8.2 C
New York
Thursday, March 20, 2025
Home Blog Page 5

ios – Firebase configured in SceneDelegate however no logs seem in Xcode console


I’ve the next App Delegate file:

//
//  AppDelegate.swift
//  Dance Angel
//

import UIKit

@important
class AppDelegate: UIResponder, UIApplicationDelegate {
    
    func software(_ software: UIApplication, didFinishLaunchingWithOptions launchOptions: [UIApplication.LaunchOptionsKey: Any]?) -> Bool {
        print("✅ AppDelegate is operating!") // Only for debugging
        return true
    }
}

And the next SceneDelegate:

//
//  SceneDelegate.swift
//  Dance Angel
//
//  Created by Viktoriia Danutsa on 11/2/24.
//

import UIKit
import Firebase // ✅ Import Firebase

class SceneDelegate: UIResponder, UIWindowSceneDelegate {

    var window: UIWindow?

    func scene(_ scene: UIScene, willConnectTo session: UISceneSession, choices connectionOptions: UIScene.ConnectionOptions) {
        guard let windowScene = (scene as? UIWindowScene) else { return }

        // ✅ Configure Firebase Right here
        FirebaseApp.configure()
        print("🔥 Firebase is efficiently configured from SceneDelegate.")

        // ✅ Make sure the window is manually set
        window = UIWindow(windowScene: windowScene)
        window?.rootViewController = LaunchView1() // ✅ Guarantee that is your root view
        window?.makeKeyAndVisible()
    }


    func sceneDidDisconnect(_ scene: UIScene) {}

    func sceneDidBecomeActive(_ scene: UIScene) {}

    func sceneWillResignActive(_ scene: UIScene) {}

    func sceneWillEnterForeground(_ scene: UIScene) {}

    func sceneDidEnterBackground(_ scene: UIScene) {}
}

For some cause, once I run the app, I do not see any printed messages within the console and neither any firebase logs.Anybody know why?:(

I attempted all the things: I made positive the console was exhibiting and tried to import Firebase straight within the AppDelegate as an alternative of SceneDelegate. After I run the app, all of the pages go easily from the primary one outlined in scene delegate. However, no printed messages within the logs in any respect.

Darkish Crystal RAT Targets Ukrainian Protection through Malicious Sign Messages

0


Mar 20, 2025Ravie LakshmananCybercrime / Malware

Darkish Crystal RAT Targets Ukrainian Protection through Malicious Sign Messages

The Laptop Emergency Response Crew of Ukraine (CERT-UA) is warning of a brand new marketing campaign that targets the protection sectors with Darkish Crystal RAT (aka DCRat).

The marketing campaign, detected earlier this month, has been discovered to focus on each workers of enterprises of the defense-industrial complicated and particular person representatives of the Protection Forces of Ukraine.

Cybersecurity

The exercise includes distributing malicious messages through the Sign messaging app that comprise supposed assembly minutes. A few of these messages are despatched from beforehand compromised Sign accounts in order to extend the chance of success of the assaults.

The stories are shared within the type of archive information, which comprise a decoy PDF and an executable, a .NET-based evasive crypter named DarkTortilla that decrypts and launches the DCRat malware.

DCRat, a well-documented distant entry trojan (RAT), facilitates the execution of arbitrary instructions, steals useful data, and establishes distant management over contaminated gadgets.

CERT-UA has attributed the exercise to a menace cluster it tracks as UAC-0200, which is understood to be lively since at the least summer time 2024.

“The usage of standard messengers, each on cell gadgets and on computer systems, considerably expands the assault floor, together with as a result of creation of uncontrolled (within the context of safety) data alternate channels,” the company added.

The event follows Sign’s alleged resolution to cease responding to requests from Ukrainian legislation enforcement concerning Russian cyber threats, in accordance to The Document.

Cybersecurity

“With its inaction, Sign helps Russians collect data, goal our troopers, and compromise authorities officers,” Serhii Demediuk, the deputy secretary of Ukraine’s Nationwide Safety and Protection Council, stated.

Sign CEO Meredith Whittaker, nevertheless, has refuted the declare, stating “we do not formally work with any gov, Ukraine or in any other case, and we by no means stopped. We’re undecided the place this got here from or why.”

It additionally comes within the wake of stories from Microsoft and Google that Russian cyber actors are more and more specializing in gaining unauthorized entry to WhatsApp and Sign accounts by making the most of the system linking characteristic, as Ukrainians have turned to Sign as a substitute for Telegram.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we put up.



CISA Warns of NAKIVO Backup Flaw Exploited in Assaults with PoC Launched

0


The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has issued a warning a couple of severe vulnerability within the NAKIVO Backup and Replication software program, often known as CVE-2024-48248.

