Friday, February 6, 2026

The AI that mimics humans can influence political decisions.




“Researchers are warning that coordinated swarms of AI-controlled personas could quietly reshape online political discourse without ever looking like traditional bots. Credit: Shutterstock" (ScitechDaily, The AI Threat You’ll Never See Coming Is Already Talking to You Online)

Coordinated swarms of AI personas can now mimic human behavior well enough to manipulate online political conversations and potentially influence elections.” (ScitechDaily, The AI Threat You’ll Never See Coming Is Already Talking to You Online)

The multi-agent AI can act as a swarm. That can influence large-scale internet conversations. That can affect political decisions. The thing. Like an ability. To use the AI-agents. As. A hacking tool. That makes it possible to hijack things like media. Those systems learn very fast, and they can mimic certain people’s behavior. The material that the AI can use to create the agent. That mimics. The person determines. How well the AI can mimic the person. 

This kind of AI can be used as a virtual second body. The person who has that kind of system can use that agent as a tool. That allows the user to play anything. That user wants. The user can play a woman, a man, or a dog. or a cat. The AI agent can be combined with another AI agent with different abilities. This means that the AI is like a Swiss Army knife. 

There is a possibility that AI. Which mimics humans. Can play humans and affect politics. There is only a little possibility that. The AI can control political control at the state level. But things like pre-elections. That these are internal affairs of the political movements might not be as highly secured as the state-level elections. 

“Newer large language models paired with multi-agent systems make it possible for one operator to run a whole cast of AI “voices” that appear local and authentic. Each persona can speak in a slightly different style, reference community norms, and respond quickly to pushback, which makes the activity harder to spot as manipulation.” (ScitechDaily, The AI Threat You’ll Never See Coming Is Already Talking to You Online)

“The swarm can also run massive numbers of quick message tests, then amplify the versions that change minds most effectively. Done well, it can manufacture the feeling. That “everyone is saying this:” Even. When that consensus is carefully engineered.” (ScitechDaily, The AI Threat You’ll Never See Coming Is Already Talking to You Online)

Another point is where the AI can influence election campaigns. Are. The TV broadcasts. Artificial intelligence can replace the camera image using virtual reality and virtual characters. When. People should see their candidate on TV- the AI hijacks the system, and then replaces real persons. B using virtual characters. The swarm of those virtual characters. It can mimic humans. The character that we see. It can look like. A real person. That thing. Can be used in private. Or in public life. The customer service can use the human-shaped AI agents. 

But there is a possibility. Those people. Who. Go to a remote meeting. Uses the AI agents as representatives. This means that those people can do anything other than be in the meeting. A similar AI character can be used in hacking operations. 

But. The things. That the character makes. They are remotely controlled. Trained AI can make a swarm.  Of. Limited language models that can chat or talk through the telephone. Those things can form an illusion that everybody thinks that way. Each of those AIs can give an individual-looking answer. When we think of a possibility. That these kinds of language models could slip into real conversations, we always forget one very important thing. There are many people on the net. Who. Wants to influence politics. This means that this kind of actor can create an AI swarm. That can give. A very big influence. To people who watch the debate. 


 https://scitechdaily.com/the-ai-threat-youll-never-see-coming-is-already-talking-to-you-online/


Thursday, February 5, 2026

The WiFi can turn into a universal surveillance tool.



"Researchers show that ordinary WiFi signals can be used to create camera-like images of people in their surroundings, even if those people are not carrying active devices. Credit: Shutterstock" (ScitechDaily, Researchers Warn: WiFi Could Become an Invisible Mass Surveillance System)

The WiFi system can act like radar. It can track people and devices using the radio echoes. The WIFI support stations can also act like Doppler radars. When those systems are in line, the system can search. The transition of the echo comparison.The strength. Of the echo in different antennas. The WiFi systems can also use the radio signals. That. It sends from different positions. The system can use many methods. To track people. Even if their devices are shut down. The system can locate computers. Very easily.  

If a certain computer shuts down, the system can simply take over. An image of that place. Then it can give. The image of the user is sent to other cameras and tracks the targeted person in the network area. The NAT technology means that. Multiple WLAN hotspots can offer access to the network by using different names. Normally, a WLAN, or WiFi, makes contact with the strongest hotspot. That causes problems. Because if thousands of devices (Cell phones, cameras, computers, cash systems) make contact with the same hotspot, that can cause the failure. 

