay private. Stay safe out there.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Youtube.

ChatGPT search sees rapid growth in Europe

Published 23 April 2025
– By Editorial Staff
Today, the service has over 41 million monthly active users.

The use of ChatGPT’s search service has increased significantly in Europe over the past six months. This rapid growth also means that the service may now be subject to strict EU rules for digital platforms.

From November 2024 to March 2025, Open AI’s Chat GPT Search service had an average of 41.3 million monthly active users, according to the company’s data. In the previous six months, the service had 11.2 million active users, reports Techcrunch.

Due to the growth in users, the service may soon be subject to the EU Digital Services Act, which imposes specific requirements on platforms with over 45 million active users. It regulates many aspects of online services in European countries and could mean greater transparency requirements, the ability to turn off recommendation systems and profiling, sharing certain data with researchers and authorities.

Platforms that do not comply with DSA rules can be fined up to 6% of their global turnover. A platform that continuously refuses to comply with the rules can have its operations suspended in the EU.

Despite its growth, Google remains number one in the search market, handling an estimated 373 times more searches than ChatGPT.

Our independent journalism needs your support!
We appreciate all of your donations to keep us alive and running.

Our independent journalism needs your support!
Consider a donation.

You can donate any amount of your choosing, one-time payment or even monthly.
We appreciate all of your donations to keep us alive and running.

Dont miss another article!

Sign up for our newsletter today!

Take part of uncensored news – free from industry interests and political correctness from the Polaris of Enlightenment – every week.