Recent research highlights that sunscreens enhanced with lignin, a natural polymer found in wood, can achieve an impressive sun protection factor (SPF) exceeding 180. This innovative ingredient also promises longer-lasting effects and lower skin penetration compared to conventional sunscreens, potentially offering a safer alternative.
While sunscreen is crucial for skin cancer prevention, there is growing concern about its safety. A recent survey revealed that 14% of young adults mistakenly believe daily sunscreen use poses more risks than direct sun exposure.
This confusion stems from findings by the U.S. Food and Drug Administration (FDA), which confirmed that some common sunscreen ingredients can enter the bloodstream. However, long-term studies have shown no significant health risks associated with regular sunscreen use, prompting the FDA to call for further investigation.
In response, researchers are actively seeking natural alternatives to traditional sunscreen chemicals that are not only safer for human health but also less harmful to coral reefs and marine ecosystems.
Among the most promising natural ingredients is lignin, known for reinforcing plant cell walls and shielding them from harmful ultraviolet (UV) radiation.
One major challenge lies in extracting lignin from wood without altering its color. Conventional methods often use harsh chemicals, turning it from a light hue to dark brown, rendering it unsuitable for sunscreen applications.
Researchers from South China University of Science and Technology have successfully developed a milder extraction technique. Led by Jun Lee, the team extracted pale yellow lignin from poplar trees using crushing and sieving methods, followed by ultrasound treatment. Another group, led by Yong Qian, utilized a similar approach to harvest pale pink lignin from birch trees.
The extracted lignin was then transformed into nanoparticles and blended with standard white creams to formulate sunscreen products.
Tests indicated that the pale yellow lignin sunscreen achieved an SPF of 20, while the pale pink version reached an SPF of 19, providing moderate protection against harmful UV rays and blending seamlessly with various skin tones for a smooth application.
While these lignin-based sunscreens do not match the high protection levels of many commercial products (often SPF 50 or higher), the research team experimented by encapsulating popular sunscreen agents, avobenzone and octinoxate, within lignin nanoparticles. This innovative combination produced an astounding SPF of over 180. However, it’s essential to note that sunscreen labels cannot exceed SPF 50 due to regulatory guidelines.
Encapsulating these ingredients in lignin nanoparticles not only enhances their stability under sunlight but also minimizes skin penetration, thus potentially increasing safety.
Qian has reported that ongoing trials of one lignin-based sunscreen formulation indicate it is safe and effective, contributing to the search for healthier sunscreen options.
In addition to lignin, other naturally sourced ingredients like those derived from seaweed, ferns, squid, and even human hair are being investigated for sunscreen applications.
A groundbreaking treaty aimed at protecting the high seas has officially entered into force, marking a significant moment in marine conservation.
The vast expanses of the high seas, beyond a country’s 370-kilometre exclusive economic zone, are often referred to as the “Wild West” of the oceans. This region is notorious for its minimal regulations on fishing, making it a vital area that remains largely unexplored. According to recent studies, this deep-sea environment is inhabited by diverse marine organisms, with up to 95% of the habitat being vital to marine life.
In September 2025, over 60 countries ratified the UN Convention on the Conservation and Sustainable Use of Marine Biodiversity in the open ocean, which encompasses half of our planet’s surface. This historic agreement has initiated a 120-day countdown to its official implementation.
“This is one of the most important environmental agreements ever,” states Matt Frost from the Plymouth Marine Laboratory in the UK. “There was no established mechanism for creating protected marine areas on the high seas prior to this treaty.”
World-renowned marine biologist Sylvia Earle calls this treaty a ‘turning point’ in safeguarding ‘Earth’s blue heart’, which plays a crucial role in regulating climate and sustaining life.
A year remains before nations can establish protected areas under the treaty, as regulations and monitoring systems need to be finalized at the inaugural meeting of the parties in late 2026.
“This moment demonstrates that global cooperation is feasible,” says Earle. “Now we must act decisively.”
In the Atlantic, conservationists aim to safeguard unique ecosystems such as the “lost cities” formed by the seaweed mats of the Sargasso Sea, a crucial breeding ground for American and European eels, alongside the remarkable hydrothermal vent communities. Meanwhile, the Pacific Ocean conservation efforts target the Salas y Gomez and Nazca ridges, underwater mountains that serve as habitats for diverse marine species including whales, sharks, and turtles.
The treaty also envisions a shared repository for genetic resources discovered in the high seas, which could facilitate breakthroughs in medicinal research.
As maritime technology advances, fleets of factory ships are exploiting the high seas, leading to the overfishing of species and habitat destruction. This escalation threatens crucial biodiversity zones. Bottom trawling, in particular, causes severe damage to the ocean floor. Emerging techniques are being developed to fish in the “twilight zone” of mid-depth waters, between 200 and 1,000 meters, further complicating conservation efforts.
Local management organizations have noted that for two decades, there has been a call for a treaty to mitigate the overfishing of 56% of targeted fish stocks in international waters, as highlighted in recent studies.
Support for protective measures stems from the fact that 90% of marine protected areas in national waters are actively being preserved, positively influencing nearby fish populations by providing safe environments for spawning and growth.
Additionally, the 30 by 30 commitment aims to safeguard 30% of the Earth’s surface by 2030, making it essential to address the high seas for its successful realization.
Oceans currently absorb approximately 90% of the excess heat resulting from climate change. By shielding these critical areas from fishing and associated pollution, marine ecosystems can better adapt to rising temperatures.
“If you’re battling multiple afflictions, alleviating two can empower you to confront the remaining issues,” Frost asserts.
Moreover, marine ecosystems are responsible for absorbing a quarter of the CO2 emissions that contribute to climate change. Coastal environments like seagrass meadows and kelp forests are crucial carbon sinks, and activities such as the nocturnal feeding patterns of mesopelagic fish and plankton play a role in the carbon cycle.
“These species transport carbon from surface waters to deeper ocean layers, significantly influencing the carbon dynamics,” explains Callum Roberts from the Convex Seascape Survey, a global research initiative focusing on the ocean’s impact on climate change.
The treaty’s initial challenge involves identifying appropriate areas for protection, especially as species migrate in response to shifting ocean temperatures. Only 27% of the ocean floor has been thoroughly mapped.
Enforcement will also be a formidable challenge. Current marine protected areas in national waters include a significant number of “paper parks” that offer little actual protection for species.
Advancements in satellite imagery and AI technology have made it feasible to monitor vessels and detect unlawful activities. Nonetheless, enforcement will rely on member states to act against flagrant violations, including barring offending ships from their ports.
While 145 countries have signed the treaty, it is only enforceable for those that ratify it. Currently, 83 nations have adopted the treaty, with the UK, US, Canada, and Australia yet to follow suit.
“The more nations that ratify this treaty, the stronger it becomes,” says Sarah Bedorf from Oceana. “We all share the responsibility of protecting the high seas, which ultimately benefits everyone.”
Innovative vaccines may provide a new approach to combat severe food allergies
Tartesy / Alamy
Researchers have developed an experimental vaccine that successfully protects mice from anaphylaxis, a potentially life-threatening allergic reaction, for at least one year. There is optimism that this vaccine will also be effective in humans.
Anaphylaxis poses a persistent threat to millions worldwide, particularly for individuals allergic to foods like peanuts and shellfish. In the UK alone, around 6% of adults, or about 2.4 million people, are believed to have clinically confirmed food allergies.
Allergic reactions can occur from consuming contaminated food or even from kissing someone who has recently eaten the allergenic food. This triggers a surge of immunoglobulin E (IgE) antibodies, leading to symptoms such as throat swelling, breathing difficulties, and a drop in blood pressure. Despite having an epinephrine auto-injector (like an EpiPen) at hand, many still need emergency treatment, and severe cases may be fatal.
Currently, avoiding allergens is the primary method of prevention, with limited alternatives available. Individuals can consider oral immunotherapy, where the allergen is gradually introduced under supervision to build up tolerance. There is also an anti-IgE monoclonal antibody drug, like omalizumab, which binds to IgE to block allergic responses. However, omalizumab is costly and requires injections every few weeks, sometimes indefinitely.
Recently, Laurent Reber and colleagues at the Toulouse Institute of Infection and Inflammation in France developed a vaccine named IgE-K. This vaccine encourages the immune system to produce antibodies that target IgE, preventing it from attaching to receptors on immune cells and averting severe allergic reactions.
“Our goal was to create a long-term solution, as individuals with food allergies face unintentional exposure at any time, necessitating ongoing protection,” says Reber.
In experiments with mice engineered to produce the human variant of IgE, the team discovered that two doses of the vaccine led to the generation of neutralizing antibodies against IgE.
“It blocks the molecules responsible for allergic reactions,” says Josh Koenig from McMaster University in Ontario, Canada.
Upon exposing the mice to a substance that triggered an allergic reaction, the unvaccinated mice experienced significant reactions, while the vaccinated mice exhibited no symptoms and were shielded from anaphylaxis for up to a year.
“It might last longer, but we have yet to conduct further testing,” noted Reber.
IgE forms part of the immune system, activated in response to toxins and certain intestinal parasites apart from allergens. “This mechanism is likely an evolutionary adaptation to combat toxins,” suggests Lever.
Lever asserts there is strong evidence supporting the long-term safety of targeting this molecule, as many individuals with severe allergies have been on anti-IgE therapy for years without negative effects. To assess if reducing IgE would diminish the body’s protective response to parasites, further tests were conducted on mice. The results indicated that the vaccine did not hinder their immune response to infections involving mouse feline, a parasitic nematode.
Koenig expresses hope regarding the vaccine’s efficacy in humans. “Research shows that the mouse-generated antibodies attach effectively to human IgE molecules. If humans can produce similar antibodies, there’s a promising chance it will be highly effective.”
Despite this optimism, Lever emphasizes that clinical trials are necessary to assess the vaccine’s safety, effectiveness, and duration in humans. If it can be commercialized, it may provide a cost-effective treatment alternative for individuals with severe allergies, requiring far fewer injections than anti-IgE monoclonal antibodies such as omalizumab.
Numerous civil liberties advocates and legal professionals are demanding an inquiry into the UK’s data protection regulator. The regulator has referred to the situation as a “collapse in enforcement activity” following a significant scandal, specifically the Afghanistan data breach.
A group of 73 individuals—including academics, leading lawyers, data protection specialists, and organizations like Statewatch and the Good Law Project—have sent a letter to Chi Onwurah, the chair of the bipartisan Commons Science, Innovation and Technology Committee. This effort was coordinated by the Open Rights Group and calls for an investigation into the actions of Information Commissioner John Edwards’ office.
“We are alarmed by the failure in enforcement actions by the Directorate of Intelligence, which has resulted in not formally investigating the Ministry of Defense (MoD) after the Afghanistan data breach,” stated the signatories. They caution that there are “more serious structural flaws” beyond just data breaches.
The Afghanistan data breach represented a grave leak involving information about Afghan individuals who collaborated with British forces prior to the Taliban’s takeover in August 2021. Those whose names were disclosed indicated that this exposure endangered their lives.
