Google TV receives a major update ahead of the launch of its new streaming box 

wall-mounted TV

Image Credits: Google TV

Ahead of the launch of Google TV Streamer, the company’s new set-top streaming box, the tech giant is also bringing updates to all Google TV devices. This includes a home panel that can control smart home devices, AI-powered screensavers, a new sports page, and more. 

The company announced on Monday a host of new features to enhance its Google TV platform, starting with a new home panel that acts as a control center for compatible smart home gadgets, such as lights, thermostats, and security cameras. Users can also access new doorbell notifications to see who’s at the front door without pausing what they’re watching. Additionally, if the remote is nowhere to be found, Google Assistant voice commands allow users to control their devices hands-free. 

The home panel is located in Quick Settings and opens as a feed on the right side of the screen. 

The new sports page in the For You tab is where fans can go to get all the sports content in one place, including live and upcoming games, sports commentary, YouTube highlights, as well as personalized recommendations tailored to their interests. 

Google TV
Image Credits: Google TV

Google TV is also gaining several AI capabilities, including the ability to generate custom screensaver artwork based on a provided prompt. Initially introduced for the Google TV Streamer, Google is using Gemini to power its “Overviews” feature for listings, providing concise summaries of top shows and movies, season-by-season breakdowns, and audience reviews.

Google Freeplay, the dedicated app with 150 free channels to choose from, is getting an update too. Its revamped channel guide allows viewers to quickly browse by genre and topic. 

Google TV is also expanding to include more Art TVs, including Hisense and TCL, as well as projectors like Epson, Vankyo, and XGIMI. Plus, it’s launching in more countries: Indonesia, the Philippines, Thailand, and Vietnam.

These updates coincide with tomorrow’s release of the Google TV Streamer, which will mark the end of Google’s lineup of Chromecast devices. Google touts over 270 million monthly active Google TV and Android TV devices.

A Macbook Air with an inflated battery that has pushed the trackpad and keyboard apart.

Apple's new macOS Sequoia update is breaking some cybersecurity tools

A Macbook Air with an inflated battery that has pushed the trackpad and keyboard apart.

Image Credits: Soeren Stache/picture alliance / Getty Images

On Monday, Apple released its latest computer operating system update called macOS 15, or Sequoia. And, somehow, the software update has broken the functionality of several security tools made by CrowdStrike, SentinelOne, Microsoft, and others, according to posts on social media, as well as messages posted in a Mac-focused Slack channel. 

At this point, it’s unclear exactly what is the issue, but it appears to affect several products made by companies that provide software for macOS users and enterprises, which has caused frustration among people who work on and with macOS-focused security tools.

“As a developer of macOS security tools, it’s incredibly frustrating to time and time again have to deal with (understandably) upset users (understandably) blaming your tools for breaking their Macs, when in reality it was Apple’s fault all along,” said Patrick Wardle, the founder of Mac and iOS security startup DoubleYou, and a longtime expert on macOS security. 

“I get it, that writing bug-free software is challenging, but maybe if Apple spent less time and money on marketing, and more time on actually testing their software, we’d all be better off!” Wardle told TechCrunch.

On the day of macOS Sequoia’s release, a CrowdStrike sales engineer said in a Slack room for Mac admins that the company had to delay support for the new version of Mac’s operating system. “I’m very sorry to report that we will not be supporting Sequoia on day 1 in spite of our intention (and previous track record) to support the latest OS within hours of [General Availability],” the engineer said in the message, seen by TechCrunch. 

The engineer also said CrowdStrike sent out a “Tech Alert” to customers, adding that “there’s quite a lot going on with the changes in the network stack.”

”We’re also tracking some similar issues with other vendors, and have feedback and a case in to Apple. While we would love for there to be a fast-follow patch that resolves this for us, we’re acting under the assumption there won’t be and we’ll need to fix it in our code with a sensor release,” the sales engineer wrote. 

