Confronting tech-enabled abuse and advocating open artificial intelligence hardware

Tech-facilitated abuse is rampant in intimate partner violence, while calls to open up Artificial Intelligence hardware challenge the industry´s status quo.

Technology is increasingly being weaponized in cases of intimate partner violence, with abuse victims reporting relentless surveillance enabled by everyday smart devices. One such case is Gioia’s: after her divorce, she discovered her ex-husband was tracking her through a smartwatch given to their child, exploiting default settings that placed control in the abuser’s hands. Her experience is not isolated. Experts now recognize tech-facilitated abuse as a near-constant in domestic violence, yet significant preventative action remains lacking. The proliferation of connected devices has compounded privacy threats for vulnerable individuals, highlighting a concerning deficiency in both technical and regulatory approaches to safeguarding users.

Elsewhere in the technology landscape, voices are growing louder for democratizing the evolution of Artificial Intelligence hardware. Ayah Bdeir, a prominent figure in open source technology, cautions against the opaque, top-down model where a few elite firms dictate the tools shaping society. She argues for an alternative: open hardware ecosystems that empower individuals to shape, adapt, and understand their technologies. This movement contrasts sharply with Silicon Valley’s tradition of sealed black boxes, framing the debate in terms of consumer passivity versus active participation. As artificial intelligence´s influence spreads, the struggle to define access and agency in its foundational infrastructure is intensifying.

Other major developments capture the sprawling impact of technology worldwide. Iran´s decision to disconnect from the global internet to forestall cyberattacks, legal wrangling over applications like TikTok, and the proliferation of conspiracy theories after high-profile violent events reflect both the reach and risks of digital systems. Meanwhile, deepfake avatars are being used in China to help people grieve lost loved ones, further blurring lines between technology and emotion. The competitive arc between Artificial Intelligence and quantum computing also draws scrutiny, as Artificial Intelligence applications begin to demonstrate tangible advances in domains once considered the exclusive province of quantum devices. These stories collectively reflect the gravity and complexity of power struggles—technological, regulatory, and personal—shaping the current digital era.

81

Impact Score

U.S. senators propose broader chip tool export ban for Chinese firms

A bipartisan proposal in the U.S. Senate would shift semiconductor equipment controls from specific fabs to targeted Chinese companies and their affiliates. The measure is aimed at cutting off access to advanced lithography and other wafer fabrication tools for firms such as Huawei, SMIC, YMTC, CXMT, and Hua Hong.

Trump executive order targets state Artificial Intelligence laws

Executive Order 14365 lays out a federal strategy to discourage, challenge, and potentially preempt state Artificial Intelligence laws viewed as burdensome. Employers are advised to keep complying with current state and local rules while preparing for regulatory uncertainty in 2026.

Who decides how America uses Artificial Intelligence in war

Stanford experts are divided over how the United States should govern Artificial Intelligence in defense, surveillance, and warfare. Their views converge on one point: decisions with such high stakes cannot be left to companies alone.

GPUBreach bypasses IOMMU on GDDR6-based NVIDIA GPUs

Researchers from the University of Toronto describe GPUBreach, a rowhammer attack against GDDR6-based NVIDIA GPUs that can bypass IOMMU protections. The technique enables CPU-side privilege escalation by abusing trusted GPU driver behavior on the host system.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.