“Data breaches can pose serious risks to individuals and disrupt the continuity of government and business,” the letter emphasized. “However, during a recent hearing conducted by your committee, Commissioner John Edwards suggested he has no intention of reassessing his approach to data protection enforcement, even in light of the most significant data breach ever in the UK.”
The signatories also referenced other notable data breaches, including those affecting the victims of the Windrush scandal.
They argue that the ICO has adopted a “public sector approach” to such incidents, issuing disciplinary actions characterized by unenforceable written warnings and substantially lowering fines.
“The ICO’s choice not to initiate any formal action against the MoD, despite ongoing failures, is as remarkable as its lack of documentation regarding its decisions. This paints a picture in which the ICO’s public sector approach provides minimal deterrence and fails to encourage effective data management across government and public entities.”
“The response to the Afghanistan data breach signifies a broader issue. Many have been left disillusioned by the ICO’s lack of use of its remedial powers and its continual shortcomings.”
The letter warns that the trend of declining enforcement in the public sector will inevitably reflect in the accompanying statistics. Latest ICO report Enforcement actions by the private sector are also becoming increasingly rare, as the ICO fails to pursue matters and organizations redirect resources away from compliance and responsible data practices.
“Instead of simply hoping for a positive outcome, Congress has endowed the ICO with ample authority to ensure compliance with legally binding orders. During the hearing you conducted, it was clear that the ICO opted not to exercise these powers regarding the Afghan data breach.”
“Regrettably, the Afghanistan data breach is not an isolated case but rather an indication of deeper structural issues in the operations of ICOs.”
The letter concludes with the assertion that “change seems improbable unless the Science, Innovation and Technology Committee steps in with its oversight capabilities.”
An ICO spokesperson commented: “We possess a comprehensive array of regulatory powers and tools to tackle systemic concerns within specific sectors or industries.”
“We appreciate the essential role civil society plays in scrutinizing our decisions and look forward to discussing our strategies in our upcoming regular meeting. We also welcome the opportunity to clarify our work when engaging with or presenting before the DSIT Selection Committee.”
The Guardian has revealed that personal information from job applicants at the Tate has been exposed online, compromising addresses, salaries, and phone numbers of examiners.
These extensive records, running hundreds of pages, were shared on a site not affiliated with the government-supported organization managing London’s Tate Modern, Tate Britain, Tate St Ives in Cornwall, and Tate Liverpool.
The leaked data encompasses details like the current employers and educational background of applicants related to the Tate’s Website Developer Search in October 2023, affecting 111 individuals. While names are undisclosed, referees’ phone numbers and personal email addresses might be included. It remains unclear how long this information has been available online.
Max Kohler, a 29-year-old software developer, learned his data had been compromised after one of his application reviewers received an email from an unfamiliar source who accessed the online data dump.
Kohler found that the breach contained his last paycheck, current employer’s name, other reviewers’ names, email addresses, home addresses, and extensive responses to job interview questions.
“I feel extremely disappointed and disheartened,” he stated. “You dedicate time filling out sensitive information like your previous salary and home address, yet they fail to secure it properly and allow it to be publicly accessible.”
“They should publicly address this issue, provide an apology, and clarify how this happened, along with actions to prevent future occurrences. It likely stems from inadequate staff training or procedural oversights.”
Reported incidents of data security breaches to the UK’s Information Commissioner’s Office (ICO) continue to rise. Over 2,000 incidents were reported quarterly in 2022, increasing to over 3,200 between April and June of this year.
Kate Brimstead, a partner at Shoesmith law firm and an authority on data privacy, information law, and cybersecurity, commented: “Breaches do not always have to be intentional. While ransomware attacks attract significant attention, the scale of current breaches is substantial.” Errors can often contribute to these incidents, highlighting the necessity for robust checks and procedures in daily operations. “Managing our data can be tedious, but it remains crucial,” she added.
The ICO emphasized that organizations must report a personal data breach to them within 72 hours of being aware, unless there is no risk to individuals’ rights and freedoms. If an organization decides not to report, they should maintain a record of the breach and justify their decision if needed.
A spokesperson for Tate stated: “We are meticulously reviewing all reports and investigating this issue. Thus far, we haven’t identified any breaches in our systems and will refrain from further comment while this issue is under investigation.”
quick guide
Contact us about this story
show
The integrity of public interest journalism relies on firsthand accounts from knowledgeable individuals.
If you have insights regarding this issue, please contact us confidentially using the methods listed below.
Secure messaging in the Guardian app
The Guardian app provides a way to share story tips. Messages sent via this feature are encrypted end-to-end and integrated within typical app functions, keeping your communication with us secure.
If you haven’t yet downloaded the Guardian app, you can find it on (iOS/Android) and select “Secure Messaging” from the menu.
SecureDrop, instant messaging, email, phone, and postal mail
If you can secure your use of the Tor network, you can send us messages and documents through our <a href=”https://www.theguardian.com/securedrop”>SecureDrop platform</a>.
Additionally, our guide located at <a href=”https://www.theguardian.com/tips”>theguardian.com/tips</a> lists several secure contact methods and discusses the advantages and disadvantages of each.
Apple and WhatsApp have committed to continue alerting users if their devices are targeted by government hacking software, particularly in the United States, as two spyware companies aim to penetrate the Trump administration.
The two tech giants provided statements in response to questions from the Guardian, as two Israeli-founded cyber weapon manufacturers, now under U.S. ownership, aggressively seek access to the American market.
Paragon Solutions, known for its spyware called Graphite, has already reached an agreement with the Trump administration to provide U.S. immigration officials with one of the most advanced hacking tools globally as of September, following the unfreezing of a $2 million contract by the Department of Homeland Affairs with ICE (Immigration and Customs Enforcement).
Paragon did not reply to requests for comment.
NSO Group, another firm cited by the Biden administration in 2021 for conducting business “that goes against the national security or foreign policy interests of the United States,” revealed over the weekend that David Friedman, former U.S. ambassador to Israel during Donald Trump’s initial term, will become executive chairman of the parent company that owns NSO. The company has reportedly been recently acquired by new investors, including American film producer Robert Simmons.
Both Paragon and NSO Group develop spyware capable of infiltrating any phone without the knowledge of the user, enabling the spyware operator to read texts, eavesdrop on calls, track locations, and turn mobile devices into wiretapping tools or remote cameras.
While both companies defend their products as tools to combat serious crimes and thwart potential terrorist activities, their software is also weaponized by government clients to spy on individuals they wish to monitor covertly, including journalists, business leaders, and human rights advocates.
Apple and WhatsApp have consistently opposed the proliferation of spyware worldwide, notifying users via alerts when potential hacking attempts are detected in various countries, including Italy, Spain, and India.
In October, a U.S. court ruled in favor of WhatsApp after six years of legal battles, preventing NSO from targeting WhatsApp users in the future.
However, concerns arise due to the close connections between Apple, WhatsApp’s parent company Meta, and the Trump administration regarding whether they will persist in warning users amid such spyware threats in the United States.
“Threat notifications are intended to individually inform and assist users who may be victims of mercenary spyware, irrespective of geographic location,” Apple stated.
“WhatsApp aims to safeguard our users by disrupting hacking attempts from mercenary spyware, advancing protective measures, and notifying those whose devices are under threat, no matter where they are globally,” commented a WhatsApp representative.
Former FBI Director Christopher Wray testified that the FBI considered utilizing NSO’s Pegasus but ultimately declined to incorporate commercial spyware into its operations. Experts express concern over the legality surrounding the use of spyware in the United States, given existing laws that restrict targeted surveillance of Americans.
An aide to Democratic Senator Ron Wyden, a member of the Select Committee on Intelligence, mentioned that current immigration officials provided a preliminary briefing to his office, stating that “the policy is still under development,” but there has been no feedback since the government shutdown began in October.
When asked about the potential lifting of sanctions imposed on NSO by the Biden administration in 2021, Friedman mentioned during a phone call from Israel that he has yet to discuss the matter with President Trump, stating, “I hope that happens, but I have not made that request yet.” He added it is “too early to determine” when NSO may pursue the removal of these sanctions.
Regarding mercenary spyware, John Scott Railton, a senior research fellow at the University of Toronto’s Citizen Research Institute, warns that “no one is safe.” He is recognized as a leading authority on tracking and disrupting spyware usage against civil society members globally.
“American firms are unprepared to detect and defend against this type of menace domestically, similarly to healthcare institutions, legal professionals, politicians, and the general populace,” he noted. “The last thing America needs now is a silent spyware epidemic.”
Paragon initially signed a contract with ICE in 2024 under the Biden administration. The relatively small agreement went unnoticed by the White House until its official announcement, several insiders disclosed. Wired reported. The contract was subsequently suspended to ascertain whether it complied with a significant executive order issued earlier. Signed by the White House in May 2023, it prohibited the operational use of spyware that “poses a risk to national security or has been exploited by foreign entities for human rights violations globally.”
At that point, Paragon was free from surveillance controversies, unlike NSO Group, which faced scrutiny for its Pegasus spyware targeting a plethora of civil society organizations.
However, the situation shifted in January 2025 when WhatsApp disclosed that 90 individuals, including journalists and civil society members, had been targeted by Paragon’s Graphite.
Following this revelation, Paragon severed its ties with the Italian government, alleging that Italy violated its service terms by using spyware against civil society members.
Since then, media accounts have detailed how several Italian journalists, at least two executives from Italy’s largest bank, an Italian human rights advocate, and an Italian political strategist were targeted by hacking spyware in 2024.
The current government led by Prime Minister Giorgia Meloni has admitted that the software was employed against certain activists by Italian agencies with legal authority, but has not accepted responsibility for other prominent targets.
“This is Italy’s Watergate,” remarked former Italian Prime Minister Matteo Renzi in an interview.
“This is a tool that only governments can wield. If the Italian government continues to deny its usage, the question for multiple Italian business leaders and journalists remains, who is responsible?” he said. “I may not be closely aligned with journalists, but freedom of the press is essential in a free democracy. Using this tool against journalists is intolerable.”
Some officials are worried that this Graphite may now be under the control of U.S. immigration authorities.
“ICE is already undermining due process by hastily detaining children and families who pose no threat, ruining lives,” Wyden stated to the Guardian. “I am extremely concerned about how ICE will utilize spyware, facial recognition, and other technologies to further infringe upon the rights of American citizens and those whom Donald Trump views as adversaries.”
A spokesperson for the Department of Homeland Security did not respond to a request for comment.
Immune-related changes occur in the breast after breastfeeding
Svetlana Repnitskaya/Getty Images
Breastfeeding has long been linked to lowering the risk of breast cancer. However, the precise mechanisms behind this effect remain elusive. Recent studies reveal that women who breastfeed possess a higher presence of specialized immune cells in their breasts that might inhibit malignant immune cells.