Contact Us

Do you work at a cybersecurity company whose products are affected by the macOS update? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

“Please trust me when I say this was looked at through every angle, to see if there was any way to continue to provide the best protection to our customers on this new OS without having to delay,” the CrowdStrike engineer wrote. “Ultimately it was decided that the best course to protect our Mac fleets is to wait until this is resolved.”

Also, several people on Reddit reported having issues with CrowdStrike’s security product on the new macOS. 

CrowdStrike spokesperson Kevin Benacci told TechCrunch on Thursday that the company is “currently waiting for a macOS Sequoia update and will provide official support. We respectfully refer you to Apple for any additional questions.”

Apple did not respond to requests for comment. 

On Monday, a SentinelOne Support account warned customers in the same Mac-focused Slack channel: “Do not upgrade your endpoints until you have a supported SentinelOne Agent,” citing a series of issues with the new macOS version. 

SentinelOne did not respond to a request for comment.

ESET also alerted customers of a network connection issue after upgrading to macOS Sequoia. An ESET representative did not respond to our request for comment. 

Other people in the same Slack reported having issues with Microsoft Defender for macOS after the Sequoia update. Microsoft did not respond to a request for comment.

Security researcher Will Dormann wrote on Mastodon that he was having issues with DNS and running his firewall on his macOS machine. Another security researcher, Wacław Jacek, wrote in a blog post that, “it seems the OS firewall can sometimes start blocking access to web browsing after upgrading to macOS Sequoia,” and shared a potential workaround. 

The problems with macOS Sequoia appear to have caused issues with Firefox browser users, too, according to a separate Reddit thread.

How to prevent your software update from being the next CrowdStrike

Times Square billboards displaying Windows blue screen of death after CrowdStrike outage on July 19, 2024.

Image Credits: Selcuk Acar/Anadolu / Getty Images

CrowdStrike released a relatively minor patch on Friday, and somehow it wreaked havoc on large swaths of the IT world running Microsoft Windows, bringing down airports, healthcare facilities and 911 call centers. While we know a faulty update caused the problem, we don’t know how it got released in the first place. A company like CrowdStrike very likely has a sophisticated DevOps pipeline with release policies in place, but even with that, the buggy code somehow slipped through.

In this case it was perhaps the mother of all buggy code. The company has suffered a steep hit to its reputation, and the stock price plunged from $345.10 on Thursday evening to $263.10 by Monday afternoon. It has since recovered slightly.

In a statement on Friday, the company acknowledged the consequences of the faulty update: “All of CrowdStrike understands the gravity and impact of the situation. We quickly identified the issue and deployed a fix, allowing us to focus diligently on restoring customer systems as our highest priority.”

Further, it explained the root cause of the outage, although not how it happened. That’s a post mortem process that will likely go on inside the company for some time as it looks to prevent such a thing from happening again.

Dan Rogers, CEO at LaunchDarkly, a firm that uses a concept called feature flags to deploy software in a highly controlled way, couldn’t speak directly to the CrowdStrike deployment problem, but he could speak to software deployment issues more broadly.

“Software bugs happen, but most of the software experience issues that someone would experience are actually not because of infrastructure issues,” he told TechCrunch. “They’re because someone rolled out a piece of software that doesn’t work, and those in general are very controllable.” With feature flags, you can control the speed of deployment of new features, and turn a feature off, if things go wrong to prevent the problem from spreading widely.

It is important to note however, that in this case, the problem was at the operating system kernel level, and once that has run amok, it’s harder to fix than say a web application. Still, a slower deployment could have alerted the company to the problem a lot sooner.

What happened at CrowdStrike could potentially happen to any software company, even one with good software release practices in place, said Jyoti Bansal, founder and CEO at Harness, a maker of DevOps pipeline developer tools. While he also couldn’t say precisely what happened at CrowdStrike, he talked generally about how buggy code can slip through the cracks.

Typically, there is a process in place where code gets tested thoroughly before it gets deployed, but sometimes an engineering team, especially in a large engineering group, may cut corners. “It’s possible for something like this to happen when you skip the DevOps testing pipeline, which is pretty common with minor updates,” Bansal told TechCrunch.

He says this often happens at larger organizations where there isn’t a single approach to software releases. “Let’s say you have 5,000 engineers, which probably will be divided into 100 teams of 50 or so different developers. These teams adopt different practices,” he said. And without standardization, it’s easier for bad code to slip through the cracks.

How to prevent bugs from slipping through

Both CEOs acknowledge that bugs get through sometimes, but there are ways to minimize the risk, including perhaps the most obvious one: practicing standard software release hygiene. That involves testing before deploying and then deploying in a controlled way.

Rogers points to his company’s software and notes that progressive rollouts are the place to start. Instead of delivering the change to every user all at once, you instead release it to a small subset and see what happens before expanding the rollout. Along the same lines, if you have controlled rollouts and something goes wrong, you can roll back. “This idea of feature management or feature control lets you roll back features that aren’t working and get people back to the prior version if things are not working.”

Bansal, whose company just bought feature flag startup Split.io in May, also recommends what he calls “canary deployments,” which are small controlled test deployments. They are called this because they hark back to canaries being sent into coal mines to test for carbon monoxide leakage. Once you prove the test roll out looks good, then you can move to the progressive roll out that Rogers alluded to.

As Bansal says, it can look fine in testing, but a lab test doesn’t always catch everything, and that’s why you have to combine good DevOps testing with controlled deployment to catch things that lab tests miss.

Rogers suggests when doing an analysis of your software testing regimen, you look at three key areas — platform, people and processes — and they all work together in his view. “It’s not sufficient to just have a great software platform. It’s not sufficient to have highly enabled developers. It’s also not sufficient to just have predefined workflows and governance. All three of those have to come together,” he said.

One way to prevent individual engineers or teams from circumventing the pipeline is to require the same approach for everyone, but in a way that doesn’t slow the teams down. “If you build a pipeline that slows down developers, they will at some point find ways to get their job done outside of it because they will think that the process is going to add another two weeks or a month before we can ship the code that we wrote,” Bansal said.

Rogers agrees that it’s important not to put rigid systems in place in response to one bad incident. “What you don’t want to have happen now is that you’re so worried about making software changes that you have a very long and protracted testing cycle and you end up stifling software innovation,” he said.

Bansal says a thoughtful automated approach can actually be helpful, especially with larger engineering groups. But there is always going to be some tension between security and governance and the need for release velocity, and it’s hard to find the right balance.

We might not know what happened at CrowdStrike for some time, but we do know that certain approaches help minimize the risks around software deployment. Bad code is going to slip through from time to time, but if you follow best practices, it probably won’t be as catastrophic as what happened last week.

Camera app Halide's latest update adds an option for 'zero-AI' image processing

Multi Phone Feature Summary Halide 2.15

Image Credits: Lux Optics

Popular iOS pro photography app Halide launched its new version today with a new feature called Process Zero, which does not use AI in image processing. Lux Optics, the company behind the Halide app, believes that this option can be a creative tool for photographers to take different kinds of snaps.

The company previously allowed users to reduce default image processing on the app. The new option skips the standard image processing and is based on a single exposure RAW file. Halide uses 12-megapixel RAW DNG files for Process Zero pictures. The company said using the fast processing pipeline gives it a 10-25x speed advantage over Apple’s ProRAW capture.

Image Credits: Lux Optics

Halide said that the new option will incorporate natural sensor grain and slight color aberrations, so it is less useful in low-light conditions. However, it will help photographers re-create the classic digital camera look.

A picture with Process Zero option.
Image Credits: Lux Optics
A picture with System default option.
Image Credits: Lux Optics

In the past few years, apps like Mood Camera, Lapse, Dispo, and Later Cam have tried to bring retro style back into vogue through different app features and limitations. Halide’s approach is to leave all the background processing behind to create a natural look.

“Many of Apple’s groundbreaking steps in image processing benefit users tremendously, and with Process Zero, you can see exactly what it does when you take it all away,” the company said in a blog post.

