Feed aggregator
Crimson Memo: Analyzing the Privacy Impact of Xianghongshu AKA Red Note
Early in January 2025 it seemed like TikTok was on the verge of being banned by the U.S. government. In reaction to this imminent ban, several million people in the United States signed up for a different China-based social network known in the U.S. as RedNote, and in China as Xianghongshu (小红书/ 小紅書; which translates to Little Red Book).
RedNote is an application and social network created in 2013 that currently has over 300 million users. Feature-wise, it is most comparable to Instagram and is primarily used for sharing pictures, videos, and shopping. The vast majority of its users live in China, are born after 1990, and are women. Even before the influx of new users in January, RedNote has historically had many users outside of China, primarily people from the Chinese diaspora who have friends and relatives on the network. RedNote is largely funded by two major Chinese tech corporations: Tencent and Alibaba.
When millions of U.S. based users started flocking to the application, the traditional rounds of pearl clutching and concern trolling began. Many people raised the alarm about U.S. users entrusting their data with a Chinese company, and it is implied, the Chinese Communist Party. The reaction from U.S. users was an understandable, if unfortunate, bit of privacy nihilism. People responded that they, “didn’t care if someone in China was getting their data since US companies such as Meta and Google had already stolen their data anyway.” “What is the difference,” people argued, “between Meta having my data and someone in China? How does this affect me in any way?”
Even if you don’t care about giving China your data, it is not safe to use any application that doesn’t use encryption by default.
Last week, The Citizen Lab at The Munk School Of Global Affairs, University of Toronto, released a report authored by Mona Wang, Jeffrey Knockel, and Irene Poetranto which highlights three serious security issues in the RedNote app. The most concerning finding from Citizen Lab is a revelation that RedNote retrieves uploaded user content over plaintext http. This means that anyone else on your network, at your internet service provider, or organizations like the NSA, can see everything you look at and upload to RedNote. Moreover someone could intercept that request and replace it with their own media or even an exploit to install malware on your device.
In light of this report the EFF Threat Lab decided to confirm the CItizen Lab findings and do some additional privacy investigation of RedNote. We used static analysis techniques for our investigation, including manual static analysis of decompiled source code, and automated scanners including MobSF and Exodus Privacy. We only analyzed Version 8.59.5 of RedNote for Android downloaded from the website APK Pure.
EFF has independently confirmed the finding that Red Note retrieves posted content over plaintext http. Due to this lack of even basic transport layer encryption we don’t think this application is safe for anyone to use. Even if you don’t care about giving China your data, it is not safe to use any application that doesn’t use encryption by default.
Citizen Lab researchers also found that users’ file contents are readable by network attackers. We were able to confirm that RedNote encrypts several sensitive files with static keys which are present in the app and the same across all installations of the app, meaning anyone who was able to retrieve those keys from a decompiled version of the app could decrypt these sensitive files for any user of the application. The Citizen Lab report also found a vulnerability where an attacker could identify the contents of any file readable by the application. This was out of scope for us to test but we find no reason to doubt this claim.
The third major finding by Citizen Lab was that RedNote transmits device metadata in a way that can be eavesdropped on by network attackers, sometimes without encryption at all, and sometimes in a way vulnerable to a machine-in-the middle attack. We can confirm that RedNote does not validate HTTPS certificates properly. Testing this vulnerability was out of scope for EFF, but we find no reason to doubt this claim.
Permissions and TrackersEFF performed further analysis of the permissions and trackers requested by RedNote. Our findings indicate two other potential privacy issues with the application.
RedNote requests some very sensitive permissions, including location information, even when the app is not running in the foreground. This permission is not requested by other similar apps such as TikTok, Facebook, or Instagram.
We also found, using an online scanner for tracking software called Exodus Privacy, that RedNote is not a platform which will protect its users from U.S.-based surveillance capitalism. In addition to sharing userdata with the Chinese companies Tencent and ByteDance, it also shares user data with Facebook and Google.
Other IssuesRedNote contains functionality to update its own code after it’s downloaded from the Google Play store using an open source library called APK Patch. This could be used to inject malicious code into the application after it has been downloaded without such code being revealed in automated scans meant to protect against malicious applications being uploaded to official stores, like Google Play.
RecommendationsDue to the lack of encryption we do not consider it safe for anyone to run this app. If you are going to use RedNote, we recommend doing so with the absolute minimum set of permissions necessary for the app to function (see our guides for iPhone and Android.) At least a part of this blame falls on Google. Android needs to stop allowing apps to make unencrypted requests at all.
Due to the lack of encryption we do not consider it safe for anyone to run this app.
RedNote should immediately take steps to encrypt all traffic from their application and remove the permission for background location information.
Users should also keep in mind that RedNote is not a platform which values free speech. It’s a heavily censored application where topics such as political speech, drugs and addiction, and sexuality are more tightly controlled than similar social networks.
Since it shares data with Facebook and Google ad networks, RedNote users should also keep in mind that it’s not a platform that protects you from U.S.-based surveillance capitalism.