The exact reasons remain partially understood, but are believed to involve alterations in breast tissue and hormonal exposure. To investigate further, Shereen Roy and colleagues at the Peter McCallum Cancer Center in Victoria, Australia, examined breast tissue from 260 women from diverse ethnic backgrounds, aged 20 to 70. These women varied in their maternal status and breastfeeding experiences, with none having previously been diagnosed with breast cancer.
“We discovered that breastfeeding mothers have a greater quantity of specialized immune cells known as CD8+ T cells, which can persist in breast tissue for decades after childbirth,” says Roy. “These cells serve as local defenders, poised to combat abnormal cells that may lead to cancer.” In certain instances, these cells remained present for up to 50 years.
The researchers also investigated mice, some of which underwent a complete cycle of pregnancy, lactation, and breast recovery during the weaning of their pups. Their mammary tissue was analyzed 28 days later, by which point the mammary glands had reverted to their pre-pregnancy state. Other mice had their pups taken away shortly after birth, or they were not pregnant at all.
The study revealed that completing a full lactation cycle significantly increased the accumulation of specialized T cells in mammary tissue, a phenomenon not observed in the other mice. When triple-negative breast cancer cells, known for their aggressive nature, were transplanted into the mammary gland tissue, tumors developed much more slowly in mice that had experienced lactation. However, depleting these T cells led to rapid tumor growth.
The researchers also analyzed clinical data from over 1,000 women diagnosed with triple-negative breast cancer post at least one full-term pregnancy. They found that women who breastfed exhibited tumors with a higher density of CD8+ T cells. “This indicates that the body’s immune response against breast cancer is active and ongoing,” notes Roy.
After considering other risk factors linked to breast cancer mortality, such as age, the researchers noted that women who breastfed had substantially longer overall survival. However, the variability in the data made it challenging to determine whether the duration of breastfeeding impacted this outcome.
“These findings have significant implications for understanding why certain women possess a more inherent protection against aggressive breast cancer and how we might develop targeted prevention and treatment strategies in the future,” Roy explains. However, she emphasizes that the choice to breastfeed is personal, not feasible for everyone, and may not always prevent breast cancer development.
Daniel Gray, along with researchers from the Walter and Eliza Hall Medical Research Institute in Victoria, highlighted that one of the study’s strengths was the analysis of multiple groups of women. “This lays the groundwork for future research that may elucidate how CD8+ T cells retain ‘memory’ of breastfeeding,” he comments.
The UK government has accessed customer information and intensified its dispute with Apple by requesting a backdoor to the cloud storage services of high-tech companies.
Previously, the Home Office sought access to data tied to Apple’s Advanced Data Protection (ADP) services uploaded by users globally, leading to tensions with the White House.
On Wednesday, The Financial Times reported that the government has introduced a new access order known as the Technical Capacity Notice (TCN), which aims to gain access to encrypted cloud backups for UK citizens.
A spokesperson for the Ministry of Home Affairs noted that the department does not comment on operational matters such as “confirming or denying the presence of such notices.” The spokesperson added: “We will always take all necessary actions at the national level to ensure the safety of our British citizens.”
In February, Apple withdrew ADP for new UK users, advising that existing users would need to deactivate security features in the future. Messaging services such as iMessage and FaceTime continue to be end-to-end encrypted by default.
Tulsi Gabbard, director of US national intelligence, mentioned that the UK had backed down in August by insisting on access to US customer data. Donald Trump characterized the demand for access as “what you hear is China.”
While Apple did not directly address the FT report, it expressed regret over its inability to provide ADP (an optional additional layer) to UK customers, stating it would “never” implement backdoors in its products.
“Apple remains dedicated to delivering the highest level of security for personal data, and we hope to achieve this in the UK in the future. As I’ve reiterated many times, we’ve never created a backdoor or a master key for any product or service.”
Apple has challenged the initial TCN via the Investigatory Powers Tribunal, questioning whether the national intelligence agency acted unlawfully. The Home Office had attempted to keep the case’s details confidential, but after a ruling in April, it was confirmed that Apple’s appeal resulted in some information being released for the first time.
However, the specifics of the TCN remain undisclosed, and recipients of such notices are prohibited from revealing their existence under investigatory rights. The FT indicates that the original TCN is “not limited to” data stored under the ADP, suggesting the UK government seeks access to fundamental and widespread iCloud services.
The ADP service employs end-to-end encryption, ensuring that only account holders can decrypt files like documents and photos, leaving no one else, including Apple, with that capability.
Privacy International, the organization that initiated a legal challenge against the first TCN, remarked that this new order “may pose as significant a threat as the previous ones.” It noted that if Apple is compelled to compromise end-to-end encryption in the UK, it would create vulnerabilities affecting all users by undermining the entire system.
“Such vulnerabilities could be exploited by hostile states, criminals, and other malevolent entities across the globe,” the organization stated.
The government is under pressure to clarify why it has not yet acted on all recommendations from the 2023 review. This includes findings concerning Afghans, victims of child sexual abuse, and 6,000 disability claimants working alongside the British military.
On Thursday, the Minister finally published an information security review. This move followed a 2023 leak involving personal data of approximately 10,000 military personnel from Northern Ireland’s police service.
The Cabinet Office’s review of 11 public sector data breaches revealed three overarching themes affecting entities such as HMRC, the Metropolitan Police, Benefits Systems, and the MOD.
Insufficient control over incidental downloads and the aggregation of sensitive data.
Disclosure of sensitive information through “wrong recipient” emails and improper use of BCC.
Undisclosed personal data emerging from spreadsheets set for release.
The review was released 22 months after the database of 18,700 Afghans was finalized just a month following its publication and was praised by Chi Onwurah, chair of the Science, Innovation and Technology Committee. However, she remarked:
Data breaches concerning Afghans have instilled fear among those concerned for their safety under the Taliban and those wary of the UK government, which promised relocation to thousands of Afghans under a confidential plan.
The government reported that it has acted on 12 of the 14 recommendations aimed at enhancing data security. Onwurah stated: “There are still questions that the government must address regarding the review. Why have only 12 out of the 14 recommendations been executed?”
“For governments to leverage technology to boost the economy and fulfill their aspirations of public sector transformation, they must earn their citizens’ trust in safeguarding their data.
Intelligence Commissioner John Edwards urged the government to “encourage the broader public sector to expedite the organization of its practices to secure Whitehall.”
He emphasized to Cabinet Secretary Pat McFadden on Thursday, “It is imperative that the government fully actualizes the recommendations from the Information Security Review.”
It remains unclear which of the 14 recommendations are still pending implementation. The full list includes collaboration with the National Cybersecurity Centre to disseminate existing guidance on the technical management of “official” labeled products and services, marking of “official” information, launching a “behavioral impact communication campaign” to combat ongoing deficiencies in information processing, and the necessity for a “review of sanctions related to negligence.”
McFadden and Peter Kyle, the secretaries of state for science, innovation, and technology, communicated to Onwurah in a letter on Thursday.
A spokesperson for the government stated: “This review concluded in 2023 under the previous administration.
“Safeguarding national security, particularly government data security, remains one of our top priorities. Since taking office, we have introduced plans to enhance inter-sector security guidance, update enforcement training for civil servants, and improve the digital infrastructure throughout the public sector, aligning with the shift towards modern digital governance.”
Influenza virus particles observed through an electron microscope, color enhanced
John G/Imago/Alamy
A promising long-term antiviral medication may offer protection against all strains of influenza, providing hope for the most vulnerable populations.
The flu results in the loss of thousands of lives annually, and the swift emergence of new variants poses a risk for future pandemics. Each year, scientists reformulate flu vaccines to correspond with the strains that are projected to be prevalent in the upcoming season. These vaccines prompt the immune system to generate antibodies that block the virus from infiltrating the cells.
Efforts are underway to develop a universal influenza vaccine capable of safeguarding individuals from all strains, yet these vaccines face challenges.
“Even if the first approved universal influenza vaccine is created, individuals exhibit varying immune responses, meaning not everyone will be effectively protected,” says Jeffrey Stein, CEO of Cidara. For instance, vaccines often show reduced efficacy in older adults or in those with compromised immune systems.
To tackle this issue, Stein and his team have developed a treatment known as CD388, which includes Zanamivir, an antiviral drug authorized for treating infections caused by all influenza variants that affect humans. Normally, Zanamivir is eliminated from the body within hours, but the research team has modified it to rapidly neutralize the invasive influenza virus. “It’s not part of the immune system,” Stein explains.
For testing, the team enrolled 5,000 participants aged 16-64 from the US and the UK at the beginning of the 2024 flu season. None of the participants were at elevated risk for flu-related complications or had received that year’s flu vaccine. They divided the participants into four approximately equal groups. Three groups received one injection of CD388 at low, moderate, or high doses, while the final group received a placebo.
About six months later, researchers assessed the number of individuals with symptomatic flu infections during the flu season, defined by the presence of influenza virus DNA in nasal swabs and flu-like symptoms such as cough and fever.
Thirty-three individuals in the placebo group reported symptomatic flu, whereas only eight participants in the high-dose CD388 group did, marking a risk reduction of around 76%. The moderate and low-dose groups saw a 61% and 58% decrease in risk of symptomatic infections, respectively. “All doses demonstrated significant protection against influenza illness,” states Nicole Dhabapana, Chief Medical Officer of Sidara. Side effects, such as injection site tenderness, were consistent across both the treatment and placebo groups.
The results indicate that CD388 may offer a more straightforward means of protecting individuals compared to vaccines. “[Unlike vaccines, it] does not need to match the circulating strain, and could be more effective during a ‘poor match’ year or for pandemic preparedness, especially if new flu strains, such as H5N1, transmit to humans,” remarks Pennyword from King’s College London. She adds that, based on previous data on Zanamivir, it is unlikely that influenza strains will develop resistance to it.
This approach is likely to be effective for older individuals and those known to have poor vaccination responses, including the immunocompromised. Davalpana mentions that the team plans to conduct tests on individuals aged 12 and older with compromised immune systems.
Instead of replacing vaccines, Stein suggests that the drug may work best in conjunction with them, although this has yet to be tested. Nevertheless, the findings are timely given the growing hesitance surrounding vaccinations. “We aim to bypass the controversy that unfortunately surrounds vaccines,” Stein remarks.
As public health organizations indicate that women’s personal information is vulnerable to exploitation by private entities, experts advocate for public health groups to create alternatives to for-profit period tracker applications.
A study from the University of Cambridge reveals that smartphone apps used for menstrual cycle tracking serve as a “Goldmine” for consumer profiling, collecting data on exercise, diet, medication, hormone levels, and birth control methods.
The economic worth of this information is often “greatly underestimated” by users who share intimate details in unregulated markets with profit-driven businesses, according to the report.
If mishandled, data from cycle tracking apps (CTAs) could lead to issues like employment bias, workplace monitoring, discrimination in health insurance, risks of cyberstalking, and restricted access to abortion services, research indicates.