“Lux Optics believes strongly that as photographic processing on cameras continues to evolve, we want to offer photographers a choice of processing, making it a creative tool like choosing a lens or film stock,” it added.

The company is also adding a new feature called Image Lab, which allows users to tune exposure and redevelop photos taken with the Process Zero option.

Image Credits: Lux Optics

The Halide 2.15 update will be available to all current users with backward compatibility for users of iPhone X and iPhone SE.

The company is offering a discounted price of $11.99 for the annual subscription for a week. You can also spend $59.99 for a lifetime membership option.

Earlier this year, Lux Optics launched a new app called Kino for videographers with features like indicators for audio levels, recording format presets, focus peaking, and an RGB waveform.

Camera app Halide's latest update adds an option for 'zero-AI' image processing

Multi Phone Feature Summary Halide 2.15

Image Credits: Lux Optics

Popular iOS pro photography app Halide launched its new version today with a new feature called Process Zero, which does not use AI in image processing. Lux Optics, the company behind the Halide app, believes that this option can be a creative tool for photographers to take different kinds of snaps.

The company previously allowed users to reduce default image processing on the app. The new option skips the standard image processing and is based on a single exposure RAW file. Halide uses 12-megapixel RAW DNG files for Process Zero pictures. The company said using the fast processing pipeline gives it a 10-25x speed advantage over Apple’s ProRAW capture.

Image Credits: Lux Optics

Halide said that the new option will incorporate natural sensor grain and slight color aberrations, so it is less useful in low-light conditions. However, it will help photographers re-create the classic digital camera look.

A picture with Process Zero option.
Image Credits: Lux Optics
A picture with System default option.
Image Credits: Lux Optics

In the past few years, apps like Mood Camera, Lapse, Dispo, and Later Cam have tried to bring retro style back into vogue through different app features and limitations. Halide’s approach is to leave all the background processing behind to create a natural look.

“Many of Apple’s groundbreaking steps in image processing benefit users tremendously, and with Process Zero, you can see exactly what it does when you take it all away,” the company said in a blog post.

“Lux Optics believes strongly that as photographic processing on cameras continues to evolve, we want to offer photographers a choice of processing, making it a creative tool like choosing a lens or film stock,” it added.

The company is also adding a new feature called Image Lab, which allows users to tune exposure and redevelop photos taken with the Process Zero option.

Image Credits: Lux Optics

The Halide 2.15 update will be available to all current users with backward compatibility for users of iPhone X and iPhone SE.

The company is offering a discounted price of $11.99 for the annual subscription for a week. You can also spend $59.99 for a lifetime membership option.

Earlier this year, Lux Optics launched a new app called Kino for videographers with features like indicators for audio levels, recording format presets, focus peaking, and an RGB waveform.

How to prevent your software update from being the next CrowdStrike

Times Square billboards displaying Windows blue screen of death after CrowdStrike outage on July 19, 2024.

Image Credits: Selcuk Acar/Anadolu / Getty Images

CrowdStrike released a relatively minor patch on Friday, and somehow it wreaked havoc on large swaths of the IT world running Microsoft Windows, bringing down airports, healthcare facilities and 911 call centers. While we know a faulty update caused the problem, we don’t know how it got released in the first place. A company like CrowdStrike very likely has a sophisticated DevOps pipeline with release policies in place, but even with that, the buggy code somehow slipped through.

In this case it was perhaps the mother of all buggy code. The company has suffered a steep hit to its reputation, and the stock price plunged from $345.10 on Thursday evening to $263.10 by Monday afternoon. It has since recovered slightly.

In a statement on Friday, the company acknowledged the consequences of the faulty update: “All of CrowdStrike understands the gravity and impact of the situation. We quickly identified the issue and deployed a fix, allowing us to focus diligently on restoring customer systems as our highest priority.”

Further, it explained the root cause of the outage, although not how it happened. That’s a post mortem process that will likely go on inside the company for some time as it looks to prevent such a thing from happening again.