The willingness of users to so quickly move to RedNote also highlights the fact that people are hungry for platforms that aren't controlled by the same few American tech oligarchs. People will happily jump to another platform even if it presents new, unknown risks; or is controlled by foreign tech oligarchs such as Tencent and Alibaba.
However, federal bans of such applications are not the correct answer. When bans are targeted at specific platforms such as TikTok, Deepseek, and RedNote rather than privacy-invasive practices such as sharing sensitive details with surveillance advertising platforms, users who cannot participate on the banned platform may still have their privacy violated when they flock to other platforms. The real solution to the potential privacy harms of apps like RedNote is to ensure (through technology, regulation, and law) that people’s sensitive information isn’t entered into the surveillance capitalist data stream in the first place.
We need a federal, comprehensive, consumer-focused privacy law. Our government is failing to address the fundamental harms of privacy-invading social media. Implementing xenophobic, free-speech infringing policy is having the unintended consequence of driving folks to platforms with even more aggressive censorship. This outcome was foreseeable. Rather than a knee-jerk reaction banning the latest perceived threat, these issues could have been avoided by addressing privacy harms at the source and enacting strong consumer-protection laws.
Figure 1. Permissions requested by RedNote
Permission
Description
android.permission.ACCESS_BACKGROUND_LOCATION
This app can access location at any time, even while the app is not in use.
android.permission.ACCESS_COARSE_LOCATION
This app can get your approximate location from location services while the app is in use. Location services for your device must be turned on for the app to get location.
android.permission.ACCESS_FINE_LOCATION
This app can get your precise location from location services while the app is in use. Location services for your device must be turned on for the app to get location. This may increase battery usage.
android.permission.ACCESS_MEDIA_LOCATION
Allows the app to read locations from your media collection.
android.permission.ACCESS_NETWORK_STATE
Allows the app to view information about network connections such as which networks exist and are connected.
android.permission.ACCESS_WIFI_STATE
Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices.
android.permission.AUTHENTICATE_ACCOUNTS
Allows the app to use the account authenticator capabilities of the AccountManager, including creating accounts and getting and setting their passwords.
android.permission.BLUETOOTH
Allows the app to view the configuration of the Bluetooth on the phone, and to make and accept connections with paired devices.
android.permission.BLUETOOTH_ADMIN
Allows the app to configure the local Bluetooth phone, and to discover and pair with remote devices.
android.permission.BLUETOOTH_CONNECT
Allows the app to connect to paired Bluetooth devices
android.permission.CAMERA
This app can take pictures and record videos using the camera while the app is in use.
android.permission.CHANGE_NETWORK_STATE
Allows the app to change the state of network connectivity.
android.permission.CHANGE_WIFI_STATE
Allows the app to connect to and disconnect from Wi-Fi access points and to make changes to device configuration for Wi-Fi networks.
android.permission.EXPAND_STATUS_BAR
Allows the app to expand or collapse the status bar.
android.permission.FLASHLIGHT
Allows the app to control the flashlight.
android.permission.FOREGROUND_SERVICE
Allows the app to make use of foreground services.
android.permission.FOREGROUND_SERVICE_DATA_SYNC
Allows the app to make use of foreground services with the type dataSync
android.permission.FOREGROUND_SERVICE_LOCATION
Allows the app to make use of foreground services with the type location
android.permission.FOREGROUND_SERVICE_MEDIA_PLAYBACK
Allows the app to make use of foreground services with the type mediaPlayback
android.permission.FOREGROUND_SERVICE_MEDIA_PROJECTION
Allows the app to make use of foreground services with the type mediaProjection
android.permission.FOREGROUND_SERVICE_MICROPHONE
Allows the app to make use of foreground services with the type microphone
android.permission.GET_ACCOUNTS
Allows the app to get the list of accounts known by the phone. This may include any accounts created by applications you have installed.
android.permission.INTERNET
Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet.
android.permission.MANAGE_ACCOUNTS
Allows the app to perform operations like adding and removing accounts, and deleting their password.
android.permission.MANAGE_MEDIA_PROJECTION
Allows an application to manage media projection sessions. These sessions can provide applications the ability to capture display and audio contents. Should never be needed by normal apps.
android.permission.MODIFY_AUDIO_SETTINGS
Allows the app to modify global audio settings such as volume and which speaker is used for output.
android.permission.POST_NOTIFICATIONS
Allows the app to show notifications
android.permission.READ_CALENDAR
This app can read all calendar events stored on your phone and share or save your calendar data.
android.permission.READ_CONTACTS
Allows the app to read data about your contacts stored on your phone. Apps will also have access to the accounts on your phone that have created contacts. This may include accounts created by apps you have installed. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge.
android.permission.READ_EXTERNAL_STORAGE
Allows the app to read the contents of your shared storage.
android.permission.READ_MEDIA_AUDIO
Allows the app to read audio files from your shared storage.
android.permission.READ_MEDIA_IMAGES
Allows the app to read image files from your shared storage.