The authors urge for improved regulation in the expanding Femtech sector to safeguard users as data is sold in large quantities, suggesting that apps should offer clear consent options regarding data collection and promote the establishment of public health agency alternatives to commercial CTAs.
“The menstrual cycle tracking app is marketed as empowering women and bridging gender health disparities,” stated Dr. Stephanie Felberger, PhD, of the Center for Technology and Democracy at Cambridge, the lead author of the report. “Nevertheless, its underlying business model relies on commercial usage, wherein user data and insights are sold to third parties for profit.
“As a consequence of the monetization of data collected by cycle tracking app companies, women face significant and alarming privacy and safety threats.”
The report indicates that most cycle tracking apps cater to women attempting to conceive, making the stored data highly commercially valuable. Other life events, aside from home purchasing, do not trigger such notable shifts in consumer behavior.
Data pertaining to pregnancy is valued at over 200 times more than information about age, gender, or location for targeted advertisements. Furthermore, tracking cycle duration can allow for targeting women at various phases of their cycles.
The three most popular apps project a quarterly download figure of 500 million yen for 2024. The digital health sector focused on women’s wellness is anticipated to surpass $60 billion (£44 billion) by 2027, as noted in the report.
In light of the considerable demand for period tracking, the authors are calling on public health entities, including the UK’s NHS, to create transparent and reliable apps as alternatives to commercial offerings.
“The UK is ideally positioned to address researchers’ challenges related to menstrual data access, as well as privacy and data concerns, by developing an NHS app dedicated to tracking menstrual cycles,” added that the parent-child relationship in the US Reproductive Medicine Plan currently utilizes its own app.
“Apps situated within public health frameworks, which are not primarily profit-driven, can significantly reduce privacy violations, gather essential data on reproductive health, and empower users regarding the utilization of their menstrual information.”
“Utilizing cycle tracking apps is beneficial. Women deserve better than having their menstrual tracking data treated merely as consumer data,” remarked Professor Gina Neff, executive director of the Mindeoo Center.
In the UK and the EU, period tracking data falls under “special categories” and enjoys greater legal protection, similar to genetics and ethnicity. In the United States, authorities collect menstrual cycle data which may hinder access to abortion services, according to the report.
Another incident involved unauthorized access to personal data of thousands of legal aid applicants from England and Wales, dating back to 2010, which followed significant disruptions caused by a cyberattack on Marks & Spencer.
If you see news about a cybersecurity incident affecting a company you’ve interacted with, stay vigilant regarding your email. Companies typically reach out to affected customers with details on what occurred and suggested actions.
Sometimes, only specific customer segments or users from particular regions may be impacted.
In Adidas’ case, it appears that those who contacted customer service recently are primarily affected, which may exclude many others. Occasionally, communication will confirm that you are unaffected.
If your information could be compromised, you’ll usually receive guidance on corrective measures or a link to a FAQs page. In some instances, firms may offer free access to support services from cybersecurity experts or credit monitoring.
In Adidas’ case, it seems to affect customers who contacted the service desk previously. Photo: Odd Andersen/AFP/Getty Images
Change Your Password
If you’ve conducted transactions with an organization that faced a cyber incident, change your password for that account immediately.
Ensure your password is robust and not used across multiple accounts.
Experts recommend creating passwords that are at least 12 characters long, including a mix of numbers, capital and lowercase letters, and symbols. Avoid easily guessed information like pet names, birthdays, or favorite teams.
“A great strategy to enhance password security is to combine three random words into one.” says the National Cybersecurity Centre in the UK. For example, consider something like Hippo! PizzaRocket1.
“Consider using a password manager to generate and securely store unique, strong passwords,” advises online security firm Nordvpn.
Utilize Two-Step Authentication
Two-step verification adds an extra security layer to your email and other key online accounts.
This generally involves receiving a code via the Authenticator app or sent to your registered mobile number to grant access.
Enable two-step verification on all services that provide this feature.
The second factor may include codes sent via SMS. Photo: Prostock-Studio/Alamy
Beware of Unsolicited Emails
Phishing emails often cite recent cyber events to lure unsuspecting targets who may be customers of the affected company.
Scammers might leverage personal information they’ve acquired to appear credible.
Avoid clicking on any link or attachment in emails, text messages, or social media posts unless you’re entirely certain of their legitimacy. These links can lead to phishing sites or include malware designed to steal your identity.
M&S advises potentially impacted customers that they “may receive emails, calls, or texts that appear to be from us.” “We will never reach out for your personal account details, such as your username or password.”
If an email claims to be from a business you interact with and you’re uncertain of its authenticity, ignore it or verify it through official contact channels.
Be cautious about links or attachments in emails unless you are completely sure they are legitimate. Photo: Tero Vesalainen/Alamy
Monitor Your Credit Record
If your personal data has been compromised, keep an eye on your credit report, which details your financial history and is used by lenders to judge your creditworthiness, in case someone attempts to open accounts in your name.
For instance, if a financial entity endures a cyber breach, the accessed data could include sensitive information such as your name, address, national insurance number, date of birth, bank account details, salary, and potentially your passport.
This information can be misused for identity fraud.
In the UK, the main credit reference agencies are Equifax, Experian, and Transunion, all providing various options to check your credit report for free or via subscription.
Experian provides an ID monitoring service, which checks your personal, financial, and credit information for suspicious activity. It’s a paid service, but if your data becomes compromised, they may cover the costs.
Be cautious if you suddenly find your applications for credit cards or loans being denied, or if you cease receiving bank statements for no clear reason despite a healthy credit score, as it may indicate identity theft.
More significantly, you may start receiving letters regarding debts that are not yours, or seeing transactions on your bank statements for items you didn’t purchase.
Many instances of financial fraud begin on social media and tech platforms, so remain vigilant, as scammers may possess details about you that can lend credibility to their deception.
The so-called “High Mama” scams have risen in recent years, where scammers impersonate relatives on platforms like WhatsApp, often pleading for urgent money transfers upon claiming to be locked out of their online banking.
Even with a sense of urgency, take the necessary time to verify the identity of anyone requesting funds.
Opt Out of Registration
When shopping online, retailers frequently prompt you to save payment card details for quicker checkout, but this may store your information with third-party services rather than just the retailer.
If you can avoid storing payment details across multiple sites, you reduce the risk of unauthorized access to your card information.
The parents of the family were left devastated when their aspirations for change were dashed after they sought to safeguard their children in the Colorado Legislature last month and online activism targeting a drug dealer resulted in tragedy.
Among those parents was Lori Shot, who was instrumental in crafting the bill. Her 18-year-old daughter Annaly tragically took her own life in 2020 after engaging with content on TikTok and Instagram related to depression, anxiety, and suicide.
“When lawmakers sidestep votes and shift discussions to an insubstantial calendar date without accountability, it feels like a betrayal to us as parents.” “It’s a betrayal to my daughter and to all the other children we’ve lost.”
Had the law been enacted, it would have necessitated investigations and the removal of accounts engaged in gun and drug sales, or the sexual exploitation and human trafficking of minors on platforms like Facebook, Instagram, and TikTok. It also required a dedicated hotline for law enforcement and a 72-hour response timeframe for police inquiries, which would significantly increase obligations compared to current legal standards.
Additionally, the platforms would have had to report on the usage statistics of minors, including how often and for how long they interacted with content violating company policies. Several major tech firms have taken official stances regarding the bill. As noted in Colorado’s lobbying records, Meta’s long-time lobbying firm, Headwater Strategies, has registered its support for revising the bill. Conversely, Google and TikTok employed lobbyists to oppose it.
‘[Legislators] chose self-interest over the protection of children and families. ” Illustration: Andrei Cojocaru/Guardian
“We are deeply disheartened,” said Kim Osterman, whose 18-year-old son Max died in 2021. “[Legislators] prioritized their own interests over the safety of my children and family.”
Protection for Social Media Users (SB 25-086) passed both legislative chambers, only to be vetoed by Democrat Governor Jared Polis on April 24th. His veto was justified by concerns that the bill would “erode privacy, freedom, and innovation.” On April 25, the Colorado Senate voted to override the veto, but on April 28, the House chose to delay the vote until the end of the legislative session, effectively blocking the override and keeping the bill alive.
Originally, the bill had passed the Senate with a 29-6 margin and the House with a 46-18 margin. On April 25, the Senate voted 29-6 for an override, and lawmakers anticipated that the House would take up the matter later that day, believing that there was enough bipartisan support to successfully overturn the veto.
“It was a straightforward vote for people because our goal was clear: to safeguard children from the predatory practices of social media companies,” remarked Senator Lindsey Dorgerty, a Democrat and co-sponsor of the bill. She expressed her disappointment that House leaders chose to sidestep the vote on Friday.
Advocating parents blamed the failure of the bill on an unexpected 11-hour lobbying blitz by The Far Right Gun Owners Association in Colorado. Two state legislators and seven other legislative participants corroborated the parents’ claims.
An unprecedented last-minute campaign disrupts bipartisan consensus
The owner of Rocky Mountain Guns (RMGO) characterized the bill as government censorship related to the statute against “ghost guns” assembled from kits purchased online.
RMGO initiated an extensive social media and email campaign, rallying its 200,000 members to contact lawmakers and voice their opposition to the bill. Sources familiar with the workings of the Colorado State Capitol explained that the gun group’s outreach included social media and text campaigns that encouraged Republican constituents to reach out to their representatives in opposition.
“[Legislators] were inundated with calls and emails from activists. It was an all-out assault. A campaign declared, ‘This is a government censorship bill,'” they stated.
The group’s actions contributed to efforts preventing Republicans from backing the veto override, leading to the bill’s demise. According to ten individuals involved in the bill’s development and the legislative process, this lobbying effort appeared unexpectedly robust, fueled by organizations that had previously faced financial constraints. An anonymous source from the Colorado State Capitol shared insights with the Guardian, citing fears of retaliation from RMGO.
The House of Representatives postponed its vote until April 28th, providing RMGO time to amplify its campaign over the weekend. When lawmakers reconvened on Monday, the House voted 51-13 to delay the override until the legislative session concluded, effectively dissolving the effort.
“It was a coordinated full-scale attack proclaiming this as a government censorship bill.” Illustration: Andrei Cojocaru/Guardian
A significant text messaging initiative targeted registered Republican voters, alleging that the social media bill “forces platforms to enforce extensive surveillance of content shared on their platforms,” claiming violations of Colorado’s gun laws, and framing the legislation as an affront to First and Second Amendment rights, according to texts reviewed by the Guardian.
A recurring adversary
Established in 1996, RMGO claims a membership exceeding 200,000 activists. It is recognized as a far-right organization staunchly opposed to regulations on firearms. Dudley Brown, its founder and leader president of the National Gun Rights Association, diverges significantly from the perspective of the National Rifle Association (NRA). RMGO is criticized for employing tactics labeled as “bullying” and “extremist” against both Democrats and moderate Republicans. The group has not responded to requests for commentary regarding legislative measures.