Dan Rogers, CEO at LaunchDarkly, a firm that uses a concept called feature flags to deploy software in a highly controlled way, couldn’t speak directly to the CrowdStrike deployment problem, but he could speak to software deployment issues more broadly.

“Software bugs happen, but most of the software experience issues that someone would experience are actually not because of infrastructure issues,” he told TechCrunch. “They’re because someone rolled out a piece of software that doesn’t work, and those in general are very controllable.” With feature flags, you can control the speed of deployment of new features, and turn a feature off, if things go wrong to prevent the problem from spreading widely.

It is important to note however, that in this case, the problem was at the operating system kernel level, and once that has run amok, it’s harder to fix than say a web application. Still, a slower deployment could have alerted the company to the problem a lot sooner.

What happened at CrowdStrike could potentially happen to any software company, even one with good software release practices in place, said Jyoti Bansal, founder and CEO at Harness, a maker of DevOps pipeline developer tools. While he also couldn’t say precisely what happened at CrowdStrike, he talked generally about how buggy code can slip through the cracks.

Typically, there is a process in place where code gets tested thoroughly before it gets deployed, but sometimes an engineering team, especially in a large engineering group, may cut corners. “It’s possible for something like this to happen when you skip the DevOps testing pipeline, which is pretty common with minor updates,” Bansal told TechCrunch.

He says this often happens at larger organizations where there isn’t a single approach to software releases. “Let’s say you have 5,000 engineers, which probably will be divided into 100 teams of 50 or so different developers. These teams adopt different practices,” he said. And without standardization, it’s easier for bad code to slip through the cracks.

How to prevent bugs from slipping through

Both CEOs acknowledge that bugs get through sometimes, but there are ways to minimize the risk, including perhaps the most obvious one: practicing standard software release hygiene. That involves testing before deploying and then deploying in a controlled way.

Rogers points to his company’s software and notes that progressive rollouts are the place to start. Instead of delivering the change to every user all at once, you instead release it to a small subset and see what happens before expanding the rollout. Along the same lines, if you have controlled rollouts and something goes wrong, you can roll back. “This idea of feature management or feature control lets you roll back features that aren’t working and get people back to the prior version if things are not working.”

Bansal, whose company just bought feature flag startup Split.io in May, also recommends what he calls “canary deployments,” which are small controlled test deployments. They are called this because they hark back to canaries being sent into coal mines to test for carbon monoxide leakage. Once you prove the test roll out looks good, then you can move to the progressive roll out that Rogers alluded to.

As Bansal says, it can look fine in testing, but a lab test doesn’t always catch everything, and that’s why you have to combine good DevOps testing with controlled deployment to catch things that lab tests miss.

Rogers suggests when doing an analysis of your software testing regimen, you look at three key areas — platform, people and processes — and they all work together in his view. “It’s not sufficient to just have a great software platform. It’s not sufficient to have highly enabled developers. It’s also not sufficient to just have predefined workflows and governance. All three of those have to come together,” he said.

One way to prevent individual engineers or teams from circumventing the pipeline is to require the same approach for everyone, but in a way that doesn’t slow the teams down. “If you build a pipeline that slows down developers, they will at some point find ways to get their job done outside of it because they will think that the process is going to add another two weeks or a month before we can ship the code that we wrote,” Bansal said.

Rogers agrees that it’s important not to put rigid systems in place in response to one bad incident. “What you don’t want to have happen now is that you’re so worried about making software changes that you have a very long and protracted testing cycle and you end up stifling software innovation,” he said.

Bansal says a thoughtful automated approach can actually be helpful, especially with larger engineering groups. But there is always going to be some tension between security and governance and the need for release velocity, and it’s hard to find the right balance.

We might not know what happened at CrowdStrike for some time, but we do know that certain approaches help minimize the risks around software deployment. Bad code is going to slip through from time to time, but if you follow best practices, it probably won’t be as catastrophic as what happened last week.

How to prevent your software update from being the next CrowdStrike

Times Square billboards displaying Windows blue screen of death after CrowdStrike outage on July 19, 2024.

