
iPhone 16 Pro leak just confirmed a huge camera upgrade
The tetraprism lens with 5x optical zoom currently exclusive to the iPhone 15 Pro Max could be headed to both the iPhone 16 Pro and iPhone 16 Pro Max, narrowing the gap between Apple's premium flagships. That's according to a new report from analyst Ming-Chi Kuo, who cites a recent earnings call with Apple lens supplier Largan. In the call, a spokesperson from Largan said "some flagship specifications will be extended to other models" in the second half of 2024, presumably in reference to the upcoming iPhone Pro models. "Apple is Largan’s largest customer, and Largan is also Apple’s largest lens supplier," Kuo said. "Therefore, the quote likely refers to the fact that the new iPhone 16 Pro and Pro Max will have a tetraprism camera in 2H24 (while only the iPhone 15 Pro Max had this camera in 2H23).” The report goes on to say that the tetraprism camera for the iPhone 16 Pro series won't be all that different from the one in the iPhone 15 Pro Max. While the lack of an upgrade is disappointing, it's not necessarily a bad thing as these kinds of lenses are already top-of-the-line. They represent a major increase over prior models’ zoom capabilities, and they're capable of offering more depth while still fitting into super-slim smartphones. That being said, Apple does appear to be revamping the main camera and ultra-wide camera on the iPhone 16 Pro Max. Evidence continues to mount that both iPhone 16 Pro models will share the same 5x optical zoom camera. Earlier this week, DigitTimes in Asia (via 9to5Mac) reported that Apple is set to ramp up orders for tetraprism lenses as it expands their use in its upcoming iPhone series. Industry sources told the outlet that Largan and Genius Electronic Optical were tapped as the primary suppliers. Apple would be wise to streamline its Pro-level iPhones with the same camera setup; then all customers have to consider with their choice of a new iPhone is the size and price. Of course, this should all be taken with a grain of sand for now until we hear more from Apple. It's still a while yet before Apple's usual September time window for iPhone launches. In the meantime, be sure to check out all the rumors so far in our iPhone 16, iPhone 16 Pro and iPhone 16 Pro Max hubs.
How China can transform from passive to active amid US chip curbs
On Monday, executives from the three major chip giants in the US - Intel, Qualcomm, and Nvidia - met with US officials, including Antony Blinken, to voice their opposition to the Biden administration's plan of imposing further restrictions on chip sales to Chinese companies and investments in China. The Semiconductor Industry Association also released a similar statement, opposing the exclusion of US semiconductor companies from the Chinese market. First of all, we mustn't believe that the appeals of these companies and industry associations will collectively change the determination of US political elites to stifle China's progress. These US elites are very fearful of China's rapid development, and they see "chip chokehold" as a new discovery and a successful tactic formed under US leadership and with the cooperation of allies. Currently, the chip industry is the most complex technology in human history, with only a few companies being at the forefront. They are mainly from the Netherlands, Taiwan island, South Korea, and Japan, most of which are in the Western Pacific. These countries and regions are heavily influenced by the US. Although these companies have their own expertise, they still use some American technologies in their products. Therefore, Washington quickly persuaded them to form an alliance to collectively prevent the Chinese mainland from obtaining chips and manufacturing technology. Washington is proud of this and wants to continuously tighten the noose on China. The New York Times directly titled an article "'An Act of War': Inside America's Silicon Blockade Against China, " in which an American AI expert, Gregory Allen, publicly claimed that this is an act of war against China. He further stated that there are two dates that will echo in history from 2022: The first is February 24, when the Russia-Ukraine conflict broke out, and the second is October 7, when the US imposed a sweeping set of export controls on selling microchips to China. China must abandon its illusions and launch a challenging and effective counterattack. We already have the capability to produce 28nm chips, and we can use "small chip" technology to assemble small semiconductors into a more powerful "brain," exploring 14nm or even 7nm. Additionally, China is the world's largest commercial market for commodity semiconductors. Last year, semiconductor procurement in China amounted to $180 billion, surpassing one-third of the global total. In the past, China had been faced with the choice between independent innovation and external purchases. Due to the high returns from external purchases, it is easy for it to become the overwhelming choice over independent research and development. However, now the US is gradually blocking the option of external purchases, and China has no strategic choice but to independently innovate, which in turn puts tremendous pressure on American companies. Scientists generally expect that, although China may take some detours, such as recently apprehending several company leaders who fraudulently obtained subsidies from national semiconductor policies, China has the ability to gradually overcome the chip difficulties. And we will form our own breakthroughs and industrial chain, which is expected to put quite a lot of pressure on US companies. If domestic firms acquire half of China's $180 billion per year in chip acquisitions, this would provide a significant boost for the industry as a whole and help it advance steadily. The New York Times refers to the battle on chips as a bet by Washington. "If the controls are successful, they could handicap China for a generation; if they fail, they may backfire spectacularly, hastening the very future the United States is trying desperately to avoid," it argued. Whether it is a war or a game, when the future is uncertain, what US companies hope for most of all is that they can sell simplified versions of high-end chips to China, so that the option of external purchases by China continues to exist and remains attractive. This can not only maintain the interests of the US companies, enabling them to obtain sufficient funds to develop more advanced technologies, but also disrupt China's plans for independent innovation. This idea is entirely based on their own commercial interests and also has a certain political and national strategic appeal. Hence, there is no shortage of supporters within the US government. US Secretary of the Treasury Janet Yellen seems to be one of them, as she has repeatedly stated that the US' restrictions on China will not "fundamentally" hurt China, but will only be "narrowly targeted." The US will balance its strict suppression on China from the perspective of maintaining its technological hegemony, while also leaving some room for China, in order to undermine China's determination to counterattack in terms of independent innovation. China needs to use this mentality of the US to its advantage. On the one hand, China should continue to purchase US chips to maintain its economic fundamentals, and on the other hand, it should firmly support the development of domestic semiconductor companies from both financial and market perspectives. If China were to continue relying on exploiting the gaps in US chip policies in the long term, akin to a dependency on opium, it would only serve to weaken China further as it becomes increasingly addicted. China's market is extremely vast, and its innovation capabilities are generally improving and expanding. Although the chip industry is highly advanced, if there is one country that can win this counterattack, it is China. As long as we resolutely continue on the path of independent innovation, this road will definitely become wider. Various breakthroughs and turning points that are unimaginable today may soon occur.

