Toggle light / dark theme

Human Language Gene Inserted Into Mice Led to Some Bizarre Effects

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3QFIrFX
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about a strange experiment that inserted human language genes into mice…weird things happened.
Links:
https://www.nature.com/articles/s4146https://www.cell.com/cell-reports/ful… #mice #experiment #language 0:00 Intriguing experiment where mice got a human language gene 0:50 NOVA1 gene in a nutshell 2:50 Human NOVA1 is different 3:45 Previous gene that was believed to be a language gene — Foxp2 5:35 New experiment focusing on a unique human gene 7:05 Weird experimental discoveries 8:40 What this means and what this gene does 9:40 Other things this gene seems to do 10:20 Conclusions Support this channel on Patreon to help me make this a full time job: / whatdamath Bitcoin/Ethereum to spare? Donate them here to help this channel grow! bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4 or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF Space Engine is available for free here: http://spaceengine.org Enjoy and please subscribe. Twitter: / whatdamath Facebook: / whatdamath Twitch: / whatdamath The hardware used to record these videos: New Camera: https://amzn.to/34DUUlv CPU: https://amzn.to/2LZFQCJ Video Card: https://amzn.to/2M1W26C Motherboard: https://amzn.to/2JYGiQQ RAM: https://amzn.to/2Mwy2t4 PSU: https://amzn.to/2LZcrIH Case: https://amzn.to/2MwJZz4 Microphone: https://amzn.to/2t5jTv0 Mixer: https://amzn.to/2JOL0oF Recording and Editing: https://amzn.to/2LX6uvU Some of the above are affiliate links, meaning I would get a (very small) percentage of the price paid. Thank you to all Patreon supporters of this channel Special thanks also goes to all the wonderful supporters of the channel through YouTube Memberships Credit: Emw CC BY-SA 3.0 https://en.wikipedia.org/wiki/NOVA1#/.… SWISS-MODEL — https://swissmodel.expasy.org/reposit… CC BY-SA 4.0 Licenses used: https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.https://creativecommons.org/licenses/.
https://academic.oup.com/nar/article/.
https://www.cell.com/cell-reports/ful
#mice #experiment #language.

0:00 Intriguing experiment where mice got a human language gene.
0:50 NOVA1 gene in a nutshell.
2:50 Human NOVA1 is different.
3:45 Previous gene that was believed to be a language gene — Foxp2
5:35 New experiment focusing on a unique human gene.
7:05 Weird experimental discoveries.
8:40 What this means and what this gene does.
9:40 Other things this gene seems to do.
10:20 Conclusions.

Support this channel on Patreon to help me make this a full time job:
/ whatdamath.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Space Engine is available for free here: http://spaceengine.org.

Crypto-exchange Kraken extorted by hackers after insider breach

The Kraken cryptocurrency exchange announced that a cybercrime group is trying to extort the company by threatening to release videos showing internal systems that host client data.

The company’s Chief Security Officer, Nick Percoco, stated that the incident did not put client funds at risk and involved an insider threat, with two instances of improper access to limited customer data by support employees.

Kraken says that it will not pay or negotiate with the threat actor.

Google Warns Quantum Computers Could Break Bitcoin and Ethereum Encryption in 9 Minutes — Are Your BTC and ETH at Risk?

In short: The “lock” on the vault hasn’t been broken yet, but Google just published the blueprint for the bolt cutters, and they are much smaller than we imagined.


Google’s latest research warns quantum computers could break Bitcoin and Ethereum encryption faster than expected.

New Torg Grabber infostealer malware targets 728 crypto wallets

A new info-stealing malware called Torg Grabber is stealing sensitive data from 850 browser extensions, more than 700 of them for cryptocurrency wallets.

Initial access is obtained through the ClickFix technique by hijacking the clipboard and tricking the user into executing a malicious PowerShell command.

According to researchers at cybersecurity company Gen Digital, Torg Grabber is actively developed, with 334 unique samples compiled in three months (between December 2025 and February 2026) and new command-and-control (C2) servers registered every week.

