Bitcoin cryptography safe as quantum threat remains distant

Quantum computing concerns around Bitcoin have resurfaced, yet analysis from CoinShares indicates the threat remains long-term. The report argues that quantum risk is an engineering challenge that gives Bitcoin ample time to adapt.

Bitcoin’s security relies on elliptic-curve cryptography. A sufficiently advanced quantum machine could, in theory, derive private keys using Shor’s algorithm, which requires millions of stable, error-corrected qubits, and remains far beyond current capability.

Network exposure is also limited. Roughly 1.6 million BTC is held in legacy addresses with visible public keys, yet only about 10,200 BTC is realistically targetable. Modern address formats further reduce the feasibility of attacks.

Debate continues over post-quantum upgrades, with researchers warning that premature changes could introduce new vulnerabilities. Market impact, for now, is viewed as minimal.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

OpenClaw faces rising security pushback in South Korea

Major technology companies in South Korea are tightening restrictions on OpenClaw after rising concerns about security and data privacy.

Kakao, Naver and Karrot Market have moved to block the open-source agent within corporate networks, signalling a broader effort to prevent sensitive information from leaking into external systems.

Their decisions follow growing unease about how autonomous tools may interact with confidential material, rather than remaining contained within controlled platforms.

OpenClaw serves as a self-hosted agent that performs actions on behalf of a large language model, acting as the hands of a system that can browse the web, edit files and run commands.

Its ability to run directly on local machines has driven rapid adoption, but it has also raised concerns that confidential data could be exposed or manipulated.

Industry figures argue that companies are acting preemptively to reduce regulatory and operational risks by ensuring that internal materials never feed external training processes.

China has urged organisations to strengthen protections after identifying cases of OpenClaw running with inadequate safeguards.

Security analysts in South Korea warn that the agent’s open-source design and local execution model make it vulnerable to misuse, especially when compared to cloud-based chatbots that operate in more restricted environments.

Wiz researchers recently uncovered flaws in agents linked to OpenClaw that exposed personal information.

Despite the warnings, OpenClaw continues to gain traction among users who value its ability to automate complex tasks, rather than rely on manual workflows.

Some people purchase separate devices solely to run the agent, while an active South Korea community on X has drawn more than 1,800 members who exchange advice and share mitigation strategies.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!

Agentic AI transforms finance systems

Organisations undergoing finance transformations are discovering that traditional system cutovers rarely go as planned. Hidden manual workarounds and undocumented processes often surface late, creating operational risks and delays during ERP migrations.

Agentic AI is emerging as a solution by deploying autonomous software agents that discover real workflows directly from system data. Scout agents analyse transaction logs to uncover hidden dependencies, allowing companies to build more accurate future systems based on actual operations.

Simulator agents to stress test new systems by generating thousands of realistic transactions continuously. When problems arise, agents analyse errors and automatically recommend fixes, turning testing into a continuous improvement process rather than a one-time checkpoint.

Sentinel agents monitor financial records in real time to detect discrepancies before they escalate into compliance risks. Leaders say the approach shifts focus from single go-live milestones to ongoing resilience, with teams increasingly managing intelligent systems instead of manual processes.

Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

Claude Opus 4.6 sets new benchmark for enterprise AI

Anthropic has released Claude Opus 4.6, its most advanced AI model to date, introducing significant improvements in coding performance, reasoning depth, and long-context comprehension.

Engineering workflows stand to benefit from stronger debugging, code review, and better large-scale repository management, while agentic task execution now runs for more extended periods with greater reliability.

The model’s 1M token context window, now in beta, enables sustained reasoning across vast datasets and extended conversations. Performance gains span multiple benchmarks, leading in agentic coding, multidisciplinary reasoning, and high-value knowledge work.

Information retrieval in long documents has also improved, addressing persistent industry concerns around context degradation.

Operational capabilities extend beyond software development into enterprise productivity. Financial analysis, research, and document workflows gain direct support, with spreadsheet and presentation integrations enhancing daily business use.

Within Claude Code, newly introduced agent teams allow multiple AI agents to collaborate autonomously on complex workloads.

Safety remains central, with expanded evaluations showing low misalignment risk backed by interpretability research and cybersecurity safeguards. Additional tools- adaptive thinking, effort scaling, and context compaction- add flexibility for deploying long-running AI systems at scale.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Frontier and GPT-5.3-Codex mark major OpenAI expansion

OpenAI has unveiled Frontier, a new enterprise platform designed to help organisations build, deploy, and manage AI agents capable of executing real operational work.

The launch reflects accelerating enterprise adoption, with businesses reporting measurable productivity gains across manufacturing, finance, sales, and energy operations through agent deployment.

Frontier addresses a growing gap between AI model capability and real-world implementation. The platform equips AI agents with shared organisational context, system access, governance permissions, and feedback learning mechanisms.

By integrating across existing cloud infrastructure, enterprise software, and data environments, Frontier enables AI coworkers to operate across workflows rather than within isolated tools.

Alongside the platform release, OpenAI introduced GPT-5.3-Codex, its most advanced agentic coding model to date. The system combines the coding strength of earlier Codex iterations with expanded reasoning and professional task execution.