Image Credits: Selcuk Acar/Anadolu / Getty Images

CrowdStrike released a relatively minor patch on Friday, and somehow it wreaked havoc on large swaths of the IT world running Microsoft Windows, bringing down airports, healthcare facilities and 911 call centers. While we know a faulty update caused the problem, we don’t know how it got released in the first place. A company like CrowdStrike very likely has a sophisticated DevOps pipeline with release policies in place, but even with that, the buggy code somehow slipped through.

In this case it was perhaps the mother of all buggy code. The company has suffered a steep hit to its reputation, and the stock price plunged from $345.10 on Thursday evening to $263.10 by Monday afternoon. It has since recovered slightly.

In a statement on Friday, the company acknowledged the consequences of the faulty update: “All of CrowdStrike understands the gravity and impact of the situation. We quickly identified the issue and deployed a fix, allowing us to focus diligently on restoring customer systems as our highest priority.”

Further, it explained the root cause of the outage, although not how it happened. That’s a post mortem process that will likely go on inside the company for some time as it looks to prevent such a thing from happening again.

Dan Rogers, CEO at LaunchDarkly, a firm that uses a concept called feature flags to deploy software in a highly controlled way, couldn’t speak directly to the CrowdStrike deployment problem, but he could speak to software deployment issues more broadly.

“Software bugs happen, but most of the software experience issues that someone would experience are actually not because of infrastructure issues,” he told TechCrunch. “They’re because someone rolled out a piece of software that doesn’t work, and those in general are very controllable.” With feature flags, you can control the speed of deployment of new features, and turn a feature off, if things go wrong to prevent the problem from spreading widely.

It is important to note however, that in this case, the problem was at the operating system kernel level, and once that has run amok, it’s harder to fix than say a web application. Still, a slower deployment could have alerted the company to the problem a lot sooner.

What happened at CrowdStrike could potentially happen to any software company, even one with good software release practices in place, said Jyoti Bansal, founder and CEO at Harness Labs, a maker of DevOps pipeline developer tools. While he also couldn’t say precisely what happened at CrowdStrike, he talked generally about how buggy code can slip through the cracks.

Typically, there is a process in place where code gets tested thoroughly before it gets deployed, but sometimes an engineering team, especially in a large engineering group, may cut corners. “It’s possible for something like this to happen when you skip the DevOps testing pipeline, which is pretty common with minor updates,” Bansal told TechCrunch.

He says this often happens at larger organizations where there isn’t a single approach to software releases. “Let’s say you have 5,000 engineers, which probably will be divided into 100 teams of 50 or so different developers. These teams adopt different practices,” he said. And without standardization, it’s easier for bad code to slip through the cracks.

How to prevent bugs from slipping through

Both CEOs acknowledge that bugs get through sometimes, but there are ways to minimize the risk, including perhaps the most obvious one: practicing standard software release hygiene. That involves testing before deploying and then deploying in a controlled way.

Rogers points to his company’s software and notes that progressive rollouts are the place to start. Instead of delivering the change to every user all at once, you instead release it to a small subset and see what happens before expanding the rollout. Along the same lines, if you have controlled rollouts and something goes wrong, you can roll back. “This idea of feature management or feature control lets you roll back features that aren’t working and get people back to the prior version if things are not working.”

Bansal, whose company just bought feature flag startup Split.io in May, also recommends what he calls “canary deployments,” which are small controlled test deployments. They are called this because they hark back to canaries being sent into coal mines to test for carbon monoxide leakage. Once you prove the test roll out looks good, then you can move to the progressive roll out that Rogers alluded to.

As Bansal says, it can look fine in testing, but a lab test doesn’t always catch everything, and that’s why you have to combine good DevOps testing with controlled deployment to catch things that lab tests miss.

Rogers suggests when doing an analysis of your software testing regimen, you look at three key areas — platform, people and processes — and they all work together in his view. “It’s not sufficient to just have a great software platform. It’s not sufficient to have highly enabled developers. It’s also not sufficient to just have predefined workflows and governance. All three of those have to come together,” he said.

