Contact Me By Email

Monday, May 18, 2026

Ex-Google CEO Eric Schmidt booed after AI remarks at Arizona commencement

 

Ex-Google CEO Eric Schmidt booed after AI remarks at Arizona commencement

“Former Google CEO Eric Schmidt faced boos from University of Arizona graduates during his commencement address about AI. Students expressed concerns about AI’s impact on job security and the future, reflecting broader anxieties highlighted by Pew Research. While some, like Nvidia CEO Jensen Huang, view AI as a positive force creating new opportunities, others, including the graduating students, fear its potential to disrupt the workforce.

Pew research shows Americans are more worried than excited about AI as graduates voiced fears over jobs

a man looks ahead while wearing a headset microphone
Eric Schmidt, CEO of Relativity Space and former CEO of Google, during the America Business Forum in Miami on 6 November 2025. Photograph: Eva Marie Uzcategui/Bloomberg via Getty Images

A former Google CEO, Eric Schmidt, was met with students’ boos at a university commencement address in Arizona on Sunday when he raised the topic of artificial intelligence (AI) and its effects.

Schmidt – who led the tech giant for more than a decade, acquiring a multi-billion dollar fortune in the process – was speaking to as many as 10,000 graduating University of Arizona students when he addressed the impact of modern technology on society.

The topic struck a nerve of anxiety within the student body when he traced technology’s evolution, through the laptop – which he said had “democratized knowledge” and led to prosperity – to the smartphone, the internet and social media.

“We thought that we were adding stones to a cathedral of knowledge that humanity had been constructing for centuries, but the world we built turned out to be more complicated than we anticipated,” Schmidt said.

“The same tools that connect us also isolate us. The same platforms that gave everyone a voice – like you’re using now – degraded the public square,” he added, referring to the polarization within democracies.

Schmidt said that information technologies, including AI, had unsettled young people. “That was not the plan, but it happened,” he said.

Shouting and jeers against Schmidt’s talk started when he acknowledged fears that AI threatened to deprive people now entering the workforce of a future.

“I know what many of you are feeling about that,” Schmidt said. “I can hear you. There is a fear.

“There is a fear in your generation that the future has already been written, that the machines are coming, that the jobs are evaporating, that the climate is breaking, that politics are fractured, and that you are inheriting a mess that you did not create.”

He acknowledged that their fears are “rational” and encouraged them to adapt and to shape how it will be used in the future – rather than for that shape them.

“The question is not whether AI will shape the world. It will,” Schmidt said. “The question is whether you will have shaped artificial intelligence.”

The student body’s response to Schmidt’s remarks comes days after students graduating from the University of Central Florida booed Gloria Caulfield, a real estate executive, when she spoke of “the rise of artificial intelligence is the next Industrial Revolution” – and about “living in a time of profound change”.

“Woop, what happened?” she asked upon hearing the negative reaction. “OK, I struck a chord.”

She acknowledged to applause that just a few years ago AI was not an issue. “We’ve got a bipolar topic here, I see,” she said.

To renewed boos, she said: “AI capabilities are in the palm of our hands.”

The Pew Research Center has found that about half of Americans felt the increased prevalence of AI in their daily lives made them feel “more concerned than excited”. But those fears may be elevated in areas where technology is more easily adopted to replicate information technology work, reshaping that workforce.

At the sciences-focused Carnegie Mellon University recently, Nvidia chief executive officer, Jensen Huang, told graduates there’s no better time to “begin your life’s work” than now, even as companies lay off workers.

Huang made the case that AI will be a net positive for humanity, said that it was closing the “technology divide” and maintained new opportunities would favor young people.

“Now it’s your time to realize your dreams, and the timing could not be more perfect,” he said. While AI will automate tasks, “change every job” and even eliminate some occupations, “many new jobs and entire new industries will be created,” Huang said.

“AI is not likely to replace you, but someone using AI better than you might.”

After Schmidt’s mixed reception in Arizona, a spokesperson for the university said he’d been invited for his “extraordinary” contributions to tech and innovation.“

Tuesday, May 12, 2026

China Sought Access to Anthropic’s Newest A.I. The Answer Was No. - The New York Times

China Sought Access to Anthropic’s Newest A.I. The Answer Was No.

"The latest artificial intelligence models from Anthropic and OpenAI are extending the United States’ lead over China and intensifying the rivalry between the countries.

A growing number of national security officials and analysts have begun to liken the intensifying competition between China and the United States over artificial intelligence to the Cold War’s nuclear arms race.Marissa Leshnov for The New York Times

A representative from a Chinese think tank approached officials from Anthropic at a meeting in Singapore last month to insist that the company change its stance and give Beijing access to its powerful new artificial intelligence model, according to people briefed on the discussions.

Anthropic refused.

The request was not an official demand from the Chinese government. But the talks in Singapore were a form of exchange that is often meant to pave the way for formal, direct diplomacy.

When officials from the National Security Council at the White House learned about the exchange at the meeting, which was convened by the Washington-based Carnegie Endowment for International Peace, they reacted with alarm. Some Trump administration officials saw it as another sign that Beijing would try every possible avenue to swiftly acquire the most powerful artificial intelligence model a U.S. company has produced so far, according to people briefed on the discussions.

However subtle, the outreach is a sign of the intensifying competition between China and the United States over artificial intelligence, which a growing number of national security officials and analysts have begun to liken to the Cold War’s nuclear arms race. Chinese analysts see the release of the latest models from Anthropic and ChatGPT as a significant advance in American technology, one that could pose a threat to China.

The escalating rivalry is an important backdrop to the summit this week between the United States and China. President Trump is scheduled to arrive in Beijing on Wednesday, for meetings with the Chinese leader Xi Jinping. While the race to develop the most effective model is unlikely to be discussed, the two sides could talk about access to the chips that power artificial intelligence or guardrails around its use.

Previewing the summit Sunday during a call with reporters, a senior U.S. official said A.I. and cybersecurity were high on the agenda with Beijing, noting concerns with “the latest models of A.I.” The official said the United States and China were exploring how to establish better communication over artificial intelligence, creating a “deconfliction” channel in which experts from each country could address the risks of artificial intelligence.

In April, Anthropic announced a new A.I. model called Mythos. The company said it was withholding it from a public release because it was skilled at finding software vulnerabilities and could cause a cybersecurity reckoning. It made the model available to the U.S. government and more than 40 organizations and companies, so that they could identify and guard against future attacks.

The technology has set off alarm bells across the world. For rivals like China and Russia, it showed the risks of falling behind in the race to develop powerful artificial intelligence. The systems have the potential to give a nation-state the upper hand in defending against — and spearheading — cyberattacks at a vast scope and scale.

For years, U.S. officials have estimated that artificial intelligence models developed by the most advanced American firms are around six months ahead of China’s best models.

But according to some U.S. government and industry officials, the latest models — OpenAI’s ChatGPT 5.5 as well as Anthropic’s Mythos — have drastically extended the lead, potentially by nine months to a year. Other American officials have been more cautious, noting that China has a track record of catching up quickly.

Last year, innovations by the Chinese firm DeepSeek showcased the country’s ability to close the A.I. gap. And DeepSeek has said that its new model was adapted to run on chips made by the Chinese tech giant Huawei, further underscoring Beijing’s push to keep pace.

Still, Chinese analysts have expressed concern over the potential of the new Anthropic model. One organization, IDC China, said that Mythos posed a significant risk to Chinese companies, and that Anthropic’s limits on its reach created a technology gap. Another analyst, highlighting the cybersecurity threat, wrote that China was sharpening swords while the other side rolled out a Gatling gun.

Chinese analysts have been particularly worried because they view Anthropic as hostile to China. The start-up is currently embroiled in suits with the Pentagon, which announced it would be removed from American government networks after a dispute over how the technology would be used.

But since its founding, Anthropic has geared its business toward U.S. national security customers. It was the first to put its A.I. models on classified American networks, for example, and has long taken pains to keep its technology out of the hands of the Chinese. In September, Anthropic expanded restrictions on its technology to include companies whose ownership structures made them vulnerable to control “from jurisdictions where our products are not permitted, like China, regardless of where they operate.”

Increasingly, both the Chinese and U.S. governments view their artificial intelligence companies — including those that produce the models and the cloud companies that host the computer networks they run on — as national assets. China blocked a $2 billion acquisition by Meta of the Chinese A.I. company Manus. China has also told some of its A.I. start-ups that they cannot accept American investment without government approval.

Anthropic and OpenAI have restricted access to their latest models to a few companies and U.S. government agencies. Both models have the ability to discover previously unknown vulnerabilities in computer networks.

Chinese officials have argued that Anthropic and OpenAI have been wrong to keep a close hold on the models, contending that China needs access to them to find vulnerabilities in software, especially to defend its own critical infrastructure.

The meeting in Singapore was hosted by Carnegie under the ground rules that participants would not attribute the information discussed at the meetings. Many of the sessions dealt with domestic regulation of artificial intelligence.

The direct request by the Chinese think tank official was made on the sidelines of the meeting, not during one of the formal sessions, according to people briefed on the events.