android.permission.READ_MEDIA_VIDEO
Allows the app to read video files from your shared storage.
android.permission.READ_PHONE_STATE
Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call.
android.permission.READ_SYNC_SETTINGS
Allows the app to read the sync settings for an account. For example, this can determine whether the People app is synced with an account.
android.permission.RECEIVE_BOOT_COMPLETED
Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the phone and allow the app to slow down the overall phone by always running.
android.permission.RECEIVE_USER_PRESENT
Unknown permission from android reference
android.permission.RECORD_AUDIO
This app can record audio using the microphone while the app is in use.
android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS
Allows an app to ask for permission to ignore battery optimizations for that app.
android.permission.REQUEST_INSTALL_PACKAGES
Allows an application to request installation of packages.
android.permission.SCHEDULE_EXACT_ALARM
This app can schedule work to happen at a desired time in the future. This also means that the app can run when youu2019re not actively using the device.
android.permission.SYSTEM_ALERT_WINDOW
This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear.
android.permission.USE_CREDENTIALS
Allows the app to request authentication tokens.
android.permission.VIBRATE
Allows the app to control the vibrator.
android.permission.WAKE_LOCK
Allows the app to prevent the phone from going to sleep.
android.permission.WRITE_CALENDAR
This app can add, remove, or change calendar events on your phone. This app can send messages that may appear to come from calendar owners, or change events without notifying their owners.
android.permission.WRITE_CLIPBOARD_SERVICE
Unknown permission from android reference
android.permission.WRITE_EXTERNAL_STORAGE
Allows the app to write the contents of your shared storage.
android.permission.WRITE_SETTINGS
Allows the app to modify the system's settings data. Malicious apps may corrupt your system's configuration.
android.permission.WRITE_SYNC_SETTINGS
Allows an app to modify the sync settings for an account. For example, this can be used to enable sync of the People app with an account.
cn.org.ifaa.permission.USE_IFAA_MANAGER
Unknown permission from android reference
com.android.launcher.permission.INSTALL_SHORTCUT
Allows an application to add Homescreen shortcuts without user intervention.
com.android.launcher.permission.READ_SETTINGS
Unknown permission from android reference
com.asus.msa.SupplementaryDID.ACCESS
Unknown permission from android reference
com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE
Unknown permission from android reference
com.google.android.gms.permission.AD_ID
Unknown permission from android reference
com.hihonor.push.permission.READ_PUSH_NOTIFICATION_INFO
Unknown permission from android reference
com.hihonor.security.permission.ACCESS_THREAT_DETECTION
Unknown permission from android reference
com.huawei.android.launcher.permission.CHANGE_BADGE
Unknown permission from android reference
com.huawei.android.launcher.permission.READ_SETTINGS
Unknown permission from android reference
com.huawei.android.launcher.permission.WRITE_SETTINGS
Unknown permission from android reference
com.huawei.appmarket.service.commondata.permission.GET_COMMON_DATA
Unknown permission from android reference
com.huawei.meetime.CAAS_SHARE_SERVICE
Unknown permission from android reference
com.meizu.c2dm.permission.RECEIVE
Unknown permission from android reference
com.meizu.flyme.push.permission.RECEIVE
Unknown permission from android reference
com.miui.home.launcher.permission.INSTALL_WIDGET
Unknown permission from android reference
com.open.gallery.smart.Provider
Unknown permission from android reference
com.oplus.metis.factdata.permission.DATABASE
Unknown permission from android reference
com.oplus.permission.safe.AI_APP
Unknown permission from android reference
com.vivo.identifier.permission.OAID_STATE_DIALOG
Unknown permission from android reference
com.vivo.notification.permission.BADGE_ICON
Unknown permission from android reference
com.xiaomi.dist.permission.ACCESS_APP_HANDOFF
Unknown permission from android reference
com.xiaomi.dist.permission.ACCESS_APP_META
Unknown permission from android reference
com.xiaomi.security.permission.ACCESS_XSOF
Unknown permission from android reference
com.xingin.xhs.permission.C2D_MESSAGE
Unknown permission from android reference
com.xingin.xhs.permission.JOPERATE_MESSAGE
Unknown permission from android reference
com.xingin.xhs.permission.JPUSH_MESSAGE
Unknown permission from android reference
com.xingin.xhs.permission.MIPUSH_RECEIVE
Unknown permission from android reference
com.xingin.xhs.permission.PROCESS_PUSH_MSG
Unknown permission from android reference
com.xingin.xhs.permission.PUSH_PROVIDER
Unknown permission from android reference
com.xingin.xhs.push.permission.MESSAGE
Unknown permission from android reference
freemme.permission.msa
Unknown permission from android reference
freemme.permission.msa.SECURITY_ACCESS
Unknown permission from android reference
getui.permission.GetuiService.com.xingin.xhs
Unknown permission from android reference
ohos.permission.ACCESS_SEARCH_SERVICE
Unknown permission from android reference
oplus.permission.settings.LAUNCH_FOR_EXPORT
Unknown permission from android reference
Unlocking the secrets of fusion’s core with AI-enhanced simulations
Creating and sustaining fusion reactions — essentially recreating star-like conditions on Earth — is extremely difficult, and Nathan Howard PhD ’12, a principal research scientist at the MIT Plasma Science and Fusion Center (PSFC), thinks it’s one of the most fascinating scientific challenges of our time. “Both the science and the overall promise of fusion as a clean energy source are really interesting. That motivated me to come to grad school [at MIT] and work at the PSFC,” he says.
