Navigating financial uncertainty: How AI nudges can curb overdraft costs
Peer-Reviewed Publication
Updates every hour. Last Updated: 4-Nov-2025 13:11 ET (4-Nov-2025 18:11 GMT/UTC)
Location data is considered particularly sensitive – its misuse can have serious consequences. Researchers at the Technical University of Munich (TUM) have developed a method that allows individuals to cryptographically prove their location – without revealing it. The foundation of this method is the so-called zero-knowledge proof with standardized floating-point numbers.
New research shows that cyberbullying should be classified as an adverse childhood experience due to its strong link to trauma. Even subtle forms—like exclusion from group chats—can trigger PTSD-level distress. Nearly 90% of teens experienced some form of cyberbullying, accounting for 32% of the variation in trauma symptoms. Indirect harassment was most common, with more than half reporting hurtful comments, rumors or deliberate exclusion. What mattered most was the overall amount of cyberbullying: the more often a student was targeted, the more trauma symptoms they showed.
Tianjin Normal University (Prof. Cheng-Peng Li) and Southeast Normal University (Prof. Yan-Qian Lan) have developed crystalline porous framework (CPF) composite beads to trap 99TcO4– in nuclear wastewater. 1 g of beads processed 4.8 L of pre-treated simulated waste, with residual Tc levels reduced to 0.026 ppb—significantly below the WHO (0.159 ppb) and U.S. EPA (0.053 ppb) drinking water standards (calculated from nonradioactive surrogate ReO4–). This scalable strategy enables deep purification of trace radionuclide, enabling industrial deployment of nanoscale adsorbent technologies.