RMGO is a well-known presence at the Colorado State Capitol, typically opposing gun control measures. Daugherty described their usual campaign tactics as “intimidating.” Following backlash for her involvement in a bill banning assault weapons earlier this year, she deactivated her social media account.
“While advocating for gun legislation at the Capitol, RMGO published images of me and other legislators on their website,” she noted. An RMGO tweet depicted Daugherty alongside a bold “Traitor” stamp.
The group disseminated misinformation regarding the bill’s implications on gun ownership, as reported by sources who participated in the legislative discussions.
“My support for the bill and the veto override stemmed from concerns about child trafficking and safeguarding children,” stated Republican Senator Rod Pelton, who voted in favor of overriding the veto in the Senate. “I did not subscribe to the entire argument pertaining to the second amendment.”
The bill garnered support from 23 district attorneys in Colorado as well as bipartisan backing from the state House of Representatives.
RMGO’s late-stage opposition to the social media bill deviated from its usual tactics. Typically, the organization weighs in on legislation early in the process, according to eight sources, including co-sponsors Daugherty and Representative Andy Boesenecker.
“Their surge of focused efforts caught my attention,” Boesenecker remarked. “It was curious to note that their resistance materialized so late in the process and appeared to be well-financed.”
In recent years, RMGO has experienced reduced activity attributed to financial difficulties that limited their legislative campaigning capacity. In a 2024 interview, the organization’s leader candidly acknowledged struggles with fundraising. Daugherty believes RMGO’s capacity for such a substantial outreach campaign would be unlikely without considerable funding. Others within Colorado’s political landscape echoed this sentiment.
“The Rocky Mountain Gun Owners had been largely ineffective in the legislature for several years due to financial constraints. Suddenly, they increased their influence, seemingly backed by substantial funds,” said Dawn Reinfeld, from a Colorado-based nonprofit focused on youth rights.
This context caused lawmakers to feel pressured, especially concerning primary elections in their districts, following RMGO’s recent social media attacks on supporters of the bill.
“The bill had given me hope that Avery’s legacy would make a difference, and its failure was incredibly disappointing.” Illustration: Andrei Cojocaru/Guardian
“There was a palpable concern among many about party affiliation; it certainly played a role,” remarked Dorgerty.
Aaron Ping’s 16-year-old son, Avery, passed away from an overdose in December after buying what he believed to be ecstasy on Snapchat, only to receive a substance laced with fentanyl instead. Ping viewed the organized opposition to the bill as a purposeful distortion.
“The narrative painted the bill as an infringement on gun rights, depicting it as merely a tool for targeting people purchasing illegal firearms online,” he stated.
Ping had testified in support of the bill alongside other families, recovering teens, and district attorneys back in February before the initial Senate vote.
“This bill carried the hope that Avery’s legacy would incite change; its rejection was truly disheartening,” Ping shared.
In the absence of federal action, states initiate online child safety legislation
A number of states, including California, Maryland, Vermont, Minnesota, Hawaii, Illinois, New Mexico, South Carolina, and Nevada, have introduced legislation over the past two years aimed at enhancing online safety for minors. These initiatives encounter vigorous resistance from the technology sector, which includes extensive lobbying efforts and legal challenges.
Maryland successfully passed the Children’s Code bill in May 2024, marking it as the first state to enact such legislation. However, this victory may be short-lived. The high-tech industry coalition, NetChoice, representing companies such as Meta, Google, and Amazon, has already launched legal challenges against these measures.
In the meanwhile, federal efforts have stalled, with the Children’s Online Safety Act (KOSA) faltering in February after failing to pass the House despite years of modifications and deliberations. A newly revised version of the bill was reintroduced in Congress on May 14th.
California’s similar initiative, the age-appropriate design code law, which mirrors UK legislation, was halted in late 2023 following a NetChoice injunction citing potential First Amendment infringements.
The advent of fire marks a significant point in human evolution, though scholars continue to debate its primary function. While cooking is frequently regarded as a key factor, researchers from Tel Aviv University propose that the protection of meat and fat from predators is more plausible. Homo Erectus lived during the Lower Paleolithic era, approximately 1.9 to 0.78 million years ago.
Miki Ben-Dor & Ran Barkai’s research highlights the nutritional value of meat and fat from large prey in the Lower Paleolithic, questioning the significance of culinary practices in shaping human dietary evolution and offering new insights into adaptations in Homo Erectus.
“The origins of fire usage is a ‘burning’ question among prehistoric researchers globally,” stated Professor Barkay, a co-author of the study.
“By around 400,000 years ago, it was widely accepted that fire was commonly used in domestic settings. I concur with the idea of meat roasting, as well as its use for lighting and heating.”
“However, there remains a debate concerning the past million years, with various theories put forth to explain early human interactions with fire.”
“This study aimed to approach this issue from a new angle.”
“For early humans, the use of fire wasn’t a given; most archaeological sites dated around 400,000 years ago show no signs of fire usage,” explained Dr. Miki Ben-Dor, lead author of the study from Tel Aviv University.
“However, in many early locations, there are clear indications of fire usage, even if there’s no evidence of burnt bones or roasted meat.”
“We see early humans—nearly Homo Erectus—utilizing fire sporadically for specific purposes rather than regularly.”
“Collecting fuel, igniting a fire, and maintaining it involved substantial effort, requiring a compelling energy-efficient reason.”
“We propose a new hypothesis for that motivation.”
In their research, the authors reviewed existing literature on all identified prehistoric sites between 1.8 million and 800,000 years ago where fire evidence has been found.
They identified nine sites globally, including Gesher Benot Ya’aqov and Evron Quarry in Israel, six sites in Africa, and one site in Spain.
The study also drew from ethnographic research on contemporary hunter-gatherer societies, relating their behaviors to ancient conditions.
“We examined the common features of these nine ancient sites and found they all contained a significant number of bones from large animals, mainly elephants, hippos, and rhinoceroses,” Dr. Ben-Dor noted.
“Previous research has shown these large animals were critical to early human diets, providing a substantial portion of their caloric needs.”
“For instance, the meat and fat from a single elephant can supply millions of calories, enough to sustain a group of 20 to 30 people for over a month.”
“Thus, hunting elephants and hippos was highly valuable—essentially a ‘bank’ of meat and fat that required protection and preservation, as it was sought after by predators and susceptible to decay.”
Through their analysis of findings and assessments of energetic benefits of preserving meat and fat, the researchers arrived at new conclusions that challenge previous theories. Early fires served dual purposes: first, to safeguard valuable resources from predators, and second, to facilitate smoking and prevent spoilage.
“This study introduces a novel perspective on the motivations behind early human fire use: the necessity to protect large game from other predators and the long-term preservation of substantial meat supplies,” Professor Barkay explained.
“Cooking may have occurred occasionally after fire was established for these protective purposes.”
“Such usage could elucidate evidence of fish roasting around 800,000 years ago found at Gesher Benot Ya’aqov.”
“Our approach aligns with evolving global theories that characterize major prehistoric trends as adaptations to hunting and consuming large animals, followed by a gradual shift to smaller prey exploitation.”
Survey results were published in the journal Nutrition Frontier.
____
Miki Ben-Dor & Ran Barkai. 2025. The bioenergy approach supports the conservation and protection of prey, rather than cooking, as a primary driver for early use of fire. Front. Nutr. 12; doi:10.3389/fnut.2025.1585182
Frankie Johnson, an inmate at William E. Donaldson Prison near Birmingham, Alabama, reports being stabbed approximately 20 times within a year and a half.
In December 2019, Johnson claimed he was stabbed “at least nine times” in his housing unit. Then, in March 2020, after a group therapy session, officers handcuffed him to a desk and exited the unit. Shortly afterward, another inmate came in and stabbed him five times.
In November that same year, Johnson alleged that an officer handcuffed him and transported him to the prison yard, where another prisoner assaulted him with an ice pick and stabbed him “five or six times,” all while two corrections officers looked on. Johnson contended that one officer even encouraged the attack as retaliation for a prior conflict between him and the staff.
In 2021, Johnson filed a lawsuit against Alabama prison officials, citing unsafe conditions characterized by violence, understaffing, overcrowding, and significant corruption within the state’s prison system. To defend the lawsuit, the Alabama Attorney General’s office has engaged law firms that have received substantial payments from the state to support a faulty prison system, including Butler Snow.
State officials have praised Butler Snow for its experience in defending prison-related cases, particularly William Lansford, the head of their constitutional and civil rights litigation group. However, the firm is now facing sanctions from a federal judge overseeing Johnson’s case, following incidents where its lawyers referenced cases produced by artificial intelligence.
This is just one of several cases reflecting the issue of attorneys using AI-generated information in formal legal documents. A database that tracks such occurrences has noted 106 identified instances globally, where courts have encountered “AI hallucinations” in submitted materials.
Last year, lawyers received one-year suspensions for practicing law in Florida’s Central District after it was found that they were citing cases fabricated by AI. Earlier this month, a federal judge in California ordered a firm to pay over $30,000 in legal fees for including erroneous AI-generated studies.
During a hearing in Birmingham on Wednesday regarding Johnson’s case, U.S. District Judge Anna Manasco mentioned that she was contemplating various sanctions, such as fines, mandatory legal education, referrals to licensing bodies, and temporary suspensions.
She noted that existing disciplinary measures across the country have often been insufficient. “This case demonstrates that current sanctions are inadequate,” she remarked to Johnson’s attorney. “If they were sufficient, we wouldn’t be here.”
During the hearing, attorneys from Butler Snow expressed their apologies and stated they would accept any sanctions deemed appropriate by Manasco. They also highlighted their firm policy that mandates attorneys seek approval before employing AI tools for legal research.
Reeves, an attorney involved, took full responsibility for the lapses.
“I was aware of the restrictions concerning [AI] usage, and in these two instances, I failed to adhere to the policy,” Reeves stated.
Butler Snow’s lawyers were appointed by the Alabama Attorney General’s Office and work on behalf of the state to defend ex-commissioner Jefferson Dunn of the Alabama Department of Corrections.
Lansford, who is contracted for the case, shared that the firm has begun a review of all previous submissions to ensure no additional instances of erroneous citations exist.
“This situation is still very new and raw,” Lansford conveyed to Manasco. “We are still working to perfect our response.”
Manasco indicated that Butler Snow would have 10 days to file a motion outlining their approach to resolving this issue before she decides on sanctions.
The use of fictitious AI citations has subsequently influenced disputes regarding case scheduling.
Lawyers from Butler Snow reached out to Johnson’s attorneys to arrange a deposition for Johnson while he remains incarcerated. However, Johnson’s lawyers objected to the proposed timeline, citing outstanding documents that Johnson deemed necessary before he could proceed.
In a court filing dated May 7, Butler Snow countered that case law necessitates a rapid deposition for Johnson. “The 11th Circuit and the District Court typically allow depositions for imprisoned plaintiffs when relevant to their claims or defenses, irrespective of other discovery disputes,” they asserted.
The lawyers listed four cases that superficially supported their arguments, but all turned out to be fabricated.