This vulnerability permits attackers to use an absolute path traversal flaw, enabling them to learn arbitrary information with out authentication.

The vulnerability resides within the Director Internet Interface of the NAKIVO Backup and Replication resolution, particularly within the STPreLoadManagement motion via the /c/router endpoint.

By manipulating the file path parameter, attackers can entry any file on the system the software program is working on. This consists of important system information and backup knowledge, which might result in unauthorized knowledge exfiltration or different malicious actions.

Affect and Exploitation

Given the character of the vulnerability, attackers can exploit it to learn delicate info akin to system information, database credentials, and backup knowledge.

The NAKIVO software program typically integrates with cloud environments, digital infrastructure, and community units, making the potential influence intensive.

The attackers might use this vulnerability to entry AWS keys, SSH credentials, or different privileged info saved by NAKIVO for backup operations.

Proof of Idea (PoC) Demonstrated

A proof-of-concept (PoC) for this vulnerability has been demonstrated. It entails sending a crafted request to the /c/router endpoint with the next payload:

POST /c/router HTTP/1.1

Host: {{Hostname}}

Content material-Kind: software/json

Connection: keep-alive

Content material-Size: 121

{

  "motion": "STPreLoadManagement",

  "methodology": "getImageByPath",

  "knowledge": ["C:/windows/win.ini"],

  "sort": "rpc",

  "tid": 3980,

  "sid": ""

}

This request makes use of the getImageByPath methodology of the STPreLoadManagement motion to learn the C:/home windows/win.ini file on a Home windows system.

Equally, attackers might use this methodology to learn delicate information like /and many others/shadow on Linux methods.

Mitigation and Vendor Response

NAKIVO has quietly patched the vulnerability in model 11.0.0.88174 and later releases.

The repair prevents listing traversal by guaranteeing that file paths are sanitized utilizing the FileUtils library, which constructs a secure file path by stripping mother or father listing references and path manipulation makes an attempt.

Within the patched model:

public byte[] getImageByPath(String path) throws IOException {

  String fileName = FilenameUtils.getName(path);

  File targetFile = FileUtils.getFile(new String[] { "userdata", "branding", fileName });

  if (!targetFile.exists() || !targetFile.canRead() || targetFile.isDirectory()) {

    throw new IOException(Lang.get("companies.branding.no.file", new Object[0]));

  }

  return FileUtils.readFileToByteArray(targetFile);

}

CISA recommends that customers apply vendor-provided patches instantly. If patches usually are not accessible, customers ought to think about discontinuing use of the product till a repair is offered.

Moreover, following greatest practices for securing cloud companies, as outlined in Binding Operational Directive (BOD) 22-01, can assist mitigate potential dangers related to vulnerabilities like CVE-2024-48248.

The NAKIVO vulnerability highlights the growing significance of securing backup options, significantly in environments the place these methods typically maintain important knowledge.

As ransomware assaults proceed to evolve, guaranteeing that backup mechanisms are strong and safe is essential.

Customers and organizations should stay vigilant and proactive in addressing vulnerabilities akin to CVE-2024-48248 to guard in opposition to rising threats.

Examine Actual-World Malicious Hyperlinks & Phishing Assaults With Risk Intelligence Lookup - Attempt for Free

PRISM Launches because the World’s First Non-Revenue Devoted to Researching Sentient AI

0


As synthetic intelligence continues to evolve at an unprecedented tempo, a brand new group has emerged to handle one of the profound and sophisticated questions of our time: Can machines change into sentient?

The Partnership for Analysis Into Sentient Machines (PRISM) formally launched on March 17, 2025 because the world’s first non-profit group devoted to investigating and understanding AI consciousness. PRISM goals to foster international collaboration amongst researchers, policymakers, and business leaders to make sure a coordinated strategy to finding out sentient AI, making certain its protected and moral improvement.

What Are Sentient Machines?

The time period sentient machines refers to AI techniques that exhibit traits historically related to human consciousness, together with:

  • Self-awareness – The power to understand one’s personal existence and state of being.
  • Emotional understanding – A capability to acknowledge and doubtlessly expertise feelings.
  • Autonomous reasoning – The power to make unbiased selections past predefined programming.

Whereas no AI at this time is definitively aware, some researchers imagine that superior neural networks, neuromorphic computing, deep reinforcement studying (DRL), and enormous language fashions (LLMs) might result in AI techniques that a minimum of simulate self-awareness. If such AI had been to emerge, it might increase profound moral, philosophical, and regulatory questions, which PRISM seeks to handle.