Matt Sheehan, a Carnegie senior fellow and the organizer of the Singapore meeting, declined to comment on the conversations held at the event last month but described the broader meeting as essential to the two countries. “It’s critical for experts in the U.S. and China to maintain lines of communication about the potential risks with A.I.,” he said. “That’s why we host these dialogues.”

Officials from Anthropic declined to discuss the Chinese request.

Liu Pengyu, a spokesman for the Chinese Embassy in Washington, said he was not familiar with the exchange at the Carnegie meeting. But he said China was committed to balancing A.I. development with security.

“China stands ready to strengthen exchanges and cooperation on A.I. with all parties, to foster shared benefits through joint consultation and to work together to create an open, inclusive and mutually beneficial development environment,” he said in a statement.

U.S. officials noted that while a member of a Chinese think tank made the overture, it was all but certain that the Chinese government had approved and directed the message. Beijing typically exercises a strong degree of control over its think tanks, especially when they are engaged in unofficial diplomacy, like that type of exchange, known as a Track 2 dialogue.

While China’s official government line has been that its technology sector will be able to innovate independently and can overcome restrictions placed on it by the United States, Chinese companies have been more worried about their access to advanced chips, according to American industry officials and independent researchers.

U.S. officials are hoping the American companies will continue to delay China’s access to the most advanced chips so that American spy agencies may be able to use the new program to gain access to sensitive Chinese networks, according to former U.S. officials.

Industry officials are trying to persuade China to change its strategy on artificial intelligence and to not make its most powerful new models open source, which anyone can use. Putting a model that has the ability to quickly infiltrate networks in the hands of hackers could unleash chaos around the globe, security experts have said.

But Chinese officials remain skeptical, as the United States continues to look for ways to extend its lead over competition from Beijing. American companies including Anthropic, OpenAI and Google have accused Chinese firms of trying to steal their technology by essentially copying a model’s core competencies. Reuters reported last month that the State Department had sent a diplomatic complaint to China warning it against the practice.

Congress and the Trump administration are also increasing funding for an arm of the Commerce Department that devises export controls on chips and other technology.

A correction was made on 

May 12, 2026

An earlier version of this article misstated the day President Trump is scheduled to arrive in Beijing. It is Wednesday, not Thursday.

Dustin Volz writes about cybersecurity and intelligence for The Times. He is based in Washington.

Julian E. Barnes covers the U.S. intelligence agencies and international security matters for The Times. He has written about security issues for more than two decades.

Sheera Frenkel is a reporter based in the San Francisco Bay Area, covering the ways technology affects everyday lives with a focus on social media companies, including Facebook, Instagram, Twitter, TikTok, YouTube, Telegram and WhatsApp.

Tripp Mickle reports on some of the world’s biggest tech companies, including Nvidia, Google and Apple. He also writes about trends across the tech industry like layoffs and artificial intelligence."

China Sought Access to Anthropic’s Newest A.I. The Answer Was No. - The New York Times

Sunday, May 10, 2026

Neil deGrasse Tyson: Elon Musk's DELUSION?

 
 

Passkeys Are the New Passwords. You Should Start Using Them Now.

 

Passkeys Are the New Passwords. You Should Start Using Them Now.

A smartphone with a pop-up notification at the bottom of the screen asking if the user wants to use a Passkey to sign into amazon.com.
Max Eddy/NYT Wirecutter

By Max Eddy

“Max Eddy is a writer who has covered privacy and security — including password managers, VPNs, security keys, and more — for over a decade.

For 15 years, experts have told me that passwords are the biggest problem with online security and that’s just the way it is. The passwords that people make up are easily guessed by machines, and the ones that can’t be guessed are too hard to remember. 

Over time, as more and more passwords became necessary, many people simply recycled theirs across different accounts — creating a precarious situation where one phished password or data breach gave an attacker access to the victims’ email, bank accounts, and anything else that shared that password. 

Then came password managers, services and software in which a person could safely store all of their complex passwords and thus need to remember only a single password: the password for their password manager. This technology addressed, but didn’t solve, some of the problems. If people put in the effort, they could eventually have unique and complex passwords everywhere. But the majority of people did not opt to take on this herculean task that brought no immediate reward except that (maybe) in the future something bad might not happen to them (possibly). And a smart attacker could just phish even the best passwords anyway.

Two-factor authentication was the next bandage on the gaping wound of passwords. With 2FA protecting you, an attacker could have your password but wouldn’t be able to use it without a second confirmation, such as a code generated by an app or sent by text message. But another hoop to jump through for logging in remains a hard sell. And a smart attacker could just (you guessed it) phish most forms of 2FA anyway.

