Toggle light / dark theme

Toward a policy for machine-learning tools in kernel development

The first topic of discussion at the 2025 Maintainers Summit has been in the air for a while: what role — if any — should machine-learning-based tools have in the kernel development process? While there has been a fair amount of controversy around these tools, and concerns remain, it seems that the kernel community, or at least its high-level maintainership, is comfortable with these tools becoming a significant part of the development process.

Sasha Levin began the discussion by pointing to a summary he had sent to the mailing lists a few days before. There is some consensus, he said, that human accountability for patches is critical, and that use of a large language model in the creation of a patch does not change that. Purely machine-generated patches, without human involvement, are not welcome. Maintainers must retain the authority to accept or reject machine-generated contributions as they see fit. And, he said, there is agreement that the use of tools should be disclosed in some manner.

But, he asked the group: is there agreement in general that these tools are, in the end, just more tools? Steve Rostedt said that LLM-generated code may bring legal concerns that other tools do not raise, but Greg Kroah-Hartman answered that the current developers certificate of origin (“Signed-off-by”) process should cover the legal side of things. Rostedt agreed that the submitter is ultimately on the hook for the code they contribute, but he wondered about the possibility of some court ruling that a given model violates copyright years after the kernel had accepted code it generated. That would create the need for a significant cleanup effort.

Space 18th SDG — A Side Event at COPUOS Legal SubCommittee — 16 April 2026

Space has become critical infrastructure for climate monitoring, disaster risk reduction, connectivity, navigation, education, and long-term planetary resilience. Even more important, space is an open horizon for new industrial development and settlement, starting with Earth orbit, the geo-lunar system, and the near-Earth asteroids. The Space 18th SDG initiative proposes a non-regulatory, enabling framework that strengthens the existing 17 SDGs by recognizing outer space as both an enabler of sustainable development and an environment requiring stewardship.
THE PANEL:
Prof. Sergio Marchisio, Space Law Expert, La Sapienza University, Rome, Italy.
Ms. Fikiswa Majola, Deputy Director Space Systems, Department of Science and Technology (DST) South Africa.
Prof. Guoyu Wang — Space Law Center, China National Space Administration.
Dr. Claire Nelson, The Future Forum, Giamaica.
Adriano V. Autino, SRI CEO & Founder.
Maria Antonietta Perino, Thales Alenia Space, Italy.
Stefano Antonetti, D-ORBIT SpA, Strategy Director, Italy.
Antonio Stark, iSpace, Japan.
MODERATES:
Dr. Gülin Dede, SRI Director of Relations, Chair of the Space 18th SDG Coalition.

‘Voorhees law’ explains why the slower car often catches up

Many drivers will know the feeling: you pull ahead of the slower car you’ve been stuck behind and cruise the open road ahead at your own, faster speed. By the time you reach the next stop light, you’re sure that you’ve left the slower car far behind you—but to your surprise, you see that same car cruise up right behind you in the mirror. Horror buffs might even recall scenes from “Friday the 13th,” where masked villain Jason Voorhees always catches up to his sprinting victims—despite himself walking at a leisurely pace.

In a new study published in Royal Society Open Science, Conor Boland at Dublin City University shows that this unsettlingly common phenomenon can be explained with simple mathematics. His model reveals precisely when and why a slower vehicle catches up after being overtaken, offering fresh insights into how individual vehicles interact with traffic signals.

Your brain for sale? The new frontier of neural data

Tech companies have long profited from personal data.

A newer market is emerging around non-invasive devices that capture brain signals.

That creates serious privacy and legal questions, because neural data may reveal extremely sensitive information.

The article’s warning is that society needs to think about protections before this market expands further.


The fast-growing market of non-invasive neurotechnology is collecting people’s neural data without clear guidelines.

Perspectives on an Emerging 18TH Sdg Articulation — an Sri Side Event at Copuos Legal Subcommittee

(SRI) will organize a high-level side event during the COPUOS Legal Subcommittee on 16 April 2026 at UNOOSA (Vienna), proposed and convened by Dr. Gülin Dede, titled “Operationalising Space as a Cross-Cutting Enabler of Sustainable Development: Perspectives on an Emerging 18th SDG Articulation.”