While some case titles were reminiscent of real cases, none were actually relevant to the matter at hand. For instance, one was a 2021 case titled Kelly v. Birmingham; however, Johnson’s attorneys noted that “the only existing case titled Kelly v. City of Birmingham could be uniquely identified by the plaintiff’s lawyers.”
Earlier this week, Johnson’s lawyers filed a motion highlighting the fabrications, asserting they were creations of “generative artificial intelligence.” They also identified another clearly fictitious citation in prior submissions related to the discovery dispute.
The following day, Manasco scheduled a hearing regarding whether Butler Snow’s counsel should be approved. “Given the severity of the allegations, the court conducted an independent review of each citation submitted, but found nothing to support them,” she wrote.
In his declaration to the court, Reeves indicated he was reviewing filings drafted by junior colleagues and included a citation he presumed was a well-established point of law.
“I was generally familiar with ChatGPT,” Reeves mentioned, explaining that he sought assistance to bolster the legal arguments needed for the motion. However, he admitted he “rushed to finalize and submit the motions” and “did not independently verify the case citations provided by ChatGPT through Westlaw or PACER before their inclusion.”
“I truly regret this lapse in judgment and diligence,” Reeves expressed. “I accept full responsibility.”
Damien Charlotin, a legal researcher and academic based in Paris, notes that incidents of false AI content entering legal filings are on the rise. Track the case.
“We’re witnessing a rapid increase,” he stated. “The number of cases over the past weeks and months has spiked compared to earlier periods.”
Thus far, the judicial response to this issue has been quite lenient, according to Charlotin. More severe repercussions, including substantial fines and suspensions, typically arise when lawyers fail to take responsibility for their mistakes.
“I don’t believe this will continue indefinitely,” Charlotin predicted. “Eventually, everyone will be held accountable.”
In addition to the Johnson case, Lansford and Butler Snow have contracts with the Alabama Department of Corrections to handle several large civil rights lawsuits. These include cases raised by the Justice Department during Donald Trump’s presidency in 2020.
Some Alabama legislators have questioned the significant amount of state funds allocated to law firms for defending these cases. However, this week’s missteps have not appeared to diminish the Attorney General’s confidence in Lansford or Butler Snow to continue their work.
On Wednesday, Manasco addressed the attorney from the Attorney General’s office present at the hearing.
“Mr. Lansford remains the Attorney General’s preferred counsel,” he replied.
TikTok has been penalized €530 million (£452 million) by the Irish regulator for failing to ensure that European user data transmitted to China would be safeguarded from access by the Chinese government.
The Irish Data Protection Commission (DPC) oversees TikTok’s operations across the European Economic Area (EEA), which includes all 27 EU member states along with Iceland, Liechtenstein, and Norway.
It was determined that the Chinese-owned video-sharing platform breached the General Data Protection Regulation (GDPR) by not adequately addressing whether EEA user data sent to China is shielded from the authorities there.
The DPC remarked: “TikTok did not consider the potential access by Chinese authorities to EEA personal data. China’s national security and anti-terrorism laws have been noted as diverging from EU standards by TikTok.”
According to the DPC, TikTok did not “verify, assure, or demonstrate” that the European user data sent to China was afforded a level of protection comparable to that guaranteed within the EU.
TikTok stated that it would not “certify” that the DPC transfers European user data to Chinese authorities. The company claimed it has never received such a request from Chinese officials nor provided user data to them.
Moreover, TikTok has been directed to cease data transfers to China unless compliant processing measures are implemented within six months.
For instance, the National Intelligence Act of 2017 in China mandates that all organizations and citizens “support, assist, and cooperate” with national intelligence efforts.
The DPC noted that the data was “remotely accessed by TikTok’s Chinese staff.”
The watchdog also reported that TikTok provided “false information” during the investigation, initially claiming it had not stored user data from the EEA, but later acknowledging the possibility of storing “limited” European user data in China.
The Dublin-based regulator expressed that it takes “inaccurate” submissions very seriously and is evaluating whether additional regulatory actions are necessary.
The security of TikTok user data has been a longstanding concern among politicians regarding its Chinese ownership. The app still faces the threat of a ban in the US, with legislators on both sides of the Atlantic cautioning that the Chinese state may have access to user data. TikTok is managed by an organization based in Beijing.
In response to the ruling, TikTok announced its intent to appeal and mentioned that safeguards have been put in place under the Project Clover Data Security Scheme, introduced in March 2023. The DPC investigation covered the period from September 2021 to May 2023.
The DPC’s decision also included a finding from 2021 that a privacy statement provided to users did not disclose that data could be accessed in China when personal user data was transferred to a third country. The Privacy Policy was subsequently revised in 2022 to clarify that data is accessible in China.
Following the changes in 2022, TikTok acknowledged that it could access European user data in countries like China to perform checks on platform functionalities, including the effectiveness of algorithms that recommend content to users and identify problematic automated accounts.
Chinese researchers have been granted access to British Grand Prix records of half a million, despite concerns from Western intelligence agencies about the authoritarian regime’s accumulation of health data, as revealed by the Guardian.
The records are set to be transferred to UK Biobank, a research hub housing detailed medical information from 500,000 volunteers. This extensive health data repository is made accessible to universities, scientific institutions, and private companies. Guardian analysis indicates that one of the five successful applications for access originates from China.
Health authorities had been evaluating the need for additional protection measures for patient records as they are integrated with genomes, tissue samples, and questionnaire responses at UK Biobank. Personal details such as date of birth are stripped from UK Biobank data before sharing, but experts warn that in some instances, individuals could still be identifiable.
Despite warnings from MI5 about Chinese entities accessing UK data under the direction of China’s intelligence agency, UK Biobank, which oversees health data, has recently given clearance for Chinese researchers to access GP records.
As UK Ministers cozy up to Beijing in pursuit of economic growth, the decision reflects a delicate balance to avoid antagonizing the influential superpower, which prioritizes biotechnology advancement. The UK-China relationship is already under strain due to issues like the ownership of a China-owned steel factory in Scunthorpe and new regulations on foreign interference.
A government spokesperson emphasized that security and privacy are paramount considerations when utilizing UK health data for disease understanding and scientific research. They reassured that health data is only shared with legitimate researchers.
The UK Biobank has been a major success in advancing global medical research, according to Chi Onwurah, a Labour MP heading the Congressional Science and Technology Committee. She stressed the need for a comprehensive government strategy to ensure data control and secure, responsible data sharing in the geopolitical landscape.
Approval of access to patient records
Out of 1,375 successful applications for UK Biobank data access, nearly 20% come from China, second only to the US. Chinese researchers have leveraged UK Biobank data for research on topics like air pollution and dementia prediction.
In recent years, the US government has imposed restrictions on BGI subsidiaries due to concerns about their collection and analysis of genetic data potentially aiding Chinese military programs. Nevertheless, UK Biobank approved a research project with a BGI unit, emphasizing the need for strict compliance with UK data laws.
The UK Biobank representative dismissed claims of genetic surveillance or unethical practices by BGI, stating that the focus is on civilian and scientific research. The UK Biobank continues to engage with MI5 and other state agencies to oversee data use, including collaborations with Chinese entities.
Despite some opposition, patient records are being transferred to UK Biobanks and other research hubs as part of a directive from the Health Secretary. Access to these records is strictly regulated by NHS England based on security and data protection considerations.
NHS England requires overseas data recipients to be authorized for access to personal data in compliance with UK data laws. Regular audits ensure that data sharing processes meet security standards. Chinese researchers can now apply for access to GP records through the approved platform.
China is “developing the world’s largest biodatabase.”
Data repositories like UK Biobank play a crucial role in global research efforts, with some experts cautioning about China’s intent to leverage genomic and health data for biotech advancement. Intelligence sources suggest that health data could be exploited for espionage if anonymization is breached.
MI5 raised concerns about China’s National Intelligence Act and its implications for personal data controllers interacting with Chinese entities. China’s ambition to develop a vast biodatabase has drawn scrutiny from intelligence officials worldwide.
Privacy advocates have questioned the transfer of UK health data to China, urging vigilance against potential misuse in “hostile states.” UK Biobank has revamped its data sharing practices to enhance security and ensure that patient data is safeguarded.
Despite the concerns, UK Biobank CEO Professor Rory Collins underscores the importance of explicit consent from volunteers for studying health data, particularly GP records.
This appeal will be reviewed by the investigative courts to determine if the national intelligence agency acted unlawfully.
What is the UK government requesting from Apple?
The Ministry of Home Affairs has issued a “Technical Capacity Notice” under the Investigation Powers Act, requiring businesses to assist law enforcement in providing evidence. The focus is on Apple’s Advanced Data Protection Service, which encrypts personal data stored on Apple’s cloud servers.
The UK government hopes that Apple will provide access to its services’ content through backdoors.
Why is Apple opposing this?
Apple values privacy as a core principle and has removed its Advanced Data Protection Tool from the UK. The tool offers end-to-end encryption, ensuring only the account owner can decrypt the data. Apple’s iMessage and FaceTime services maintain end-to-end encryption.
Apple faces opposition from human rights groups challenging the Technical Capacity Notice as a broad request that compromises billions of users’ personal data to potential threats.
Can Apple succeed in the challenge?
Legal lecturer Dr. Daniella Lock from King’s College London suggests Apple has a chance due to human rights considerations. The requirement for a backdoor to access encrypted data may be viewed as disproportionate, and questions arise about data security.
However, Lock acknowledges that the UK government’s secrecy surrounding the case could hinder Apple’s defense, as courts tend to support national security interests.
Does the US government support Apple?
The US government has expressed concerns about the UK’s demands on Apple, with President Trump likening it to Chinese surveillance practices.
“We told them you can’t do this,” Trump stated in an interview. “We actually said[Starmer]… can’t believe it. That’s what you know, you hear China.”
Would Apple’s defeat create a precedent?
Regardless of the outcome, future conflicts with tech companies are possible as the IPA requires companies to notify the government of changes affecting data access. Services like WhatsApp, committed to privacy, may also face similar requests.
This case represents a critical battleground between law enforcement and technology, balancing users’ privacy rights and overall security concerns.
There are few high-quality studies on the effectiveness of the smallpox vaccine against smallpox.
Emanuele Contini/Nuru Photo via Getty Images
One dose of one type of smallpox vaccine appears to reduce the risk of getting smallpox by about 60 percent, although this can vary depending on mutations of the virus.
Cases of MPOX, formerly known as monkeypox, are rapidly increasing in the Democratic Republic of Congo, driven by a variant called lineage Ib. The vaccine used to prevent MPOX was originally developed for smallpox, and although the two viruses are related, it is unclear whether it is specifically effective against MPOX.
For more information, Sharmistha Mishra Researchers at the Institute for Clinical Evaluative Sciences in Toronto, Canada, in collaboration with colleagues, focused on a vaccine called MVA-BN, also known as JYNNEOS, Imvanex, and Imvamune, which was the most widely used smallpox vaccine in Western countries during the 2022 smallpox outbreak caused by the clade IIb variant.