But passkeys are different. Instead of trying to fix unfixable passwords, passkeys are an entirely new technology that securely logs you in without your needing to remember your password or to perform a 2FA ritual. Passkeys are not perfect, and we’re still a ways off from their being commonplace, but learning what a passkey is and how to use it moves you a little closer to a more secure future.

What is a passkey?

A passkey is, essentially, a digital key that “unlocks” your online account by securely logging you in without a password. In Tamora Pierce’s fantasy novel First Test, knight student Kel acquires a lock for her room that opens only when she speaks a magic word while turning an equally magical key. This is, in high-fantasy terms, a passkey: It works on only one door, it can’t be duplicated, and it works only when the owner allows it to do so with a magic word.

When you have a passkey, your device, instead of prompting you to type in your password, automatically finds your passkey and asks your permission to use it. You then authenticate it with a PIN, facial recognition, or a fingerprint scan, and only then does it log you in to your account. 

“A passkey is like a super-long password that you can’t copy-paste, but that your computer and phone can use to log in to a website quicker and more safely than a password,” said Jacob Hoffman-Andrews, a senior staff technologist at the Electronic Frontier Foundation. 

Passkeys can’t be forgotten, unlike passwords. Passkeys are bound to specific websites, so there’s no risk of their being used on a phishing site or being sent to a savvy scammer. And unlike passwords, they can’t be exposed if the site where you have an account has a data breach.

“In a world where AI can mimic voices and generate flawless phishing emails at scale, passkeys are the most critical defense we have to prevent credential theft,” said Derek Hanson, chief technology officer for Yubico, the maker of Wirecutter’s favorite security keys and a major force behind the creation of passkeys.

Build your virtual keychain

The first thing you need to create a passkey is to figure out where to store it. 

You can create a passkey in a few places: on your device, in a password manager, or on a physical piece of hardware called a security key. Regardless of where you store your passkeys, they’re secured with end-to-end encryption. As a result, Apple, Google, Microsoft, and your password manager don’t have the means to decrypt them. Only the devices that you authorize can access your passkeys.

You may have seen some of the biggest sites on the internet — such as Amazon, Google, and PayPal — prompt you to create passkeys. And the reason is that many of the biggest tech companies actively support them. Apple, Google, and Microsoft all back passkeys, and their devices are set up to create, store, and use passkeys. If you’re just starting out with passkeys, we recommend using whatever the default option is on your device.

The passkeys you create can automatically sync between devices to be more available to you — but that feature is limited by where you store your passkeys. Passkeys made on iPhones, iPads, and Macs are saved to the Apple Passwords app and automatically sync between devices where you’re logged in with your Apple ID. Android devices, Chromebooks, and the Chrome browser save your passkeys to the Google Password Manager and sync similarly. Windows also has built-in support for creating and storing passkeys and syncs your passkeys between Windows devices where you’re logged in with your Microsoft account.

You can also choose to store your passkeys in password managers — our top picks both support passkeys. Passkeys stored in password managers such as 1Password sync to the apps and browser extensions, making them available no matter what device you’re using. If you store passkeys in your password manager, secure your password manager account with a complex, unique password and enable 2FA.

Top pick

1Password offers attractive, colorful apps and a straightforward onboarding experience that’s easy for newcomers to understand. At the same time, the technically inclined will appreciate its advanced features and security.

Budget pick

The free version of Bitwarden covers all the basics of a good password manager and doesn’t cost anything. But features like advanced security reports and encrypted file storage cost extra.

If you don’t like the idea of your passkeys floating around in the cloud between your devices, you can store them offline on a hardware security key. I recommend both the Yubico Security Key C and the Yubico YubiKey 5C NFC in Wirecutter’s guide to security keys, based on price, durability, and brand reputation among the 12 keys I tested. 

Top pick

This key works just about anywhere security keys are supported. It can store passkeys, and it supports NFC for wireless communication with your phone.

Upgrade pick

The Yubico YubiKey 5C NFC supports many authentication protocols, so it works anywhere security keys are accepted. If you can make the most of its advanced features, such as signing and encrypting with OpenPGP, it’s well worth the price.

But remember that if you lose your physical security key, you lose all of its passkeys as well. If you go this route, you should create backup passkeys for your accounts and store them on a second, backup security key that you keep in a safe place.

Unlocking sites with a passkey

You can use passkeys only on sites that support them. The FIDO Alliance, the industry group that developed the core technology for passkeys, has a searchable list of sites that use passkeys, which is a good place to start. But you are likely to see a prompt pop up on any of the major online services and retailers that are now using passkeys.