One way to prevent individual engineers or teams from circumventing the pipeline is to require the same approach for everyone, but in a way that doesn’t slow the teams down. “If you build a pipeline that slows down developers, they will at some point find ways to get their job done outside of it because they will think that the process is going to add another two weeks or a month before we can ship the code that we wrote,” Bansal said.

Rogers agrees that it’s important not to put rigid systems in place in response to one bad incident. “What you don’t want to have happen now is that you’re so worried about making software changes that you have a very long and protracted testing cycle and you end up stifling software innovation,” he said.

Bansal says a thoughtful automated approach can actually be helpful, especially with larger engineering groups. But there is always going to be some tension between security and governance and the need for release velocity, and it’s hard to find the right balance.

We might not know what happened at CrowdStrike for some time, but we do know that certain approaches help minimize the risks around software deployment. Bad code is going to slip through from time to time, but if you follow best practices, it probably won’t be as catastrophic as what happened last week.

Twitch Coin warp

Twitch attire policy update shuts down the viral topless meta

Twitch Coin warp

Image Credits: Bryce Durbin / TechCrunch

Twitch is effectively banning the “topless meta” and other implied nudity streams with another update to its attire policy.

Under the new policy, announced on Wednesday, streamers are no longer permitted to “imply or suggest that they are fully or partially nude,” and may not show a visible outline of their genitals, even if they’re covered. Covering breasts or genitals with objects or censor bars to suggest nudity is also prohibited. Female-presenting streamers may show cleavage, as long as their nipples and underbust are covered, and “it is clear that the streamer is wearing clothing.”

The update is in response to the rise of popular streams known as topless or “black bar” meta, in which streamers appeared naked by using clever framing or black censor bars to cover their breasts and genitals. Although the content didn’t technically violate Twitch’s attire policy forbidding actual nudity, and was properly tagged for “Sexual Themes,” the streams were still controversial in the Twitch community.

https://twitter.com/payowow/status/1735338521022333359

“For many users, the thumbnails of this content can be disruptive to their experience on Twitch.” Twitch’s Chief Customer Trust Officer Angela Hession wrote in a blog post about the update. “While content labeled with the Sexual Themes label isn’t displayed on the home page, this content is displayed within the category browse directories, and we recognize that many users frequent these pages to find content on Twitch.”

The company is also working on a feature that would allow streamers to blur thumbnails for content tagged for Sexual Themes, in addition to user settings that would allow viewers to filter content labeled with mature tags that might include sexual themes, tobacco or alcohol use, violence or explicit language.

Twitch has reworked its content policies regarding nudity and sexual themes multiple times in the past month. In a policy overhaul in December, the platform announced that it would allow “fictionalized” nudity featuring nipples, buttocks and genitals, in response to feedback from its art stream community.

Twitch’s new nudity policy allows illustrated nipples, but not human underboob

While illustrated, animated or sculpted depictions of nudity was permitted, VTubers and physical streamers themselves still had to abide by the platform’s attire policy, which forbade exposed breasts and other nudity. The update also streamlined the platform’s stance on sexual content by establishing an all-encompassing “Sexual Themes” label, so that streams tagged with mature labels wouldn’t be promoted on the platform’s homepage.

The platform rolled back the artistic nudity policy days later — the streaming community was fine with lewd furry art, but the influx of hyperrealistic AI-generated nude images raised red flags. In a follow-up blog post, Twitch CEO Dan Clancy wrote that the company went “too far” with the change, and that Twitch agreed with “community concern” regarding the flood of AI-generated nude content.

https://twitter.com/SmallAnt/status/1735379602447712559

“Digital depictions of nudity present a unique challenge — AI can be used to create realistic images, and it can be hard to distinguish between digital art and photography,” Clancy said.