The NAT means that the system. Those requests. Access to the system. Can see the name of the access point. But. The name of the same access point can be different. If we look at it from inside the network. This ability is important. In the very huge networks. If hundreds or even thousands of devices come into contact with the hotspot at the same moment. That can cause a rush. This is the reason why there are password-protected access points and free access points. The password protection denies the possibility. That maybe. Thousands of devices can make contact. With the same hotspot. The password protection allows. The full-time access to shops. That needs the WiFi for their cash systems. 

The WiFi station is an interacting radio device. When we use technologies like WiFi and GSM (5G, etc.), we utilize similar technology all the time. The difference between 5G. And WiFi is how to log in. The 5G requires a SIM card, and the WiFi uses a network card.  WiFi takes. And. Maintains a connection with computers using the MAC address and IP address. 

When the computer makes first contact with the hotspot. It sends the MAC address to the system. Then the hotspot sends the IP address to the computer. Without that address, communication between the hotspot and the computer is impossible.

Those are the things that make WiFi “secured,” and the other purpose of those identifiers is to aim the data precisely. To a certain computer. This thing is important if the WiFi (WLAN) network uses roaming actions. The roaming. Means that when a user moves into the house. Roaming allows a computer to change. The access point. 

The thing. That allows a computer to select the right information from data that travels across the air using the same frequencies. It is encryption and decryption. When a computer makes a connection. To a WiFi hotspot, that hotspot gives it the decryption and encryption key. Those keys allow the computer to select data packages. That is meant for it. When the computer moves to the other hotspot area, the hotspot checks the encryption key. 

This allows for protecting data, but it also. Makes it possible to transport data. In the same frequency between multiple receivers. The GSM uses the same technology. And the SIM card is the key to that long-range WiFi system. The fact is that. The cell phone might not have a very long range. The GSM, like 5G base. It is in the hotspots and their cooperation with the cell phone. The 5G access points form the network of the access points. Some of those access points can have a connection. With the physical lines, but most of them operate wirelessly. 

The WiFi stations can also make it possible. To track certain computers. The system must only know the IP address of that computer. And then it can use triangular measurement to track the computer. Then it can aim the surveillance camera at that point. This is one way to observe people. Tracking the 5G telephone and computer is a similar operation. The relay station, or access points, can be equipped with radio bearing systems. Those systems are actually the encrypted versions of the LORAN system. 

The system uses a similar radio bearing antenna. That ship’s LORAN system is used to track the marine radios for finding its location. The radio bearing antenna. That is, the access point can track any system. That takes contact with it. The system. That is installed in the hotspot station, as one of its antennas, which can help the rescue crew. To locate the GSM that makes the emergency call. But. The same system can also detect cell phones and network cards that communicate. By using certain encryption keys. 


 https://scitechdaily.com/researchers-warn-wifi-could-become-an-invisible-mass-surveillance-system/

Monday, February 2, 2026

AI becomes smarter. By talking to itself.

 



“Inner speech and working memory architecture boost AI performance when multitasking and completing complex pattern generation challenges. Credit: Kaori Serakaki/OIST” (ScitechDaily, Letting AI Talk to Itself Made It Much Smarter)

When AI talks to itself, it produces the same thing as humans do when we talk to ourselves. That thing makes it possible to sort and process information better than being quiet. 

The AI clarifies things to itself when it surrounds the data it has stored in its memory. This thing makes it possible. To adjust and clarify that data. When AI, or Large Language Model (LLM), processes data, it surrounds the data through the system. The main dataflow. That travels in the system as a cycle. And. The sensors or other datasets bring new data to the main dataflow. The system. Looks like some kind of river; its tributaries bring new and more or less fresh information to that main flow. 

The idea is that the physical system of the AI processor mimics the human brain. Individual processors act like a certain brain area. Microchips handle the same missions as real neurons handle in human brain lobes.  And the system surrounds data through those servers or processor groups. Just like human brains. When the AI talks to itself, it can send the same data to all data handling units. at the same time. 



Image: Human brain lobes. The data system can have servers that are divided to operate. As human brain lobes do. In those systems. Each of those brain lobes. Have a match as a server. 





“A massive study shows that AI can now beat the average human on certain creativity tests. Yet the most creative people remain well ahead, highlighting AI’s role as a creative assistant rather than a replacement. Credit: Shutterstock” (ScitechDaily, AI Is Now More Creative Than the Average Human)




Permutation of A,B,C. The AI uses this method when it combines items or possibilities with each other. This is the method. On how a morphing neural network handles data. (Below)



The AI is more creative than an average person. The reason for that is this. AI is an effective tool. To collect and compile data from different data sources. The AI can use larger-scale datasets and compile data from multiple sources more effectively than a human. A normal thesis student reads about 100 books and uses some of them as sources. 