Benchmark performance leads across SWE-Bench Pro, Terminal-Bench, OSWorld, and GDPval, reflecting gains in software engineering, computer use, and knowledge work automation.

Cybersecurity capabilities also advance with the release. GPT-5.3-Codex includes enhanced vulnerability detection training and operates under strengthened safeguards designed to support defensive research while mitigating misuse.

Together, Frontier and GPT-5.3-Codex position AI agents as scalable digital coworkers capable of executing complex technical and enterprise workloads end-to-end.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

New AI system predicts iceberg movements to aid maritime safety

Scientists are applying AI to enhance iceberg tracking and movement prediction, using machine learning models that analyse historical drift patterns, ocean currents and weather data.

These AI systems aim to identify how icebergs behave over time and improve forecasts for their positions, which can help maritime operators and climate researchers anticipate hazards and plan safe routes.

Traditional methods for tracking icebergs, relying on satellite imagery and manual analysis, are limited by coverage gaps and delays. The new AI techniques can fill these gaps by generating continuous trajectory predictions, enabling more proactive monitoring over remote polar waters.

Researchers suggest that this approach could support shipping safety, offshore operations, and environmental management as climate change alters iceberg calving and drift behaviours.

This work reflects broader trends in using AI for environmental modelling, where machine learning augments physical models to better understand complex natural systems influenced by changing climate conditions.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!

Germany voices unease over tech sovereignty with France

A senior German official has voiced frustration over joint tech sovereignty efforts with France, describing the experience as disillusioning. The remarks followed a high profile digital summit hosted by Germany and France in Berlin.

The comments came from Luise Hölscher of Germany, who said approaches to buying European technology differ sharply between Germany and France. Germany tends to accept solutions from across Europe, while France often favours domestic providers.

Despite tensions, Hölscher said the disagreement has not damaged the wider partnership between Germany and France. Germany is now exploring closer cooperation with other European countries.

The debate unfolds as the EU considers new rules on cloud services and AI procurement across Germany and France. European institutions are weighing how far public bodies should prioritise European suppliers.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot

New multi-stage scams use PDF files to harvest corporate credentials

Phishing continues to succeed despite increasingly sophisticated AI-driven threats, with attackers relying on familiar tools such as PDFs and cloud services. Researchers have identified a new campaign using legitimate-looking documents to redirect victims to credential-harvesting pages impersonating Dropbox.

The attack starts with professional emails framed as procurement or tender requests. When recipients open the attached PDF, they are quietly redirected through trusted cloud infrastructure before reaching a fake Dropbox login page designed to steal corporate credentials.

Each stage appears legitimate in isolation, allowing the campaign to bypass standard filters and authentication checks. Business-style language, reputable hosting platforms, and realistic branding reduce suspicion while exploiting everyday workplace routines.

Security specialists warn that long-standing trust in PDFs and mainstream cloud services has lowered user vigilance. Employees have been conditioned to view these formats as safe, creating opportunities for attackers to weaponise familiar business tools.

Experts say phishing awareness must evolve beyond basic link warnings to reflect modern multi-stage attacks. Alongside training, layered defences such as multi-factor authentication and anomaly detection remain essential for limiting damage.

Would you like to learn more about AI, tech, and digital diplomacy? If so, ask our Diplo chatbot!

EU tests Matrix protocol as sovereign alternative for internal communication

The European Commission is testing a European open source system for its internal communications as worries grow in Brussels over deep dependence on US software.

A spokesperson said the administration is preparing a solution built on the Matrix protocol instead of relying solely on Microsoft Teams.

Matrix is already used by several European institutions, including the French government, German healthcare bodies and armed forces across the continent.

The Commission aims to deploy it as a complement and backup to Teams rather than a full replacement. Officials noted that Signal currently fills that role but lacks the flexibility needed for an organisation of the Commission’s size.

The initiative forms part of a wider push for digital sovereignty within the EU. A Matrix-based tool could eventually link the Commission with other Union bodies that currently lack a unified secure communication platform.

Officials said there is already an operational connection with the European Parliament.

The trial reflects growing sensitivity about Europe’s strategic dependence on non-European digital services.

By developing home-grown communication infrastructure instead of leaning on a single foreign supplier, the Commission hopes to build a more resilient and sovereign technological foundation.

Would you like to learn more about AI, tech and digital diplomacyIf so, ask our Diplo chatbot!

Under 16 social media ban proposed in Spain

Spain is preparing legislation to ban social media access for users under 16, with the proposal expected to be introduced within days. Prime Minister Pedro Sánchez framed the move as a child-protection measure aimed at reducing exposure to harmful online environments.

Government plans include mandatory age-verification systems for platforms, designed to serve as practical barriers rather than symbolic safeguards. Officials argue that minors face escalating risks online, including addiction, exploitation, violent content, and manipulation.

Additional provisions could hold technology executives legally accountable for unlawful or hateful content that remains online. The proposal reflects a broader regulatory shift toward platform responsibility and stricter enforcement standards.

Momentum for youth restrictions is building across Europe. France and Denmark are pursuing similar controls, while the EU Digital Services Act guidelines allow member states to define a national ‘digital majority age’.

The European Commission is also testing an age verification app, with wider deployment expected next year.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot