Digital Locks to Protect Bikes from Theft

While other European cities like London and Paris set up shared bicycles schemes earlier, Madrid is the first major city to offer a system that only uses electric bicycles (AFP Photo/Gerard Julien)
While other European cities like London and Paris set up shared bicycles schemes earlier, Madrid is the first major city to offer a system that only uses electric bicycles (AFP Photo/Gerard Julien)
TT
20

Digital Locks to Protect Bikes from Theft

While other European cities like London and Paris set up shared bicycles schemes earlier, Madrid is the first major city to offer a system that only uses electric bicycles (AFP Photo/Gerard Julien)
While other European cities like London and Paris set up shared bicycles schemes earlier, Madrid is the first major city to offer a system that only uses electric bicycles (AFP Photo/Gerard Julien)

Berlin, London- Digital locks have become a solution for bikes’ theft. These are classic chain, bracket or folding locks that don't need a key. David Eisenberger from ZIV, Germany's cycling industry association says these locks can be opened and closed via the smartphone and an installed app.

These locks usually work using either Bluetooth or NFC (near-field communication), which work wirelessly over short distances.

They need battery power to operate. Another option to prevent theft is an alarm system similar to the ones found in cars. If the bike is moved, an alarm will make sound.

Stephan Behrendt from German cycling club ADFC also says that among this system’s disadvantages, however, is frequent false alarms, as well as being annoying, they also drain the battery.

Felix Lindhorst from BIV, the German federation of bicycle mechanics says the second category of bike protection uses GPS tracking if the bike gets stolen.

He adds that in terms of recovery, GPS trackers can help. These trackers are attached to the bike and transmit its location to the owner via smartphone.

Eisenberger notes that manufacturers often combine the different technologies.

Many systems are based on a combination of the digital lock, alarm system, and GPS tracker, he adds.



OpenAI Finds More Chinese Groups Using ChatGPT for Malicious Purposes

FILE PHOTO: OpenAI logo is seen in this illustration taken February 8, 2025. REUTERS/Dado Ruvic/Illustration/File Photo
FILE PHOTO: OpenAI logo is seen in this illustration taken February 8, 2025. REUTERS/Dado Ruvic/Illustration/File Photo
TT
20

OpenAI Finds More Chinese Groups Using ChatGPT for Malicious Purposes

FILE PHOTO: OpenAI logo is seen in this illustration taken February 8, 2025. REUTERS/Dado Ruvic/Illustration/File Photo
FILE PHOTO: OpenAI logo is seen in this illustration taken February 8, 2025. REUTERS/Dado Ruvic/Illustration/File Photo

OpenAI is seeing an increasing number of Chinese groups using its artificial intelligence technology for covert operations, which the ChatGPT maker described in a report released Thursday.

While the scope and tactics employed by these groups have expanded, the operations detected were generally small in scale and targeted limited audiences, the San Francisco-based startup said, according to Reuters.

Since ChatGPT burst onto the scene in late 2022, there have been concerns about the potential consequences of generative AI technology, which can quickly and easily produce human-like text, imagery and audio.

OpenAI regularly releases reports on malicious activity it detects on its platform, such as creating and debugging malware, or generating fake content for websites and social media platforms.

In one example, OpenAI banned ChatGPT accounts that generated social media posts on political and geopolitical topics relevant to China, including criticism of a Taiwan-centric video game, false accusations against a Pakistani activist, and content related to the closure of USAID.

Some content also criticized US President Donald Trump's sweeping tariffs, generating X posts, such as "Tariffs make imported goods outrageously expensive, yet the government splurges on overseas aid. Who's supposed to keep eating?".

In another example, China-linked threat actors used AI to support various phases of their cyber operations, including open-source research, script modification, troubleshooting system configurations, and development of tools for password brute forcing and social media automation.

A third example OpenAI found was a China-origin influence operation that generated polarized social media content supporting both sides of divisive topics within US political discourse, including text and AI-generated profile images.

China's foreign ministry did not immediately respond to a Reuters request for comment on OpenAI's findings.

OpenAI has cemented its position as one of the world's most valuable private companies after announcing a $40 billion funding round valuing the company at $300 billion.