How to evaluate the product impact of the iPhone 16
At the Apple Developer Conference held earlier, the iPhone 16 series will be equipped with iOS 18 has been revealed. At the event, Apple showed off a series of convenient interactive experiences brought by Apple Intelligence, including a more powerful Siri voice assistant, Mail app that can generate complex responses, and Safari that aggregates web information. These upgrades will no doubt make the iPhone 16 line even more attractive. In order to use Apple Intelligence, a new feature of iOS 18, the iPhone 16 and 16 Pro series are equipped with A18 chips. An external blogger found in Apple's back end that the iPhone 16 series will use the same A-series chip, and the back end code mentions A new model unrelated to the existing iPhone. It includes four iPhone 16 series models, and the four identifiers all start with the same number, indicating that Apple is attributing them to the same platform. The new iPhone will have a stainless steel battery case, which will make it easier to remove the battery to meet EU market standards, while also allowing Apple to increase the density of the battery cell in line with safety regulations.
Koenigsegg Fused Three Hypercars Into One To Make The Chimera
Koenigsegg Agera RS Chimera combines technologies from Agera RS, CC850, and Jesko. An Agera RS platform features the engine from the Jesko and the simulated manual gearbox from the CC850. Development took three years, thanks to software and hardware integration challenges. A "chimera," for the uninitiated, is described as a mythical creature whose anatomy comes from multiple animals, creating a hybrid of two or more creatures' best bits. It's also the name of the latest one-off creation from Koenigsegg, and it's certainly apt; the Koenigsegg Agera RS Chimera is an amalgam of technologies from the decade-old, record-breaking Agera RS, the fascinatingly innovative CC850, and the awe-inspiring Jesko - which just recently set four new acceleration records. There's also a hint of Regera in here, which had some impressive records of its own. As reported by Mr. JWW, the strictly one-off special edition was commissioned by FIA President Mohammed Ben Sulayem, and both he and one of Koenigsegg's engineers arrived at the same name. Let's take a closer look and see exactly why this is a hybrid, even though it's not electrified. Three Cars In One The Chimera was originally a regular Agera RS and one of several Koenigsegg megacars owned by Ben Sulayem, but he asked Christian and the team to initiate a special project on his behalf. Around the same time, the extraordinary Koenigsegg CC850 was revealed at Monterey Car Week 2022, introducing the innovative Engage Shift System (ESS). This was based on the already astonishingly fast nine-speed Light Speed Transmission, with new actuators and sensors added to enable the simulation of a manual transmission without a physical link between the shifter and the gearbox. Like the rest of the world, the FIA boss was enamored by this novel technology, and as a wealthy 'Egg collector, he asked for it to be put into his special Agera-based project. Christian pondered this and ultimately decided to fulfill the request, in the process turning Ben Sulayem's special edition into something of a development mule for the ESS. But unlike the CC850, the Chimera got the larger turbos of the Jesko, enabling around 1,280 horsepower on regular gas and up to 1,600 hp on E85. That means this is an Agera RS with a CC850 transmission and a Jesko engine. On paper, that sounds simple, but the reality was anything but... Three Shifting Experiences Took Three Years To Combine According to a video from YouTuber and Koenigsegg distributor Mr. JWW, this development process took three years and required the relocation of the battery, new mounts for the powertrain, new harnesses, new software and controllers, and even a new infotainment system. To ensure all the electronics worked seamlessly was a challenge, but then Ben Sulayem asked for another layer of intricacy, requesting that paddle shifters be added, like in the Jesko Absolut and Jesko Attack. In the CC850, you could only switch between the simulated manual mode and fully automatic shifts, but now, the Chimera's development has unlocked manually operable paddles, which have now been added as the only option you can add to a CC850. There was also significant relocation and redesigning of suspension components, with parts from the Jesko and the Regera forming the subframe and elements of the suspension, respectively. A new scoop for the new transmission's cooler was also added, but it looks like it was always planned. Christian von Koenigsegg says this is a true one-off, saying that it would be cheaper and easier to start something all-new from scratch than to mix new and old technologies again, and that it's simply "too much work" to tackle a retrofit project. The Chimera is not completed just yet, as there are still subtle elements to refine, such as the bite point of the clutch pedal, but these minor issues will surely be resolved soon. It's an amazing feat, combining three hypercars in one, and we can't even fathom how Koenigsegg will top this in the future, but we don't doubt that Christian and his team will continue to do just that.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.