Studies have shown that the effectiveness of MVA-BN for mpox varies widely, from 36% to 86%. This range is likely because the studies are observational and compare results in people of different ages, locations, and health conditions.
A randomized controlled trial is being conducted among gay, bisexual and other men who have sex with men, who made up the majority of infections in Western countries during the 2022 outbreak.
Meanwhile, Mishra's team tried to mimic a randomized controlled trial using existing medical data. The researchers studied more than 6,000 Canadian men who were deemed to be at high risk for infection in 2022. About half received one dose of MVA-BN, and the rest did not receive the mpox vaccine. The two groups of men were matched by factors such as age and location, Mishra said.
While the official MVA-BN vaccination schedule calls for two doses administered at least 28 days apart, Mishra said the Canadian government initially opted for a one-dose vaccination protocol to spread the shots among as many at-risk people as possible.
During a follow-up period of approximately 80 days, 50 men in the unvaccinated group were diagnosed with MPOX compared to 21 in the vaccinated group, suggesting that MVA-BN reduced the risk by 58 percent.
This suggests that one dose is enough to provide protection. Adam Hacker At the London Coalition for Infectious Disease Preparedness Innovations Corinne Goertz van Kessel “Scientifically, we know that two doses are more effective,” Hacker told Erasmus MC in the Netherlands.
Geerts van Kessel says the team's approach was a good way to mimic a randomized controlled trial, but it is unclear whether some of the men, who are older than their mid-50s, were vaccinated when smallpox was a threat, which could have influenced their immune response to the 2022 MVA-BN.
Studying how the vaccine affects the severity of disease after infection with MPOX will also help assess the vaccine's overall effectiveness, she says.
It's also unclear how effective the drug is specifically against lineage Ib, Goertz van Kessel says, but both she and Hacker expect MVA-BN to be at least somewhat effective against that variant as well as it is against lineage IIb, which continues to circulate in West and Central Africa.
Be cautious of counterfeit eclipse glasses. A genuine pair should have a silver front lens and a black interior. It should be clearly marked with the manufacturer’s name and address and should not be damaged. Look for the ISO logo and code “IS 12312-2” on the inside as well.
If you don’t have eclipse glasses, you can make a DIY pinhole projector using white cardboard or paper, aluminum foil, and a pin. Cut a small square or rectangle in the center of the material, cover it with foil, and create a small hole with a pin. This projector allows you to safely view the sun’s image on a surface.
During a solar eclipse, position a second piece of material as a screen on the ground, hold the projector with the foil facing up, and adjust the distance to change the image size on the screen.
Important things to note when observing a total solar eclipse
Along the path of the eclipse, there are significant moments to witness as the event progresses.
As the sun dims during the eclipse, the surroundings start to darken, creating an eerie atmosphere.
The “diamond ring effect” was demonstrated after a total solar eclipse at Palm Cove in Australia’s tropical north Queensland state in 2012. Greg Wood/AFP – Getty Images File
Stay alert for the “diamond ring effect” as the last sunlight disappears, creating an illuminated halo around the sun and a diamond-like appearance.
As the light diminishes further, the Moon’s rough terrain creates Bailey beads. These small light beads are visible briefly as the remaining sunlight filters through the moon’s surface.
When the moon completely covers the sun, it is safe to remove your eclipse glasses and observe the total solar eclipse directly with the naked eye.
Cerebellum of a person suffering from kuru disease
Liberski PP (2013)
Genetic research in a very remote community in Papua New Guinea has revealed new insights into a brain disease that is spread when people eat dead relatives and has killed thousands of people over two decades.
Dotted with mountains, gorges, and fast-flowing rivers, Papua New Guinea’s Eastern Highlands province is extremely isolated from the rest of the world, and it wasn’t until the beginning of the 20th century that outsiders realized that about 1 million people lived there.
Some tribes known as the Fore practiced a form of cannibalism called “funeral feasts,” in which they consumed the bodies of their deceased relatives as part of their funeral rites. This could mean they ingested an abnormally folded protein called a prion, which can cause a fatal neurodegenerative condition called kuru associated with Creutzfeldt-Jakob disease (CJD). However, the local people believed that the Kuru phenomenon was caused by witchcraft. At least 2,700 Kuru deaths have been recorded in the eastern highlands.
Simon Mead Researchers at University College London examined the genomes of 943 people representing 68 villages and 21 language groups in the region. Although this region of Papua New Guinea covers just over 11,000 square kilometers, smaller than Jamaica, researchers say the different groups are as genetically different as the peoples of Finland and Spain, some 3,000 kilometers apart.
The study found that not everyone who attended the funeral died from the disease. Mead and his colleagues say it appears communities were beginning to develop a resistance to kuru, which led to tremors, loss of coordination, and, ultimately, death.
The study found that some of the elderly women who survived the feast had mutations in the gene encoding the prion protein, which likely conferred resistance to kuru disease.
By the 1950s, funeral feasts had become illegal, and the kuru epidemic began to subside, but visitors say that the number of women in some villages had dwindled because so many women had died from kuru. It pointed out. Mead said women and children are most susceptible to the disease, likely because they ate the brains of deceased relatives.
However, genetic evidence shows that despite fears of the disease, there was a large influx of women into Fora tribal areas, particularly in areas where the highest levels of kuru were present.
“We believe it is likely that the sexual prejudice caused by Kuru caused single men in Kuru-affected communities to look further afield for wives than usual because they were unable to find potential wives locally. “We will,” Meade said.
He said the team wants to understand what factors confer resistance to prion diseases such as CJD, which caused a severe epidemic in the UK in the 1990s.
“[Our work sets] “This is a site to detect genetic factors that may have helped the Fore people resist kuru,” Mead said. “Such resistance genes may suggest therapeutic targets.”
Ira Debson Researchers from the Garvan Institute of Medical Research in Sydney, Australia, say the study provides new insight into the “rich and unique cultural, linguistic and genomic diversity” of the Eastern Highlands region.
“This is a demonstration of how genomics can be used to look almost back in time, reading the genetic signature of past epidemics and understanding how they have shaped today’s populations. It helps.”
Cerebellum of a person suffering from kuru disease
Liberski PP (2013)
Genetic research in a very remote community in Papua New Guinea has revealed new insights into a brain disease that is spread when people eat dead relatives and has killed thousands of people over two decades.
Dotted with mountains, gorges, and fast-flowing rivers, Papua New Guinea’s Eastern Highlands province is extremely isolated from the rest of the world, and it wasn’t until the beginning of the 20th century that outsiders realized that about 1 million people lived there.
Some tribes known as the Fore practiced a form of cannibalism called “funeral feasts,” in which they consumed the bodies of their deceased relatives as part of their funeral rites.
This could mean they ingested an abnormally folded protein called a prion, which can cause a fatal neurodegenerative condition called kuru associated with Creutzfeldt-Jakob disease (CJD). there was. However, local people believed that the Kuru phenomenon was caused by witchcraft. At least 2,700 Kuru deaths have been recorded in the eastern highlands.
simon mead Researchers at University College London examined the genomes of 943 people representing 68 villages and 21 language groups in the region. Although this region of Papua New Guinea covers just over 11,000 square kilometers, smaller than Jamaica, researchers say the different groups are as genetically different as the peoples of Finland and Spain, some 3,000 kilometers apart. ing.
The study found that not everyone who attended the funeral died from the disease. Meade and his colleagues say it appears that communities were beginning to develop a resistance to kuru, which led to tremors, loss of coordination and, ultimately, death.
The study found that some of the elderly women who survived the feast had mutations in the gene encoding the prion protein, which likely conferred resistance to kuru disease.
By the 1950s, funeral feasts had become illegal and the kuru epidemic began to subside, but visitors say that the number of women in some villages had dwindled because so many women died from kuru. It pointed out. Mead said women and children are most susceptible to the disease, likely because they ate the brains of deceased relatives.
However, genetic evidence shows that despite fears of the disease, there was a large influx of women into Fora tribal areas, particularly in areas where the highest levels of kuru were present.
“We believe it is likely that the sexual prejudice caused by Kuru caused single men in Kuru-affected communities to look further afield for wives than usual because they were unable to find potential wives locally. “We will,” Meade said.
He said the team wants to understand what factors confer resistance to prion diseases such as CJD, which caused a severe epidemic in the UK in the 1990s.
“[Our work sets] “This is a site to detect genetic factors that may have helped the Fore people resist kuru,” Mead said. “Such resistance genes may suggest therapeutic targets.”
Ira Debson Researchers from the Garvan Institute of Medical Research in Sydney, Australia, say the study provides new insight into the “rich and unique cultural, linguistic and genomic diversity” of the Eastern Highlands region.
“This is a demonstration of how genomics can be used to almost look back in time, reading the genetic signature of past epidemics and understanding how they have shaped today’s populations. It helps.”
WIs hats next for 23andMe? Most people know this biotech company as a genetic testing service. The story of a woman who sends a cheek swab through the mail and discovers that the parents who raised her were not her biological parents has become something of a millennial horror genre. Of course, most 23andMe experiences aren’t that dramatic. The company says more than 14 million people have used the service to learn more about their ancestry.
But this month, 23andMe revealed it was facing major financial troubles, and more information emerged about the company’s devastating security breach last year. Now, customers may be wondering, “Can I trust his DNA on 23andMe?”
DNA “bait and switch”
Last week, 23andMe reported dismal third-quarter results, and the company’s stock price slumped. CNBC reported. The company’s financial difficulties come down to longevity issues. The company’s most famous service, DNA ancestry testing, is a one-time transaction. After being tested, there is no reason for consumers to continue paying for his 23andMe, and it has reached a kind of plateau.
Nevertheless, the company’s CEO, Ann Wojcicki, said: wired She remains “optimistic” about 23andMe’s future.
At-home DNA testing is so popular that you can even order one for your dog. 23andMe was the first company to offer this (human) service in 2007, and it now serves an estimated one in five American girlfriends. I’ve tried Genetic testing that can be done at home. Some customers handed over personal data that Wojcicki and others used for purposes other than family reunions.
From 2018 to 2023, 23andMe partnered with pharmaceutical giant GlaxoSmithKline to use customers’ genetic information to help develop drug targets. (Drug targets are molecules involved in a disease. Researchers use them to develop treatments for specific diseases.) This year, the partnership became non-exclusive. This means 23andMe can sign deals with more drug companies and squeeze more money out of them. From the treasure trove of DNA.
“This is a real resource that different organizations can apply to their own drug discovery,” Wojcicki said, adding that 23andMe is interested in researching inflammatory immunology, particularly asthma.
23andMe already has two cancer drugs in clinical trials. These drugs are created from the user’s genetic data. But 23andMe users may not realize that the spit they gave the company months or years ago is being used to make more money.