The passkey experience differs slightly depending on the device you’re using and the site you’re logging in to. 

Some websites, like Amazon, will prompt you to create a passkey. On a phone, tap Add Passkey and authenticate using the same method you use to unlock your phone (in my case, with Face ID). That’s it — your phone has created a unique passkey for Amazon and securely saved it. 

A screenshot of a smartphone screen with a pop-up notification at the bottom of the screen asking if the user wants to use a passkey to sign into amazon.com.

The next time you log in to Amazon, your phone will recognize that you have a passkey and ask to use it. (On desktop computers, you may have to enter your username before you can use a passkey.) Tap the button to confirm and authorize with biometrics or a PIN, and you’re logged in. No password, no problem. 

You can also use a device with a passkey to log in to a website on a different device where you don’t have a passkey. After navigating to Amazon’s website on a laptop, for example, enter your username and then choose the option to use a passkey. The browser will display a QR code that you scan with your iPhone, which in turn triggers a request to use a passkey. Tap to confirm, perform a quick Face ID scan, and that’s it: You’re logged in. Note that both devices must have Bluetooth enabled, but you don’t need to pair them.

Two side-by-side mobile screenshots, one of an Amazon login page asking the user if they want to set up a passkey to log in to their Amazon account, the other of a pop-up notification at the bottom of the screen confirming that their Amazon passkey will be saved in “Passwords”.

An important detail: When you use a passkey on one device (like your phone) to authenticate a different device (such as your laptop), the passkey isn’t transferred from one to the other. If you plan on logging in again on the laptop in the future, you might want to create a new passkey specifically for the laptop.

The disadvantages of passkeys

The greatest obstacle to passkey adoption may end up being exhaustion. It’s yet another thing that’s being asked of you to keep your accounts safe. 

“Security fatigue is real,” Hoffman-Andrews said. 

Passkeys are still in their early-adoption phase, and it can be hard to find sites that support them. So for the foreseeable future, you’ll need to continue using password managers and enabling 2FA wherever possible. Meanwhile, some sites that do use passkeys still rely on passwords and 2FA, which clever attackers can obtain through phishing, as backups.

And while passkeys are intended to be more convenient than passwords, that’s not entirely the case at the moment. Some sites don’t require 2FA for passkey logins, and others do; some sites let you create as many passkeys as you like for an account, while others limit you to just one. Logging in to the same site on an iPhone doesn’t work quite the same as it does on Android. These are little things, but they create more confusion for people still unfamiliar with the technology. 

I’ve also found that it can be tricky to remember where I’ve created my passkey, which sometimes means I simply don’t know what device to use to log in. It’s not currently possible to transfer passkeys between different types of devices, which is annoying, but Hoffman-Andrews explained that this limitation also helps keep passkeys safe from phishing attacks. 

Although passkeys are stored with end-to-end encryption, which prevents both providers and third parties from accessing or examining them, they’re not entirely in your control when you store them on third-party cloud services like those of Apple and Google. 

“It is technically possible that a compromised cloud account — or a legal subpoena directed at the cloud provider — could impact the security or privacy of those synced credentials,” said Hanson. 

If someone steals your phone, or confiscates your laptop, or gains access to the account that manages your passkeys, they might be able to access those passkeys. That’s why you should never reveal your PIN to anyone. You should also enable manufacturer tools to protect lost devices and learn how to deactivate fingerprint login or facial recognition on devices. People with elevated risk, such as journalists, activists, and politicians, should consider using hardware security keys to store their passkeys.

The bottom line: Use passkeys when you can

Password phishing, data breaches, two-factor authentication, and increasingly lengthy strings of mixed-case alphanumeric nonsense phrases may soon be relics of our password past — just not yet.

We recommend that you create a passkey on any site that allows it. If you’ve previously dismissed the option to create a passkey, or if you aren’t sure whether a site supports them, there are a few places to look. On the login page, look for the option to create or use a passkey. You should also check the security options in your account settings page for information on passkeys. On Amazon, for instance, go to Your Account > Login & Security > Passkey.

A mobile screenshot of the Amazon Passkey management page inside the Your Account settings.

Although passkeys haven’t won out against passwords, “that doesn’t mean the users won’t benefit from them today where they are already available,” Hanson said. 

Every passkey you create makes your accounts, and your online life, a little safer. And someday, the magic of passkeys will be so commonplace, you won’t be able to imagine life without them.

This article was edited by Caitlin McGarry and Annemarie Conte.

Meet your guide

I write about how to get the most out of your phones and computers, whether that means keeping your photos neatly sorted or protecting yourself from scams and surveillance.“