Praloy Rakshit
Stories (6)
Filter by community
Microsoft Issues June 1 Warning — Do Not Wait, Save Your Passwords Now
**Microsoft Issues a Warning on June 1: Save Your Passwords Right Away** Microsoft has issued a clear warning in a significant alert that has caught the attention of both users and IT professionals: **"Do not wait." Right now, save your passwords. This message comes ahead of a crucial deadline—June 1, 2025—when a number of authentication methods and account access protocols are expected to change, potentially preventing users who aren't prepared from accessing their accounts. This alert is connected to Microsoft's ongoing effort to improve digital security and lessen reliance on conventional passwords, which are frequently the most vulnerable component of cybersecurity. Let’s break down what this means, why it’s important, and what you should do immediately to safeguard your access.
By Praloy Rakshit8 months ago in Lifehack
Make Money Writeing On Vocal Media
A Guide for New Writers on How to Make Money Writing for Vocal Media Writers now have more opportunities than ever before to make money online in the ever-evolving digital age. **Vocal Media** is one of the emerging platforms that has attracted the interest of both novice and seasoned content creators. Vocal Media lets writers publish their stories, build an audience, and get paid for their creativity. It is known for its user-friendly interface and monetization model. This guide will show you how to make money on Vocal Media if you love writing and want to make money from it. ### What is Vocal Media?
By Praloy Rakshit8 months ago in Geeks
Gene-editing therapy shows early success in fighting advanced gastrointestinal cancers
**Gene Editing Therapy Shows Early Success in Combating Stage IV Gastrointestinal Cancer** Early clinical trials of a gene-editing therapy have demonstrated promising results in combating advanced gastrointestinal (GI) cancers, a significant advancement in cancer treatment. Using the revolutionary gene editing tool CRISPR-Cas9, this novel strategy alters a patient's immune cells to improve their ability to recognize and combat cancerous tumors. Although the treatment is still in its infancy, it has given patients hope who had few treatment options before because GI cancers are aggressive and frequently resistant to treatment. ### The Challenge and Understanding of GI Cancers Colorectal, pancreatic, stomach, liver, and esophageal cancers are just a few types of cancers that fall under the category of "gastrointestinal cancer." When they are first discovered, these cancers are notoriously difficult to treat. Once the cancer has spread beyond its original site, conventional treatments like chemotherapy, radiation, and surgery frequently have limited success. Furthermore, tumors frequently develop mechanisms to evade immune detection, which makes it difficult for the immune system to identify and combat these cancers. Immunotherapies and, more recently, gene-editing strategies have emerged as a result of scientists looking into ways to empower the immune system to fight tumors more effectively. ### The Promise of CRISPR and T-Cell Engineering
By Praloy Rakshit8 months ago in Humans
Scientists Build First-Ever 'Black Hole Bomb' Analog
"Black Hole Bomb" analog built by scientists: a new physics frontier The first laboratory analog of a theoretical phenomenon known as the "black hole bomb" has been created by physicists in an experimental feat that is ground-breaking. This ambitious endeavor brings a concept that was previously exclusive to theoretical astrophysics to life. It has the potential to open new avenues for comprehending how energy can be extracted from black holes, one of the most mysterious and powerful objects in the universe. ### What Is a Bomb From a Black Hole? Although the concept of a "black hole bomb" might sound like something out of a science fiction novel, it actually stems from a real theoretical process that was first proposed in the 1970s by British physicist Roger Penrose and was further developed by others, including Yakov Zel'dovich. The basic idea is that, given the right conditions, a runaway process can extract energy from a rotating black hole. Imagine a particle entering the ergosphere of a black hole—a region where spacetime is dragged around by the black hole's spin outside the event horizon. One half of this particle can go into the black hole with negative energy, and the other half can come out with more energy than the first one did, effectively taking energy from the rotation of the black hole. This concept is developed further by the "bomb" idea. The energy of a wave, like a scalar field or light, can grow exponentially with each pass around a rotating black hole and reflect back. The wave would grow until it either escapes or destroys the surrounding medium, releasing enormous energy, if this process were to occur naturally in space (for instance, as a result of a surrounding structure that resembles a mirror, like a reflective cloud). The black hole bomb is the name given to this self-amplifying system. The concept was only theoretical up until recently. However, a new approach to studying these extreme phenomena in controlled environments has been developed by researchers by creating a laboratory analog that mimics the essential characteristics of this mechanism. ### The Experiment: Creating a Laboratory Black Hole Model A fluid dynamics system has been built by researchers at the University of Nottingham in the United Kingdom to mimic the behavior of a rotating black hole. The team created a fluid analog of a black hole's event horizon and ergosphere by filling a specially designed tank with water and setting it in a vortex. The researchers injected surface waves into this vortex in order to ape the behavior of waves in the vicinity of a spinning black hole. The waves were amplified as they interacted with the rotating flow, as predicted by theoretical models, emulating the process of energy extraction in a black hole bomb scenario. This experiment is part of a larger field called "analog gravity," in which researchers use fluids, optical fibers, Bose-Einstein condensates, or other systems to simulate in the lab aspects of black hole physics and general relativity. Although these analogs do not precisely replicate the