Howard is member of the Magnetic Fusion Experiments Integrated Modeling (MFE-IM) group at the PSFC. Along with MFE-IM group leader Pablo Rodriguez-Fernandez, Howard and the team use simulations and machine learning to predict how plasma will behave in a fusion device. MFE-IM and Howard’s research aims to forecast a given technology or configuration’s performance before it’s piloted in an actual fusion environment, allowing for smarter design choices. To ensure their accuracy, these models are continuously validated using data from previous experiments, keeping their simulations grounded in reality.
In a recent open-access paper titled “Prediction of Performance and Turbulence in ITER Burning Plasmas via Nonlinear Gyrokinetic Profile Prediction,” published in the January issue of Nuclear Fusion, Howard explains how he used high-resolution simulations of the swirling structures present in plasma, called turbulence, to confirm that the world’s largest experimental fusion device, currently under construction in Southern France, will perform as expected when switched on. He also demonstrates how a different operating setup could produce nearly the same amount of energy output but with less energy input, a discovery that could positively affect the efficiency of fusion devices in general.
The biggest and best of what’s never been built
Forty years ago, the United States and six other member nations came together to build ITER (Latin for “the way”), a fusion device that, once operational, would yield 500 megawatts of fusion power, and a plasma able to generate 10 times more energy than it absorbs from external heating. The plasma setup designed to achieve these goals — the most ambitious of any fusion experiment — is called the ITER baseline scenario, and as fusion science and plasma physics have progressed, ways to achieve this plasma have been refined using increasingly more powerful simulations like the modeling framework Howard used.
In his work to verify the baseline scenario, Howard used CGYRO, a computer code developed by Howard’s collaborators at General Atomics. CGYRO applies a complex plasma physics model to a set of defined fusion operating conditions. Although it is time-intensive, CGYRO generates very detailed simulations on how plasma behaves at different locations within a fusion device.
The comprehensive CGYRO simulations were then run through the PORTALS framework, a collection of tools originally developed at MIT by Rodriguez-Fernandez. “PORTALS takes the high-fidelity [CGYRO] runs and uses machine learning to build a quick model called a ‘surrogate’ that can mimic the results of the more complex runs, but much faster,” Rodriguez-Fernandez explains. “Only high-fidelity modeling tools like PORTALS give us a glimpse into the plasma core before it even forms. This predict-first approach allows us to create more efficient plasmas in a device like ITER.”
After the first pass, the surrogates’ accuracy was checked against the high-fidelity runs, and if a surrogate wasn’t producing results in line with CGYRO’s, PORTALS was run again to refine the surrogate until it better mimicked CGYRO’s results. “The nice thing is, once you have built a well-trained [surrogate] model, you can use it to predict conditions that are different, with a very much reduced need for the full complex runs.” Once they were fully trained, the surrogates were used to explore how different combinations of inputs might affect ITER’s predicted performance and how it achieved the baseline scenario. Notably, the surrogate runs took a fraction of the time, and they could be used in conjunction with CGYRO to give it a boost and produce detailed results more quickly.
“Just dropped in to see what condition my condition was in”
Howard’s work with CGYRO, PORTALS, and surrogates examined a specific combination of operating conditions that had been predicted to achieve the baseline scenario. Those conditions included the magnetic field used, the methods used to control plasma shape, the external heating applied, and many other variables. Using 14 iterations of CGYRO, Howard was able to confirm that the current baseline scenario configuration could achieve 10 times more power output than input into the plasma. Howard says of the results, “The modeling we performed is maybe the highest fidelity possible at this time, and almost certainly the highest fidelity published.”
The 14 iterations of CGYRO used to confirm the plasma performance included running PORTALS to build surrogate models for the input parameters and then tying the surrogates to CGYRO to work more efficiently. It only took three additional iterations of CGYRO to explore an alternate scenario that predicted ITER could produce almost the same amount of energy with about half the input power. The surrogate-enhanced CGYRO model revealed that the temperature of the plasma core — and thus the fusion reactions — wasn’t overly affected by less power input; less power input equals more efficient operation. Howard’s results are also a reminder that there may be other ways to improve ITER’s performance; they just haven’t been discovered yet.
Howard reflects, “The fact that we can use the results of this modeling to influence the planning of experiments like ITER is exciting. For years, I’ve been saying that this was the goal of our research, and now that we actually do it — it’s an amazing arc, and really fulfilling.”