The AI can use tens of thousands, or even billions of sources. The AI can sort and compile that data more effectively than humans. The AI can beat a human. In certain creativity tests. Because those tests include a limited number of possibilities. The 200-300 possibilities. Might look. Very many.  But the AI can use more than even billions of sources. The system uses the permutative method to connect possibilities. To each other. 

This means that the AI makes fewer mistakes than humans if it uses precise and pre-processed data. The problem is that. When robots operate on streets. They have no time. To make an analysis. Of the data. That they collected. When the system surrounds data. 

It also finds new details from it. But. Another thing that makes AI more creative. Than an average human is this. There are many humans. Who. Doesn’t do any type of creative work. This means that. There is a lot. Of unused creative potential. If we let people innovate in workplaces. Many people operate. At work. That we could outsource to robots. 


https://scitechdaily.com/ai-is-now-more-creative-than-the-average-human/


https://scitechdaily.com/letting-ai-talk-to-itself-made-it-much-smarter/


Friday, January 30, 2026

The AI requires orders. On how it selects the right data.



The main problem. With the AI. It is that. It doesn’t distinguish between old and new sources. This causes a negative effect on its trustworthiness. These kinds of things. They can be fatal. If the AI uses old sources that don’t match the newest information. And one of the solutions. For this problem. Is that. The AI should have orders to use only the secured and trusted databases. 

This means that the person who gives orders can give an order. The AI to use. things like governmental homepages. In cases where AI must generate texts that should resonate with the law. In that case, the official homepages involve trusted information about laws. Another way to solve that problem is the interactive AI. 


1) The system can use the date as the priority. 


2)The system can introduce a source list and its dates to the user, who can accept or deny some of those sources. 


3) The system can introduce how those sources differ from each other. And then. The user can read them and accept or deny their use. 


4) The user can limit the sources that the AI uses only to trusted homepages. 


5) The user can give orders to use data that a certain system collects. The user can. As an example, give the main priority for information. That. The JWST telescope is collected. 


The system communicates with the user. It can give a list of the sources that it found. The system can search the data when the source is downloaded to the network. Then it can search for differences from those pages. Then it can tell the user. What type of differences does it find? And if there are some differences, the system can introduce those differences. In an easier way. It can introduce the dates when those sources are published. 

And. The user can allow the use of sources. Or deny their use for the text generation process. This method is easier. But it's less effective. If we take focus from error-detection. The third way is to order the AI to use a certain type of source. The order can be. The system uses mainly data. That's what the JWST telescope collects. This means that the date when the newest tool entered service can be the limit that the AI uses. Those things should guarantee that the AI uses the latest and most trusted data. 


Thursday, January 29, 2026

What makes us intelligent?

 

“Modern neuroscience has revealed a brain made up of specialized networks, yet this fragmented view leaves open a central question: why human thought feels unified. A new neuroimaging study explores how large-scale patterns of communication across the brain give rise to general intelligence.” (ScitechDaily, Scientists May Have Found How the Brain Becomes One Intelligent System)

Finally. Researchers found. Why do brains start to form an intelligent entirety? Or they think that they have an answer for that question. We have multiple different cell types. In the brain. Some of those neurons work. With somatosensory. Some of them work with memories. Every single neuron type has its own role in the brain. The problem is, how those, maybe different, neuron types and brain areas orchestrate themselves to work as an entirety? This thing makes humans so different. When we talk. About things like consciousness. Sometimes we ask: why do things like animals escape predators? The answer is simple. When the predator starts to follow its prey, the rest of the pack can escape. 

Orchestrated brain cells make it possible. That. Humans can make things that are impossible for animals. The thing that makes that thing possible is that the human brain can handle abstraction. The abstraction means that when our company tells us that. We should beware things like wolves; we understand that thing. Without the need to see any wolves. This is one of the things that differentiates us from things. Like cows. When a wolf attacks one human. We will go to help that packmate. But cows do not make those things. 

They just escape, and a wolf kills one of them. Others will not help that poor member of the pack. Escaping can be a good choice, because most of the pack will survive. And the sacrificed member was always old and weak. That thing is an intelligent option. If the creature has no imagination. But in the cases of humans. Old people or old members of the group transmit hereditary knowledge to the next generation. 

We will always help other humans, because that benefits our species. When a species attacks, we can run, but we can also take a stone or some other weapon, and make a counter strike. Our brains are such a powerful tool. Because they start their operations at multiple points. At the same time. Our brains can connect memories into real-time observations. 