The session will bring together legal, policy, industry, and Global South perspectives to examine how outer space is evolving from a sectoral domain into a critical enabling infrastructure for the 2030 Agenda, while simultaneously requiring stewardship as an environment in its own right.

Positioned as an early contribution to shaping how space sustainability is framed within the broader UN system, the event will also be broadcast by the United Nations, extending its reach beyond the room to a global audience.

Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse

Construction, non-profits, real estate, manufacturing, financial services, healthcare, legal, and government are some of the prominent sectors targeted as part of the campaign.

“What also makes this campaign unusual is not just the device code phishing techniques involved, but the variety of techniques observed,” the company said. “Construction bid lures, landing page code generation, DocuSign impersonation, voicemail notifications, and abuse of Microsoft Forms pages are all hitting the same victim pool through the same Railway.com IP infrastructure.”

Device code phishing refers to a technique that exploits the OAuth device authorization flow to grant the attacker persistent access tokens, which can then be used to seize control of victim accounts. What’s significant about this attack method is that the tokens remain valid even after the account’s password is reset.

Challenging a 300-year-old law of friction

Researchers at the University of Konstanz have uncovered a new mechanism of sliding friction: resistance to motion that arises without any mechanical contact, driven purely by collective magnetic dynamics. The study, published in Nature Materials, shows that friction does not necessarily increase steadily with load, as postulated by Amontons’ law—one of the oldest and most fundamental empirical laws of physics—but can instead exhibit a pronounced maximum when internal magnetic ordering becomes frustrated.

For more than three centuries, Amontons’ law has linked friction directly to load, reflecting the everyday experience that heavier objects are harder to move; for example, pushing a heavy piece of furniture requires far more effort than sliding a light chair. This behavior is commonly attributed to tiny deformations of the surfaces in contact under load, which increase the number of microscopic contact points and thereby enhance friction.

In most classical situations, these deformations remain small and do not qualitatively change the internal structure of the materials during sliding. It is therefore not clear whether Amontons’ law will also hold when sliding induces much stronger internal reconfigurations, as can occur in magnetic materials where motion can modify the magnetic order.

California’s OS-based age verification law challenges open-source community

How Linux and BSD Distros Are Responding to the New Age Verification Laws https://itsfoss.com/news/distros-response-age-verification-laws/


California’s new online safety bill, AB 1,043 (the Digital Age Assurance Act), adopts a declared age model for operating systems. Under the law, which is set to take effect on January 1, 2027, when a user sets up a new device, the operating system is required to ask for their age or date of birth. This declared age will be used to curate what’s available on the app store, and can be shared with developers on request to ensure age-appropriate experiences.

An article in PC Gamer points out that this “sounds incompatible with many of today’s open source software, including Linux.” The open source community is wrestling with the problem of how to comply with the laws while also not violating core privacy principles.

The piece muses on technical solutions, quoting Jef Spaleta, project leader for popular Linux distribution, The Fedora Project, who says “this might be as simple as extending how we currently map uid to usernames and group membership and having a new file in /etc/ that keeps up with age.”

How AI is integrated into clinical workflow lowers medical liability perception

Artificial intelligence (AI) is changing the field and practice of medicine, including legal liability and the perception of who is at fault when a patient experiences harm. “AI holds promise to improve the quality and safety of health care and to reduce errors and patient harm, but the risk of legal liability is a potential barrier for investment and development of this technology as well as the quality of care,” said Michael Bruno, professor of radiology and of medicine at Penn State College of Medicine.

Now, Bruno, working alongside a team of researchers from Brown University and Seton Hall University School of Law, found that the understanding of physician liability is influenced by the way in which AI is integrated into a clinician’s workflow. The study was published in the journal Nature Health.

The researchers presented mock jurors with a hypothetical malpractice case where a patient suffered irreversible brain damage because a radiologist didn’t detect a brain bleed from a computerized tomography (CT) scan, even though AI correctly identified the scan as abnormal.

/* */