New “Darksword” iOS exploit used in infostealer attack on iPhones

A new exploit kit for iOS devices and delivery framework dubbed “DarkSword” has been used to steal a wide range of personal information, including data from cryptocurrency wallet apps.

DarkSword targets iPhones running iOS 18.4 through 18.7 and is linked to multiple actors, including UNC6353, suspected to be Russian, who used the Coruna exploit chain disclosed earlier this month.

Researchers at mobile security company Lookout discovered DarkSword while investigating the infrastructure used for the Coruna attacks. Google’s Threat Intelligence Group and iVerify also collaborated for a more comprehensive analysis of this previously unknown threat and the adversaries leveraging it.

New BeatBanker Android malware poses as Starlink app to hijack devices

A new Android malware named BeatBanker can hijack devices and tricks users into installing it by posing as a Starlink app on websites masquerading as the official Google Play Store.

The malware combines banking trojan functions with Monero mining, and can steal credentials, as well as tamper with cryptocurrency transactions.

Kaspersky researchers discovered BeatBanker in campaigns targeting users in Brazil. They also found that the most recent version of the malware deploys the commodity Android remote access trojan called BTMOB RAT, instead of the banking module.

Fake Google Security site uses PWA app to steal credentials, MFA codes

A phishing campaign is using a fake Google Account security page to deliver a web-based app capable of stealing one-time passcodes, harvesting cryptocurrency wallet addresses, and proxying attacker traffic through victims’ browsers.

The attack leverages Progressive Web App (PWA) features and social engineering to deceive users into believing they are interacting with a legitimate Google Security web page and inadvertently installing the malware.

PWAs run in the browser and can be installed from a website, just like a standalone regular application, which is displayed in its own window without any visible browser controls.

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster of at least 19 malicious npm packages to enable credential harvesting and cryptocurrency key theft.

The campaign has been codenamed SANDWORM_MODE by supply chain security company Socket. As with prior Shai-Hulud attack waves, the malicious code embedded into the packages comes with capabilities to siphon system information, access tokens, environment secrets, and API keys from developer environments and automatically propagate by abusing stolen npm and GitHub identities to extend its reach.

“The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting,” the company said.

The Deflationary Singularity: Why Everything is Going to ZERO w/ Salim Ismail

The rapid advancement of technologies, particularly AI, is driving the world towards an economic singularity where the marginal cost of essentials approaches zero, leading to a deflationary future and a potential transformation of traditional systems and societies ##

## Questions to inspire discussion.

Education Transformation.

🎓 Q: How will AI reduce education time while improving effectiveness?

A: AI will customize education to each child’s learning style, reducing daily learning time to 1 hour per day while delivering 5 times more effective learning compared to traditional methods, with costs falling to zero within 3–5 years and breaking the university industry that currently creates massive student debt.

Healthcare Revolution.

Amaterasu Particle That Broke Physics Has Finally Been Explained

A mysterious, extremely energetic particle, known as the Amaterasu particle, was detected coming from a distant region of space, and scientists have proposed explanations for its origin, potentially tracing it back to a starburst galaxy like Messier 82 ##

## Questions to inspire discussion.

Understanding Ultra-High Energy Cosmic Rays.

🔬 Q: What makes the Amaterasu particle exceptionally powerful? A: The Amaterasu particle detected in Utah in 2021 carries energy 40 million times higher than anything produced on Earth, equivalent to a baseball traveling at 100 km/h compressed into a single subatomic particle, making it one of the most energetic particles ever detected.

Solving the Origin Mystery.

🎯 Q: Where did scientists determine the Amaterasu particle actually originated? A: A 2026 study by Max Planck Institute scientists using approximate Bayesian computation and 3D magnetic field simulations traced the particle’s origin to a starburst galaxy like Messier 82, located 12 million light-years away, rather than the initially suspected local void with only six known galaxies.

/* */