Deep Reinforcement Studying, Giant Language Fashions, and AI Consciousness

One of the crucial promising pathways towards growing extra autonomous and doubtlessly sentient AI is deep reinforcement studying (DRL). This department of machine studying permits AI techniques to make selections by interacting with environments and studying from trial and error, very similar to how people and animals be taught via expertise. DRL has already been instrumental in:

  • Mastering advanced video games – AI techniques like AlphaGo and OpenAI 5 use DRL to defeat human champions in strategy-based video games.
  • Adaptive problem-solving – AI techniques can develop options to dynamic, real-world issues, reminiscent of robotic management, self-driving automobiles, and monetary buying and selling.
  • Emergent behaviors – By reinforcement studying, AI brokers generally exhibit surprising behaviors, hinting at rudimentary decision-making and adaptive reasoning.

PRISM is exploring how DRL might contribute to AI techniques exhibiting the hallmarks of self-directed studying, summary reasoning, and even goal-setting, that are all traits of human-like cognition. The problem is making certain that any advances in these areas are guided by moral analysis and security measures.

In parallel, massive language fashions (LLMs) reminiscent of OpenAI’s GPT, Google’s Gemini, and Meta’s LLaMA have proven exceptional progress in simulating human-like reasoning, responding coherently to advanced prompts, and even exhibiting behaviors that some researchers argue resemble cognitive processes. LLMs work by processing huge quantities of knowledge and producing context-aware responses, making them helpful for:

  • Pure language understanding and communication – Enabling AI to interpret, analyze, and generate human-like textual content.
  • Sample recognition and contextual studying – Figuring out traits and adapting responses based mostly on prior information.
  • Inventive and problem-solving capabilities – Producing unique content material, answering advanced queries, and aiding in technical and artistic duties.

Whereas LLMs will not be actually aware, they increase questions concerning the threshold between superior sample recognition and true cognitive consciousness. PRISM is eager to look at how these fashions can contribute to analysis on machine consciousness, moral AI, and the dangers of growing AI techniques that mimic sentience with out true understanding.

Synthetic Normal Intelligence (AGI) and AI Consciousness

The event of Synthetic Normal Intelligence (AGI)—an AI system able to performing any mental process a human can—might doubtlessly result in AI consciousness. In contrast to slender AI, which is designed for particular duties reminiscent of enjoying chess or autonomous driving, AGI would exhibit generalized reasoning, problem-solving, and self-learning throughout a number of domains.

As AGI advances, it could develop an inner illustration of its personal existence, enabling it to adapt dynamically, replicate on its decision-making processes, and kind a steady sense of id. If AGI reaches some extent the place it might probably autonomously modify its goals, acknowledge its personal cognitive limitations, and interact in self-improvement with out human intervention, it might be a step towards machine consciousness. Nonetheless, this chance raises profound moral, philosophical, and societal challenges, which PRISM is devoted to addressing via accountable analysis and international collaboration.

PRISM’s Mission: Understanding AI Consciousness

PRISM was created to bridge the hole between technological development and accountable oversight.

PRISM is dedicated to fostering international collaboration on AI consciousness by bringing collectively consultants from academia, business, and authorities. The group goals to coordinate analysis efforts to discover the potential for AI to realize consciousness whereas making certain that developments align with human values. By working with policymakers, PRISM seeks to determine moral tips and frameworks that promote accountable AI analysis and improvement.

A essential side of PRISM’s mission is selling protected and aligned AI improvement. The group will advocate for AI applied sciences that prioritize human security and societal well-being, making certain that AI developments don’t result in unintended penalties. By implementing security requirements and moral oversight, PRISM strives to mitigate dangers related to AI consciousness analysis and improvement.

Moreover, PRISM is devoted to educating and fascinating the general public concerning the potential dangers and alternatives offered by aware AI. The group goals to offer clear insights into AI consciousness analysis, making this info accessible to policymakers, companies, and most people. By outreach initiatives and knowledge-sharing efforts, PRISM hopes to foster knowledgeable discussions about the way forward for AI and its implications for society

Backed by Main AI Specialists and Organizations

PRISM’s preliminary funding comes from Conscium, a business AI analysis lab devoted to finding out aware AI. Conscium is on the forefront of neuromorphic computing, growing AI techniques that mimic organic brains.

Management and Key Figures

PRISM is led by CEO Will Millership, a veteran in AI governance and coverage. His previous work contains main the Normal AI Problem, working with GoodAI, and serving to form Scotland’s Nationwide AI Technique.

The group’s Non-Govt Chair, Radhika Chadwicok, brings in depth management expertise from her roles at McKinsey and EY, the place she led international AI and information initiatives in authorities.