But then. We must realize that those neurons in our brains must behave as they behave to maximize their own benefit. As an orchestrated model where individual neurons serve the larger group of neurons, that thing gives them a benefit. Alone, one neuron is not a very dramatic thing. But. As a large group that controls the body. Those things make many things that are impossible. Orchestration gives those neurons power. And that makes them operate. As an intelligent entirety. In that case, intelligence means that we can make new things. Like houses, write computer programs. And make many things that are not happening just here and now. 

We could make a morphing neural network that mimics the human brain. We could divide its servers like neurons. They are divided in the human brain. We can make. The server group where each server has the same role as a certain brain area. Has in the human brain. This makes it possible to mimic the brain. 

The AI systems can manage things. Better. Than human brains, if they have ready-to-use models in their memories. This means that AI must face a similar situation before. If the AI must make. A new action model. It loses to human brains. The AI is not in a similar way. Flexible as human brains. When AI must make an action model. In a surprising situation, it loses. to human brains. 


https://scitechdaily.com/scientists-identify-the-evolutionary-purpose-of-consciousness/


https://scitechdaily.com/scientists-may-have-found-how-the-brain-becomes-one-intelligent-system/


https://scitechdaily.com/the-brains-strange-way-of-computing-could-explain-consciousness/


Saturday, January 24, 2026

An intelligent pill is a multipurpose tool.



“The outer layer of the capsule is made from gelatin coated with materials that block any radio frequency signal from being emitted (top left). Once the capsule is swallowed, the coating breaks down, releasing the drug along with the RF antenna (top right and bottom left). The materials are bioresorbable (bottom right). Credit: Courtesy of the researchers” (ScitechDaily, MIT’s Smart Pill Knows When You Swallow It)

The intelligent system that humans or animals can observe. How. Humans or animals eat. The microchip inside that system can detect things. Like poisons from food and water that a person eats. The system can also. Have things like GPS that help to locate a person. These kinds of systems can make it possible to observe human lifestyles. And in an emergency situation, that pill can tell the rescue crew. The position of the person. Those systems can also observe. The reactions of the body. And that helps observers to detect things like stress. 

The intelligent pill is a tool. That can have many abilities. All of them have no connection with medical work. The pill can, of course, tell if a person takes it. But it is a more multipurpose tool. 




“MIT engineers have designed a pill that can report when it has been swallowed. The outer layer of the capsule is made from gelatin coated with a layer of cellulose and either molybdenum or tungsten, which blocks any RF signal from being emitted. Credit: Mehmet Say”(ScitechDaily, MIT’s Smart Pill Knows When You Swallow It)



“MIT engineers have designed a pill that can report when it has been swallowed. The outer layer of the capsule is made from gelatin. Credit: Mehmet Say”. (ScitechDaily, MIT’s Smart Pill Knows When You Swallow It)

One of those things is this. That kind of pill can release its medicine in the precise right position. The intelligent pill can also release its medicines precisely at a certain moment. The term intelligent pill. Means the pill. That is equipped with microchips. Those microchips can communicate with cell phones or other Bluetooth devices. This means that those microchips can measure the functions of the digestive system. Those devices can take samples from the intestines and their bacteria. 

This thing can make it possible. To search for problems that the bad nutrient can cause. The system can also take samples. That can uncover cancer in the intestine. Those intelligent systems can also be used to give an ultrasound. Which comes from inside. That allows engineers. To make systems. That boosts the ultrasound-based internal organ research. The intelligent pill can also transmit data about the body functions to cell phones. And other kinds of mobile systems. Those systems can also communicate with nanorobots. That can operate. With things. like tissue damage. 


https://scitechdaily.com/mits-smart-pill-knows-when-you-swallow-it/

Are there any weaknesses in quantum encryption?



"Quantum key distribution relies on fragile quantum signals, and even small misalignments between transmitter and receiver can significantly affect its performance. A recent study introduces a new analytical framework that reveals how different types of pointing error influence error rates and secure key generation. Credit: Shutterstock"  (ScitechDaily, Scientists Uncover Hidden Weakness in Quantum Encryption)

There are mistakes in every system that humans created. The quantum encryption process always starts  in binary computers. So the attacker can benefit from connections that interconnect quantum and binary states. The binary computer encodes data and transfers it to the quantum level, where it is stored in qubits. The information. That which is connected with qubits is connected in a physical particle. There is always a possibility that if there is space between the quantum channel and the qubit, somebody can benefit from that space. 