Story About Medical Device Security
Ben Rothke relates a story about me working with a medical device firm back when I was with BT. I don’t remember the story at all, or who the company was. But it sounds about right.
Trump takes ’giant wrecking ball’ to US research
Researchers pull plug on project to save sea ice
FEMA docs for addressing climate change disappear from websites
Trump’s OSHA pick led safety at a company cited for heat sickness
Late for school: Trump’s funding freeze halts e-bus delivery
FEMA restricts media communications
California emission rules under threat with order for congressional review
‘Sustainable’ investors flee online references to climate change
Big EU countries push expanded carbon border tax to help repay Covid debt
EU to propose by end of March interim 2040 aim to cut 90% emissions
Viewing the universe through ripples in space
In early September 2015, Salvatore Vitale, who was then a research scientist at MIT, stopped home in Italy for a quick visit with his parents after attending a meeting in Budapest. The meeting had centered on the much-anticipated power-up of Advanced LIGO — a system scientists hoped would finally detect a passing ripple in space-time known as a gravitational wave.
Albert Einstein had predicted the existence of these cosmic reverberations nearly 100 years earlier and thought they would be impossible to measure. But scientists including Vitale believed they might have a shot with their new ripple detector, which was scheduled, finally, to turn on in a few days. At the meeting in Budapest, team members were excited, albeit cautious, acknowledging that it could be months or years before the instruments picked up any promising signs.
However, the day after he arrived for his long-overdue visit with his family, Vitale received a huge surprise.
“The next day, we detect the first gravitational wave, ever,” he remembers. “And of course I had to lock myself in a room and start working on it.”
Vitale and his colleagues had to work in secrecy to prevent the news from getting out before they could scientifically confirm the signal and characterize its source. That meant that no one — not even his parents — could know what he was working on. Vitale departed for MIT and promised that he would come back to visit for Christmas.
“And indeed, I fly back home on the 25th of December, and on the 26th we detect the second gravitational wave! At that point I had to swear them to secrecy and tell them what happened, or they would strike my name from the family record,” he says, only partly in jest.
With the family peace restored, Vitale could focus on the path ahead, which suddenly seemed bright with gravitational discoveries. He and his colleagues, as part of the LIGO Scientific Collaboration, announced the detection of the first gravitational wave in February 2016, confirming Einstein’s prediction. For Vitale, the moment also solidified his professional purpose.
“Had LIGO not detected gravitational waves when it did, I would not be where I am today,” Vitale says. “For sure I was very lucky to be doing this at the right time, for me, and for the instrument and the science.”
A few months after, Vitale joined the MIT faculty as an assistant professor of physics. Today, as a recently tenured associate professor, he is working with his students to analyze a bounty of gravitational signals, from Advanced LIGO as well as Virgo (a similar detector in Italy) and KAGRA, in Japan. The combined power of these observatories is enabling scientists to detect at least one gravitational wave a week, which has revealed a host of extreme sources, from merging black holes to colliding neutron stars.
“Gravitational waves give us a different view of the same universe, which could teach us about things that are very hard to see with just photons,” Vitale says.
Random motion
Vitale is from Reggio di Calabria, a small coastal city in the south of Italy, right at “the tip of the boot,” as he says. His family owned and ran a local grocery store, where he spent so much time as a child that he could recite the names of nearly all the wines in the store.
When he was 9 years old, he remembers stopping in at the local newsstand, which also sold used books. He gathered all the money he had in order to purchase two books, both by Albert Einstein. The first was a collection of letters from the physicist to his friends and family. The second was his theory of relativity.
“I read the letters, and then went through the second book and remember seeing these weird symbols that didn’t mean anything to me,” Vitale recalls.
Nevertheless, the kid was hooked, and continued reading up on physics, and later, quantum mechanics. Toward the end of high school, it wasn’t clear if Vitale could go on to college. Large grocery chains had run his parents’ store out of business, and in the process, the family lost their home and were struggling to recover their losses. But with his parents’ support, Vitale applied and was accepted to the University of Bologna, where he went on to earn a bachelor’s and a master’s in theoretical physics, specializing in general relativity and approximating ways to solve Einstein’s equations. He went on to pursue his PhD in theoretical physics at the Pierre and Marie Curie University in Paris.
“Then, things changed in a very, very random way,” he says.
Vitale’s PhD advisor was hosting a conference, and Vitale volunteered to hand out badges and flyers and help guests get their bearings. That first day, one guest drew his attention.
“I see this guy sitting on the floor, kind of banging his head against his computer because he could not connect his Ubuntu computer to the Wi-Fi, which back then was very common,” Vitale says. “So I tried to help him, and failed miserably, but we started chatting.”
The guest happened to be a professor from Arizona who specialized in analyzing gravitational-wave signals. Over the course of the conference, the two got to know each other, and the professor invited Vitale to Arizona to work with his research group. The unexpected opportunity opened a door to gravitational-wave physics that Vitale might have passed by otherwise.