full complexity of actual black holes, they enable researchers to test general relativity predictions in environments that are easier to observe and access. ### Why This Is Important The analogy of a black hole bomb is more than just a physics trick. It enables researchers to investigate the stability of black holes and the means by which energy might be extracted from them. This has implications for astrophysics as well as our comprehension of quantum gravity and interactions between high-energy particles. The ongoing endeavor to connect quantum mechanics and general relativity, the two foundations of modern physics that have so far resisted unification, is also aided by this. Theoretical models that attempt to reconcile these two frameworks could be put to the test in experiments like this one, especially in extreme conditions like those found near black holes. In addition, the idea of extracting energy from rotating black holes isn't just theoretical. The powerful jets emitted from the centers of active galaxies and other high-energy astrophysical phenomena could theoretically be explained by the Penrose process and related mechanisms. Models used in astrophysical simulations can be improved with the help of an understanding of these processes in a laboratory analog. ### The Way Forward Even though this experiment represents a significant advancement, it is still an analog in its infancy. It is possible that more advanced systems, such as optical setups or ultracold atoms, will be used in subsequent versions to more accurately model the behavior of actual black holes by simulating various kinds of waves, such as electromagnetic or quantum fields. In addition, the ways in which black holes might interact with dark matter or hypothetical particles like axions and Hawking radiation, the theoretical emission of particles from the event horizon of black holes, are the subjects of ongoing research. ### In the end An exciting development in experimental physics was the creation of the first laboratory black hole bomb. Scientists are not only testing the limits of human creativity but also shedding light on the fundamental workings of our universe by bringing to life a concept that has been only theoretical for decades. From the fate of black holes to the ultimate nature of space and time, analog models may eventually provide answers to some of the most fundamental scientific questions.
By Praloy Rakshit8 months ago in 01
Pakistan and India hint at imminent military action over Kashmir. A look at the nuclear rivals
**Pakistan and India Hint at Imminent Military Action Over Kashmir: A Look at the Nuclear Rivals** In the heart of South Asia lies a region that has ignited wars, fueled nationalistic fervor, and driven two nuclear-armed nations to the brink of catastrophe. Kashmir, often referred to as “Heaven on Earth,” continues to be the flashpoint between India and Pakistan. Recent developments, inflammatory rhetoric, and cross-border skirmishes have once again raised alarms over potential military escalation between these long-time adversaries.
By Praloy Rakshit9 months ago in Unbalanced
Microsoft’s AI Secretly Copies Your WhatsApp, Signal Messages
A draft of the article "Microsoft's AI Secretly Copies Your WhatsApp, Signal Messages" can be found here: Microsoft’s AI Secretly Copies Your WhatsApp, Signal Messages: Privacy Concerns Ignite Global Backl A new wave of privacy concerns has emerged as reports indicate that Microsoft’s AI systems have been secretly accessing and copying messages from encrypted messaging apps like WhatsApp and Signal. According to whistleblowers and recent cybersecurity investigations, Microsoft's AI models, which are a part of the Windows ecosystem and cloud services, have been quietly scanning user data in a variety of applications, including supposedly secure platforms. These revelations have sparked alarm among privacy advocates, governments, and tech users around the world. How did it occur? Microsoft's Copilot AI and its integration with Windows system-level permissions, according to reports, are the source of the problem. Copilot reportedly logged user interactions, including messages sent or received via WhatsApp Desktop, Signal, and other encrypted communication tools, when granted broad access to device activity and app usage. Although these applications claim to use complete encryption, the security flaw appears to be outside of the encryption itself. Through clipboard monitoring, keystroke logging, or background process reading—capabilities users unknowingly authorized during setup—Microsoft's AI may have had access to messages viewed or typed in Windows. Official Responses and Denials According to Microsoft's statement, their AI "only collects data with user consent to improve experience" and "no encrypted data is decrypted or used without permission." Microsoft denies any intentional violation of user privacy. However, critics argue that the company has failed to clearly inform users of what permissions they grant during installation. The possibility of a breach has been criticized by both WhatsApp and Signal, with Meredith Whittaker, CEO of Signal, describing it as "a disturbing overreach that undermines the very principles of encryption and privacy." Global Reaction and Investigations European regulators, already critical of American tech giants’ data practices, have opened formal investigations under the General Data Protection Regulation (GDPR). A number of senators in the United States have requested hearings on AI oversight and digital privacy. “This could be the Cambridge Analytica moment for AI,” warned Eva Galperin, Director of Cybersecurity at the Electronic Frontier Foundation. “We cannot allow AI systems to become Trojan horses for mass surveillance.” What You Can Do Experts recommend that users review app permissions, disable unnecessary Copilot features, and consider using operating systems or privacy tools that limit background access to encrypted communications. Conclusion As AI becomes increasingly embedded in everyday technology, the balance between innovation and privacy grows more fragile. The alleged data harvesting by Microsoft’s AI serves as a stark reminder that privacy in the age of AI is not guaranteed—even on platforms built to protect it.
By Praloy Rakshit9 months ago in Wander