As Health Reporter Kristen V. Brown I have written For Bloomberg in 2021: “It’s strange that the 8.8 million 23andMe customers who once said, sure, use my data for whatever they want and didn’t check the box, now feel like they’ve been baited. Now they’re making the switch because their genes lay the foundation for potential cancer treatments. ” (Since 2021, the number of customers who have checked that box has grown to 10 million, according to Wired.)
Customer can withdraw consent
Americans tend to believe that their health data is protected by Hipaa, the medical privacy law, and 23andMe, with its official-looking cheek swabs and far-flung labs, sure is too. However, 23andMe is not a healthcare provider.same rules do not apply.
“There are no significant safeguards or regulations around the collection and sale of truly sensitive personal data,” said Suzanne Bernstein, a legal researcher at the Electronic Privacy Information Center. “A nefarious presence for 23andMe.” [data] A breach constitutes a security issue, but so does a company sharing your information with a third party you don’t know. Customers can technically consent to data sharing by agreeing to terms and conditions, but they are very long and many people don’t read them. ”
Ann Wojcicki, CEO of the company, 2015. Photo: Brad Barket/Getty Images for Fast Company
Some people may feel honored to have their genes used in cancer research. Some people may feel cheated because they paid about $229 for a DNA test kit and 23andMe is using their health data for free. Torin Klosowski, a security and privacy activist at the Electronic Frontier Foundation, said 23andMe could do more to help customers better understand the move before opting in.
“The fact that so many people are surprised by the amount of data being leaked elsewhere is a sign that 23andMe is not explaining things very clearly,” he said.
Klosowski added that users can opt out of 23andMe’s use of their data long after they have shipped their DNA swab, but that information may already have been used for research purposes. “You can ask 23andMe to stop using your information, but you cannot ask 23andMe to remove your sold data from its lists,” he said.
On the other hand, 23andMe maintain Users are asked to select a survey at the time of purchase and all personal data is de-identified before being shipped for analysis. Your data will not be used without this consent, which you can withdraw. The company’s research department is also overseen by an “independent and impartial” review board. (23andMe did not respond to a request for comment.)
Data breaches lead to class action lawsuits
The 23andMe security breach is still on the minds of many customers. Approximately 7 million customer profiles were hacked last year. Over a five-month period, hackers compromised the personal information of up to 5.5 million people who opted in to one of 23andMe’s best-known features, including their career status reports. I was able to access my health records. Find relatives.
Customers of Chinese and Ashkenazi Jewish descent appear to have been targeted in the breach, and their information was sold on the dark web, the New York Times reported. report. Some of these users recently filed a class action lawsuit against 23andMe, alleging the company failed to notify them of the exposure.
As The Guardian reported on Thursday, 23andMe in a letter to customers downplayed its responsibility for the hack and made claims about the health information that was accessed. “It cannot be used for the purpose of causing harm. The company also criticized customers for “carelessly recycling their passwords and not updating them,” a response one former customer called “morally and politically foolish.”
Wojcicki did not directly discuss the breach due to pending litigation, but told Wired that 23andMe introduced two-factor authentication and forced customers to reset their passwords. “Data privacy and security has always been a very high priority and continues to be a high priority for the company, and we intend to further invest in it,” she said.
Will 23andMe’s security problems spell the end for a company once hailed as a “corporate” by Time? inventions of the year? Regardless of whether customer privacy concerns are well-founded, the company’s financial position is rapidly deteriorating, and CNN report If the stock price does not rise, the company could be delisted from the Nasdaq.
Dominic Sellitto, a clinical assistant professor at the University at Buffalo who specializes in digital privacy, believes that if 23andMe survives this year, it will be thanks to data mining. “There is a lot of demand and funding for data, especially high-quality health data,” he said. “If 23andMe continues to monetize, it will be the golden ticket in 2024.”
According to a whistleblower, Mark Zuckerberg’s Meta Inc. has not done enough to protect children following Molly Russell’s death. The whistleblower claimed that the social media company already poses a risk to teenagers and that Zuckerberg had put in place infrastructure to protect against such content.
Arturo Bejar, the owner of Instagram and Facebook, voiced his concern that the company had not learned from Molly’s death and could have provided a safer experience for young users. Bejar’s survey of Instagram users revealed that 8.4% of 13- to 15-year-olds had seen someone harm themselves or threaten to harm themselves within the past week.
Bejar stressed that if the company had taken the right steps after Molly Russell’s death, the number of people encountering self-harm content would have been significantly lower. Russell, who committed suicide after viewing harmful content related to suicide, self-harm, depression, and anxiety on Instagram and Pinterest, sparked the whistleblower’s concerns. Bejar believes that the company could have made Instagram safer for teens but chose not to make necessary changes.
Former Meta employees have also asked the company to set goals for reducing harmful content and creating sustainable incentives to work on these issues. Meanwhile, Béjart has met with British politicians, regulators, and activists, including Ian Russell, Molly’s father.
Bejar has suggested a series of changes for Meta, including making it easier for users to flag unwanted content, surveying users’ experiences regularly, and facilitating the reporting of negative experiences with Meta’s services.
Multiple sclerosis is an autoimmune disease that occurs when the immune system starts attacking the nerves.
Katerina Conn/Science Photo Library
The largest genetic database of ancient humans to date is shedding new light on why people vary in modern conditions such as multiple sclerosis (MS) and other genetic traits such as height.
One of the findings is that the genes behind MS may have become more common because they helped people resist infections transmitted from animals.
Other findings include why Alzheimer’s disease is more common in some groups than others and why people in northern Europe tend to be taller than people in the southern part of the continent. Includes description.
“What happened thousands of years ago can have a very serious impact on the health and longevity of people living today,” he says. Evan Irving Pease at the University of Copenhagen, Denmark.
The genes of people of European and Western Asian ancestry have been shaped by three major waves of migration. Modern hunter-gatherer humans first arrived in these areas about 45,000 years ago. Then, about 11,000 years ago, a wave of farmers arrived from the Middle East, followed by a further influx of pastoralists, now called the Yamnaya, from the Eurasian steppe.
To understand how these popular movements shaped the modern medical landscape, Irving Pease's team collected bone and tooth samples from approximately 5,000 ancient sites found in museum collections across Europe and Western Asia. The oldest one is 34,000 years old.
The latest study reports on the first batch of samples analyzed based on approximately 1600 individuals. The researchers compared these people to the genetic data of 410,000 people in a huge medical dataset called the UK Biobank, and analyzed only white participants to select participants with European ancestry. did.
The research team started by focusing on MS, an autoimmune disease that occurs when the immune system begins to attack nerves, often leading to progressive disability.What previous research has found 233 genetic variants associated with increased risk of MS.
Among modern people in the UK, those at high genetic risk of multiple sclerosis are more likely to have Yamnaya ancestry, a study has shown. The research team also found that some of these MS-predisposing genetic mutations first arose in the Yamnaya tribe and became more frequent among their descendants as they spread westward through Europe.
Given that some of the 233 variants associated with MS also affect the immune system, and that the Yamnaya people have lived among animals, researchers believe that the genes behind MS are probably The researchers concluded that the species may help protect against bacteria and viruses that can be transmitted to humans. animal.The team has previously shown that Some MS risk variants are associated with partial resistance to tuberculosis.
In another paper, researchers have revealed how our ancestry influences our genetic risk for Alzheimer's disease. Modern humans are more likely to have a gene called . Apo E4If you have more ancestors from Europe's first hunter-gatherers, you have a higher risk of developing Alzheimer's disease.
Another variant of this gene is Apo E2The result is a lower risk of Alzheimer's disease, which likely occurred in the incoming Yamnaya people because it provided protection against malaria and unknown viral infections, the researchers wrote in their paper.
Variants that protect against Alzheimer's disease do not confer a reproductive advantage, so they may not have been selected by evolution to have an effect on dementia, given that dementia typically develops long after people have had children. Yes, researchers say. benjamin trumbull from Arizona State University and was not involved in any research.
“The great thing about this paper is that they go further back in time and say what was advantageous or disadvantageous at that time,” Trumbull said. “Too often we look at our modern environment and say: [a certain gene] Purely harmful. We have to consider what the selection pressures were at different points in time. ”
A further finding from the analysis is that among people living in Europe, those with more Yamnaya ancestry tend to be taller, which explains why Northern Europeans are, on average, taller than Southern Europeans. This may explain why it is so expensive.
Stanford Medicine and international collaborators have discovered that around 20% of individuals carry genetic mutations that reduce their risk of Alzheimer’s disease or Parkinson’s disease by 10% or more. This particular variant, known as DR4, has the potential to enhance future vaccines for these neurodegenerative diseases. In addition, the study found a potential link between the tau protein and both diseases, providing new possibilities for targeted therapies and vaccines.
The large-scale analysis included medical and genetic information from a wide range of individuals across different continents. This data analysis revealed that certain gene variants related to immune function are associated with a lower risk of developing Alzheimer’s and Parkinson’s diseases. Approximately one in five people possess a specific genetic mutation that provides resistance to both diseases.
The research, led by Stanford Medicine, indicates that individuals with this protective genetic mutation may be less likely to benefit from future vaccines aimed at slowing or stopping the progression of these common neurodegenerative diseases. Results from the analysis of medical and genetic data from hundreds of thousands of people from diverse backgrounds confirmed that carrying the DR4 allele increased the average chance of developing Parkinson’s or Alzheimer’s disease by more than 10%. New evidence has also surfaced suggesting that the tau protein, which is known for aggregating in the brains of Alzheimer’s patients, may also play a role in the development of Parkinson’s disease.
The study, published in the Proceedings of the National Academy of Sciences, was a collaboration between researchers at Stanford Medicine and international partners. The researchers involved in this study were Emmanuel Mignot, MD, Michael Gracius, MD, Iqbal Farooq, and Asad Jamal from Stanford Medicine, as well as Dr. Jean-Charles Lambert from Inserm, University of Lille, France. The lead author was Yan Le Nguyen, Ph.D., and other contributors included Dr. Guo Luo, Dr. Aditya Ambati, and Dr. Vincent Damot.
Further findings from the study showed that individuals with the DR4 allele were more likely to develop neurofibrillary tangles, characteristic of Alzheimer’s disease, in their brains. The study also suggests that tau, a protein central to Alzheimer’s disease, may have an unknown role in Parkinson’s disease.
DR4 is a particular allele of the DRB1 gene, which is a part of the human lymphocyte antigen complex. This complex is crucial in allowing the immune system to recognize the internal contents of cells. One of the significant findings of this study was that the specific peptide fragment that DR4 recognizes and presents is a chemically modified segment of the tau protein, which plays a role in both diseases. The study suggests that the DR4 allele could be used to create a vaccine targeting this modified peptide as a potential way to interfere with tau aggregation and the development of these neurodegenerative diseases. There may be potential to delay or slow the progression of the diseases in individuals who carry the protective variants of DR4.
The study also noted that the effectiveness of the vaccine may depend on the subtype of DR4 a person carries, which varies among different ethnic groups. For example, one subtype of DR4 that is more common among East Asians may be less protective against neurodegenerative diseases.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.