“When I talk to undergrads and how they can plan their career, I say I don’t know that you can,” Vitale says. “The best you can hope for is a random motion that, overall, goes in the right direction.”
High risk, high reward
Vitale spent two months at Embry-Riddle Aeronautical University in Prescott, Arizona, where he analyzed simulated data of gravitational waves. At that time, around 2009, no one had detected actual signals of gravitational waves. The first iteration of the LIGO detectors began observations in 2002 but had so far come up empty.
“Most of my first few years was working entirely with simulated data because there was no real data in the first place. That led a lot of people to leave the field because it was not an obvious path,” Vitale says.
Nevertheless, the work he did in Arizona only piqued his interest, and Vitale chose to specialize in gravitational-wave physics, returning to Paris to finish up his PhD, then going on to a postdoc position at NIKHEF, the Dutch National Institute for Subatomic Physics at the University of Amsterdam. There, he joined on as a member of the Virgo collaboration, making further connections among the gravitational-wave community.
In 2012, he made the move to Cambridge, Massachusetts, where he started as a postdoc at MIT’s LIGO Laboratory. At that time, scientists there were focused on fine-tuning Advanced LIGO’s detectors and simulating the types of signals that they might pick up. Vitale helped to develop an algorithm to search for signals likely to be gravitational waves.
Just before the detectors turned on for the first observing run, Vitale was promoted to research scientist. And as luck would have it, he was working with MIT students and colleagues on one of the two algorithms that picked up what would later be confirmed to be the first ever gravitational wave.
“It was exciting,” Vitale recalls. “Also, it took us several weeks to convince ourselves that it was real.”
In the whirlwind that followed the official announcement, Vitale became an assistant professor in MIT’s physics department. In 2017, in recognition of the discovery, the Nobel Prize in Physics was awarded to three pivotal members of the LIGO team, including MIT’s Rainier Weiss. Vitale and other members of the LIGO-Virgo collaboration attended the Nobel ceremony later on, in Stockholm, Sweden — a moment that was captured in a photograph displayed proudly in Vitale’s office.
Vitale was promoted to associate professor in 2022 and earned tenure in 2024. Unfortunately his father passed away shortly before the tenure announcement. “He would have been very proud,” Vitale reflects.
Now, in addition to analyzing gravitational-wave signals from LIGO, Virgo, and KAGRA, Vitale is pushing ahead on plans for an even bigger, better LIGO successor. He is part of the Cosmic Explorer Project, which aims to build a gravitational-wave detector that is similar in design to LIGO but 10 times bigger. At that scale, scientists believe such an instrument could pick up signals from sources that are much farther away in space and time, even close to the beginning of the universe.
Then, scientists could look for never-before-detected sources, such as the very first black holes formed in the universe. They could also search within the same neighborhood as LIGO and Virgo, but with higher precision. Then, they might see gravitational signals that Einstein didn’t predict.
“Einstein developed the theory of relativity to explain everything from the motion of Mercury, which circles the sun every 88 days, to objects such as black holes that are 30 times the mass of the sun and move at half the speed of light,” Vitale says. “There’s no reason the same theory should work for both cases, but so far, it seems so, and we’ve found no departure from relativity. But you never know, and you have to keep looking. It’s high risk, for high reward.”
Atmospheric circulation to constrain subtropical precipitation projections
Nature Climate Change, Published online: 18 February 2025; doi:10.1038/s41558-025-02266-5
The degree to which the tropical circulation changes with warming is not well known. Here, the authors use an emergent constraint to show that the tropical Hadley circulation is weakening more intensely than previously thought, resulting in stronger precipitation increases in subtropical regions.Engineers turn the body’s goo into new glue
Within the animal kingdom, mussels are masters of underwater adhesion. The marine molluscs cluster atop rocks and along the bottoms of ships, and hold fast against the ocean’s waves thanks to a gluey plaque they secrete through their foot. These tenacious adhesive structures have prompted scientists in recent years to design similar bioinspired, waterproof adhesives.
Now engineers from MIT and Freie Universität Berlin have developed a new type of glue that combines the waterproof stickiness of the mussels’ plaques with the germ-proof properties of another natural material: mucus.
Every surface in our bodies not covered in skin is lined with a protective layer of mucus — a slimy network of proteins that acts as a physical barrier against bacteria and other infectious agents. In their new work, the engineers combined sticky, mussel-inspired polymers with mucus-derived proteins, or mucins, to form a gel that strongly adheres to surfaces.
The new mucus-derived glue prevented the buildup of bacteria while keeping its sticky hold, even on wet surfaces. The researchers envision that once the glue’s properties are optimized, it could be applied as a liquid by injection or spray, which would then solidify into a sticky gel. The material might be used to coat medical implants, for example, to prevent infection and bacteria buildup.
The team’s new glue-making approach could also be adjusted to incorporate other natural materials, such as keratin — a fibrous substance found in feathers and hair, with certain chemical features resembling those of mucus.