That allows attackers to put a particle between the qubit and the quantum channel. In the so-called “tangent attack”. That is the quantum version of the “Man in the Middle” attack; the attacker uses the information. The quantum system is used for adjusting qubits for superposition and entanglement. The attacker brings their own quantum system near the information channel. Then the attacker puts information. Travel through the attacking system. 

That makes it possible to transport information from the qubit to that particle. This thing should remove information from the qubit. But the programming determines. How does that system handle? This kind of situation? Typing errors, or errors in pointing, can cause a situation where the qubit is destroyed. In that case, the system must generate a new qubit. And make the information resending process. 

“Quantum key distribution (QKD) is a next-generation method for protecting digital communications by drawing on the fundamental behavior of quantum particles. Instead of relying on mathematical complexity alone, QKD allows two users to establish a shared secret key in a way that is inherently resistant to interception, even if the communication channel itself is not private.” (ScitechDaily, Scientists Uncover Hidden Weakness in Quantum Encryption)

How effective is this system? That depends on the precise control of the information channels. If those information channels are not tight, the attacker can steal information from the qubits by putting particles between the qubit and the information channel’s shell. If the quantum channel is not tight enough, aiming information through with precise accuracy is not possible. 

“By combining statistical models of beam misalignment with quantum photon detection theory, researchers derived analytical expressions for key performance indicators of QKD systems, clarifying the exact role of pointing error in degrading secure key generation.” (ScitechDaily, Scientists Uncover Hidden Weakness in Quantum Encryption)




"The study’s findings explain the effects of pointing error on quantum key distribution performance metrics, offering insights for improving real-world systems. Credit: “Quantum bits” by Argonne National Laboratory" (ScitechDaily, Scientists Uncover Hidden Weakness in Quantum Encryption)

“The researchers focused on widely used BB84 QKD protocol and modelled pointing errors using Rayleigh and Hoyt distributions, which model horizontal and vertical beams better than simplified models used in earlier work. This leads to more accurate characterization of random pointing errors.”  (ScitechDaily,S cientists Uncover Hidden Weakness in Quantum Encryption)

That Reyleigh-Hoyt framework combination shows. The quantum information channel expansion. At a certain point. The Rayleigh distribution is connected to the Hoyt distribution. Or sector model. The Rayleigh distribution introduces a point of the information channel. And sector- or Hoyt distribution introduces the expansion of the information channel. 

“Using these statistical models, the researchers first derived analytical expressions for error and sift probabilities under pointing error, a first in the field. These were then used to compute the quantum bit error rate (QBER), which indicates the percentage of bits corrupted due to either system noise, environmental effects, and imperfections or attempted eavesdropping. QBER is therefore, a key performance metric. The researchers further used QBER to calculate the secret key rate (SKR) that measures the rate at which shared, secure keys can be generated. They analyzed the effects of pointing error caused due to both symmetric and asymmetric beam alignments.”(ScitechDaily,Scientists Uncover Hidden Weakness in Quantum Encryption)

“The results showed that an increased beam waist, and hence, increased pointing error, significantly degrades QKD performance, indicated by higher QBER and decreased SKR. Increasing receiver aperture size can improve performance, but only up to a certain level. Interestingly, asymmetric beam misalignment, where horizontal and vertical deviations are different, was found to be favorable for improving performance. The researchers also found that for achieving non-zero SKR, important for secure communication, increasing average photon numbers is required.”(ScitechDaily,Scientists Uncover Hidden Weakness in Quantum Encryption)

If somebody can affect the information channel. There is a possibility that the system resends the qubit to the attacker. Another possibility is that the attacker uses qubit synchronization information, which the system requires for superposition and quantum entanglement. In that case, those attackers can create their own qubits that they can use to steal information from the quantum system. This means that the attacker aims for a quantum entanglement through. The third-party system. We could call this thing the tangent attack. This requires that the attacker has their own quantum system, which can decode information from the quantum entanglement and then resend that information to the receiver. As I wrote before. 


https://phys.org/news/2026-01-errors-impact-quantum-key.html


https://scitechdaily.com/scientists-uncover-hidden-weakness-in-quantum-encryption/


https://en.wikipedia.org/wiki/Quantum_key_distribution


https://en.wikipedia.org/wiki/Sector_model


https://en.wikipedia.org/wiki/Rayleigh_distribution

The AI that mimics humans can influence political decisions.

“Researchers are warning that coordinated swarms of AI-controlled personas could quietly reshape online political discourse without ever loo...