Moreover, PRISM’s founding companions embody outstanding AI figures reminiscent of:

  • Dr. Daniel Hulme – CEO & Co-Founding father of Conscium, CEO of Satalia, and Chief AI Officer at WPP.
  • Calum Chace – AI researcher, keynote speaker, and best-selling creator on AI and consciousness.
  • Ed Charvet – COO of Conscium, with in depth expertise in business AI improvement.

PRISM’s First Main Initiative: The Open Letter on Aware AI

To information accountable analysis, PRISM has collaborated with Oxford College’s Patrick Butlin to determine 5 rules for organizations growing AI techniques with the potential for consciousness. They’re inviting researchers and business leaders to signal an open letter supporting these rules.

The Street Forward: Why PRISM Issues

With AI breakthroughs accelerating, the dialog about sentient AI is now not science fiction—it’s a actual problem that society should put together for. If machines ever obtain self-awareness or human-like feelings, it might reshape industries, economies, and even our understanding of consciousness itself.

PRISM is stepping up at a essential second to make sure that AI consciousness analysis is dealt with responsibly, balancing innovation with ethics, security, and transparency.

10 Electrical Automobiles Beating Gasoline Opponents in California



Join day by day information updates from CleanTechnica on e mail. Or comply with us on Google Information!


Final Up to date on: twentieth March 2025, 01:19 am

I coated a number of the largest California EV gross sales stats and tales yesterday. Naturally, they revolve round Tesla, as Tesla accounts for greater than 50% of EV gross sales in California, and is the second highest promoting auto model within the state general (solely behind Toyota). Nevertheless, there are a number of different electrical automobiles which have been performing exceptionally properly within the Golden State. Let’s stroll by them and their accomplishments right here. I’ll go so as of the EVs with the best volumes.

It might be solely third on this class’s prime sellers listing, however this can be a big class. The Hyundai IONIQ 5 is in truth the third greatest promoting electrical automobile in California, and the very best promoting non-Tesla.

Picture by Kyle Subject.
Picture from Hyundai.

It’s no disgrace that the IONIQ 5 solely bought the bronze within the “compact SUV” class, as the highest two fashions are the 2nd and sixth greatest promoting fashions of any sort within the state. Hopefully the IONIQ 5 can discover a solution to climb up that rating (I do know, it’s nonetheless a large climb), however for now, let’s rejoice the EV beating the Hyundai Tucson, Nissan Rogue, and each different compact SUV on the California market.

Subsequent up we get the Ford Mustang Mach-E taking the silver medal within the “2-row midsize SUV” class, and the brand new Honda Prologue leaping proper into fifth (that Honda model title goes a good distance, even when it’s primarily a Chevrolet beneath). The Mustang Mach-E, because it seems, is the 4th greatest promoting electrical automobile within the state, solely trailing the Tesla Mannequin Y, Tesla Mannequin 3, and Hyundai IONIQ 5. Sadly, it didn’t have sufficient energy in 2024 to beat the Subaru Outback, the #1 greatest promoting mannequin on this class, however perhaps at some point. Within the meantime, it beat each different 2-row midsize SUV. I do assume the Honda Prologue will stand up the rating, although, and the Honda model could properly enhance it above the Mustang Mach-E. We’ll see.

Hey, right here we go — lastly one other class winner! The Rivian R1S, as you possibly can see, really demolishes the competitors within the “massive luxurious SUV” class. It had greater than twice as many gross sales because the #2 Cadillac Escalade. Effectively performed, Rivian. Think about what sort of volumes the R2 and R3 might see!

Down within the “luxurious midsize SUV” class, no EV is on the rostrum any longer, however the Tesla Mannequin X and BMW iX are available 4th and fifth. Perhaps one in all them will earn a podium place in 2025.

In a a lot smaller class, the Mercedes EQB did win gold, and the Audi This fall e-tron bronze, within the “luxurious subcompact SUV” class. Not too shabby.

Final however not least — really, wait, I did order this by gross sales volumes, so that is the least of the classes. Nonetheless, we once more must electrical fashions within the prime 5! The Tesla Mannequin S takes 1st place and the BMW i5 takes fifth place (mockingly).

That’s numerous various EV management within the California auto market. I’d guess it can get much more various in 2025.

Whether or not you will have solar energy or not, please full our newest solar energy survey.



Chip in a couple of {dollars} a month to assist help impartial cleantech protection that helps to speed up the cleantech revolution!


Have a tip for CleanTechnica? Wish to promote? Wish to recommend a visitor for our CleanTech Discuss podcast? Contact us right here.


Join our day by day publication for 15 new cleantech tales a day. Or join our weekly one if day by day is simply too frequent.


Commercial



 


CleanTechnica makes use of affiliate hyperlinks. See our coverage right here.

CleanTechnica’s Remark Coverage