“The applications of our materials design approach will depend on the specific precursor materials,” says George Degen, a postdoc in MIT’s Department of Mechanical Engineering. “For example, mucus-derived or mucus-inspired materials might be used as multifunctional biomedical adhesives that also prevent infections. Alternatively, applying our approach to keratin might enable development of sustainable packaging materials.”
A paper detailing the team’s results appears this week in the Proceedings of the National Academy of Sciences. Degen’s MIT co-authors include Corey Stevens, Gerardo Cárcamo-Oyarce, Jake Song, Katharina Ribbeck, and Gareth McKinley, along with Raju Bej, Peng Tang, and Rainer Haag of Freie Universität Berlin.
A sticky combination
Before coming to MIT, Degen was a graduate student at the University of California at Santa Barbara, where he worked in a research group that studied the adhesive mechanisms of mussels.
“Mussels are able to deposit materials that adhere to wet surfaces in seconds to minutes,” Degen says. “These natural materials do better than existing commercialized adhesives, specifically at sticking to wet and underwater surfaces, which has been a longstanding technical challenge.”
To stick to a rock or a ship, mussels secrete a protein-rich fluid. Chemical bonds, or cross-links, act as connection points between proteins, enabling the secreted substance to simultaneously solidify into a gel and stick to a wet surface.
As it happens, similar cross-linking features are found in mucin — a large protein that is the primary non-water component of mucus. When Degen came to MIT, he worked with both McKinley, a professor of mechanical engineering and an expert in materials science and fluid flow, and Katharina Ribbeck, a professor of biological engineering and a leader in the study of mucus, to develop a cross-linking glue that would combine the adhesive qualities of mussel plaques with the bacteria-blocking properties of mucus.
Mixing links
The MIT researchers teamed up with Haag and colleagues in Berlin who specialize in synthesizing bioinspired materials. Haag and Ribbeck are members of a collaborative research group that develops dynamic hydrogels for biointerfaces. Haag’s group has made mussel-like adhesives, as well as mucus-inspired liquids by producing microscopic, fiber-like polymers that are similar in structure to the natural mucin proteins.
For their new work, the researchers focused on a chemical motif that appears in mussel adhesives: a bond between two chemical groups known as “catechols” and “thiols.” In the mussel’s natural glue, or plaque, these groups combine to form catechol–thiol cross-links that contribute to the cohesive strength of the plaque. Catechols also enhance a mussel’s adhesion by binding to surfaces such as rocks and ship hulls.
Interestingly, thiol groups are also prevalent in mucin proteins. Degen wondered whether mussel-inspired polymers could link with mucin thiols, enabling the mucins to quickly turn from a liquid to a sticky gel.
To test this idea, he combined solutions of natural mucin proteins with synthetic mussel-inspired polymers and observed how the resulting mixture solidified and stuck to surfaces over time.
“It’s like a two-part epoxy. You combine two liquids together, and chemistry starts to occur so that the liquid solifidies while the substance is simultaneously glueing itself to the surface,” Degen says.
“Depending on how much cross-linking you have, we can control the speed at which the liquids gelate and adhere,” Haag adds. “We can do this all on wet surfaces, at room temperature, and under very mild conditions. This is what is quite unique.”
The team deposited a range of compositions between two surfaces and found that the resulting adhesive held the surfaces together, with forces comparable to the commercial medical adhesives used for bonding tissue. The researchers also tested the adhesive’s bacteria-blocking properties by depositing the gel onto glass surfaces and incubating them with bacteria overnight.
“We found if we had a bare glass surface without our coating, the bacteria formed a thick biofilm, whereas with our coating, biofilms were largely prevented,” Degen notes.
The team says that with a bit of tuning, they can further improve the adhesive’s hold. Then, the material could be a strong and protective alternative to existing medical adhesives.
“We are excited to have established a biomaterials design platform that gives us these desirable properties of gelation and adhesion, and as a starting point we’ve demonstrated some key biomedical applications,” Degen says. “We are now ready to expand into different synthetic and natural systems and target different applications.”
This research was funded, in part, by the U.S. National Institutes of Health, the U.S. National Science Foundation, and the U.S. Army Research Office.
Atlas of Surveillance
The EFF has released its Atlas of Surveillance, which documents police surveillance technology across the US.
Mixing beats, history, and technology
In a classroom on the third floor of the MIT Media Lab, it’s quiet; the disc jockey is setting up. At the end of a conference table ringed with chairs, there are two turntables on either side of a mixer and a worn crossfader. A MacBook sits to the right of the setup.
Today’s class — CMS.303/803/21M.365 (DJ History, Technique, and Technology) — takes students to the 1970s, which means disco, funk, rhythm and blues, and the breaks that form the foundation of early hip-hop are in the mix. Instructor Philip Tan ’01, SM ’03 starts with a needle drop. Class is about to begin.
Tan is a research scientist with the MIT Game Lab — part of the Institute’s Comparative Media Studies/Writing (CMS/W) program. An accomplished DJ and founder of a DJ crew at MIT, he’s been teaching students classic turntable and mixing techniques since 1998. Tan is also an accomplished game designer whose specialties include digital, live-action, and tabletop games, in both production and management. But today’s focus is on two turntables, a mixer, and music.
“DJ’ing is about using the platter as a music instrument,” Tan says as students begin filing into the classroom, “and creating a program for audiences to enjoy.”
Originally from Singapore, Tan arrived in the United States — first as a high school student in 1993, and later as an MIT student in 1997 — to study the humanities. He brought his passion for DJ culture with him.
“A high school friend in Singapore introduced DJ’ing to me in 1993,” he recalls. “We DJ’d a couple of school dances together and entered the same DJ competitions. Before that, though, I made mix tapes, pausing the cassette recorder while cuing up the next song on cassette, compact disc, or vinyl.”
Later, Tan wondered if his passion could translate into a viable course, exploring the idea over several years. “I wanted to find and connect with other folks on campus who might also be interested in DJ’ing,” he says. During MIT’s Independent Activities Period (IAP) in 2019, he led a four-week “Discotheque” lecture series at the Lewis Music Library, talking about vinyl records, DJ mixers, speakers, and digital audio. He also ran meetups for campus DJs in the MIT Music Production Collaborative.
“We couldn’t really do meetups and in-person performances during the pandemic, but I had the opportunity to offer a spring Experiential Learning Opportunity for MIT undergraduates, focused on DJ’ing over livestreams,” he says. The CMS/W program eventually let Tan expand the IAP course to a full-semester, full-credit course in spring 2023.
Showing students the basics
In the class, students learn the foundational practices necessary for live DJ mixing. They also explore a chosen contemporary or historical dance scene from around the world. The course investigates the evolution of DJ’ing and the technology used to make it possible. Students are asked to write and present their findings to the class based on historical research and interviews; create a mix tape showcasing their research into a historical development in dance music, mixing technique, or DJ technology; and end the semester with a live DJ event for the MIT community. Access to the popular course is granted via lottery.
“From circuits to signal processing, we have been able to see real-life uses of our course subjects in a fun and exciting way,” says Madeline Leano, a second-year student majoring in computer science and engineering and minoring in mathematics. “I’ve also always had a great love for music, and this class has already broadened my music taste as well as widened my appreciation for how music is produced.”
Leano lauded the class’s connections with her work in engineering and computer science. “[Tan] would always emphasize how all the parts of the mixing board work technically, which would come down to different electrical engineering and physics topics,” she notes. “It was super fun to see the overlap of our technical coursework with this class.”
During today’s class, Tan walks students through the evolution of the DJ’s tools, explaining the shifts in DJ’ing as it occurred alongside technological advances by companies producing the equipment. Tan delves into differences in hardware for disco and hip-hop DJs, how certain equipment like the Bozak CMA-10-2DL mixer lacked a crossfader, for example, while the UREI 1620 music mixer was all knobs. Needs changed as the culture changed, Tan explains, and so did the DJ’s tools.
He’s also immersing the class in music and cultural history, discussing the foundations of disco and hip-hop in the early 1970s and the former’s reign throughout the decade while the latter grew alongside it. Club culture for members of the LGBTQ+ community, safe spaces for marginalized groups to dance and express themselves, and previously unheard stories from these folks are carefully excavated and examined at length.
“Studying meter, reviewing music history, and learning new skills”
Toward the end of the class, each student takes their place behind the turntables. They’re searching by feel for the ease with which Tan switches back and forth between two tracks, trying to get the right blend of beats so they don’t lose the crowd. You can see their confidence growing in real time as he patiently walks them through the process: find the groove, move between them, blend the beat. They come to understand that it’s harder than it might appear.
“I’m not looking for students to become expert scratchers,” Tan says. “We’re studying meter, reviewing music history, and learning new skills.”
“Philip is one of the coolest teachers I have had here at MIT!” Leano exclaims. “You can just tell from the way he holds himself in class how both knowledgeable and passionate he is about DJ history and technology.”
Watching Tan demonstrate techniques to students, it’s easy to appreciate the skill and dexterity necessary to both DJ well and to show others how it’s done. He’s steeped in the craft of DJ’ing, as comfortable with two turntables and a mixer as he is with a digital setup favored by DJs from other genres, like electronic dance music. Students, including Leano, note his skill, ability, and commitment.
“Any question that any classmate may have is always answered in such depth he seems like a walking dictionary,” she says. “Not to mention, he makes the class so interactive with us coming to the front and using the board, making sure everyone gets what is happening.”
Author Correction: Wildfires offset the increasing but spatially heterogeneous Arctic–boreal CO<sub>2</sub> uptake
Nature Climate Change, Published online: 17 February 2025; doi:10.1038/s41558-025-02279-0
Author Correction: Wildfires offset the increasing but spatially heterogeneous Arctic–boreal CO2 uptakeFriday Squid Blogging: Squid the Care Dog
The Vanderbilt University Medical Center has a pediatric care dog named “Squid.”