The topless meta went viral late last year when streamer and OnlyFans model Morgpie began appearing naked in streams. Her “topless” streams were framed to show her bare shoulders, upper chest and cleavage. The framing implied nudity, but never actually showed content that explicitly violated Twitch’s sexual content policies. She was banned from Twitch after hosting a topless charity stream that raised funds for Doctors Without Borders.

https://twitter.com/mogrpee/status/1734017844545720321

Other streamers began making similar content, and used black bars, sheets of paper and deliberately placed objects like game controllers to cover themselves. Male streamers also parodied the meta by streaming in the nude, but covering their genitals and nipples. Other creators — particularly male streamers — complained about the popularity of implied nude content. Streamer Gross Gore, who has been previously banned on Twitch for violating its off-platform behavior policy when sexual assault and grooming allegations against him came to light, derided topless meta creators in a recent stream as a danger to children.

Other streamers have been critical of the gendered double standard on Twitch; while all “female-presenting breasts with exposed nipples” are forbidden unless breastfeeding, male streamers are allowed to show their full chests. Twitch affiliate Ren_Nyx pointed out the double standard in an X comment replying to Twitch’s policy update announcement, writing that “it makes no sense that men can be shirtless on stream,” but “if women do it and aren’t even visible it’s somehow a problem.”

Others raised concerns that the new policy would only affect smaller streamers.

“We can only hope that you put your money where your mouth is and actually enforce these new rules toward everyone it applies to — not just small streamers and vtubers,” VTuber MissusMummy replied to Twitch’s X post. “The big named money makers need to know they are not exempt from following the rules.”

Twitch cracks down on boobs again by rolling back its ‘artistic nudity’ policy

Twitch Coin warp

Twitch attire policy update shuts down the viral topless meta

Twitch Coin warp

Image Credits: Bryce Durbin / TechCrunch

Twitch is effectively banning the “topless meta” and other implied nudity streams with another update to its attire policy.

Under the new policy, announced on Wednesday, streamers are no longer permitted to “imply or suggest that they are fully or partially nude,” and may not show a visible outline of their genitals, even if they’re covered. Covering breasts or genitals with objects or censor bars to suggest nudity is also prohibited. Female-presenting streamers may show cleavage, as long as their nipples and underbust are covered, and “it is clear that the streamer is wearing clothing.”

The update is in response to the rise of popular streams known as topless or “black bar” meta, in which streamers appeared naked by using clever framing or black censor bars to cover their breasts and genitals. Although the content didn’t technically violate Twitch’s attire policy forbidding actual nudity, and was properly tagged for “Sexual Themes,” the streams were still controversial in the Twitch community.

https://twitter.com/payowow/status/1735338521022333359

“For many users, the thumbnails of this content can be disruptive to their experience on Twitch.” Twitch’s Chief Customer Trust Officer Angela Hession wrote in a blog post about the update. “While content labeled with the Sexual Themes label isn’t displayed on the home page, this content is displayed within the category browse directories, and we recognize that many users frequent these pages to find content on Twitch.”

The company is also working on a feature that would allow streamers to blur thumbnails for content tagged for Sexual Themes, in addition to user settings that would allow viewers to filter content labeled with mature tags that might include sexual themes, tobacco or alcohol use, violence or explicit language.

Twitch has reworked its content policies regarding nudity and sexual themes multiple times in the past month. In a policy overhaul in December, the platform announced that it would allow “fictionalized” nudity featuring nipples, buttocks and genitals, in response to feedback from its art stream community.

Twitch’s new nudity policy allows illustrated nipples, but not human underboob

While illustrated, animated or sculpted depictions of nudity was permitted, VTubers and physical streamers themselves still had to abide by the platform’s attire policy, which forbade exposed breasts and other nudity. The update also streamlined the platform’s stance on sexual content by establishing an all-encompassing “Sexual Themes” label, so that streams tagged with mature labels wouldn’t be promoted on the platform’s homepage.

The platform rolled back the artistic nudity policy days later — the streaming community was fine with lewd furry art, but the influx of hyperrealistic AI-generated nude images raised red flags. In a follow-up blog post, Twitch CEO Dan Clancy wrote that the company went “too far” with the change, and that Twitch agreed with “community concern” regarding the flood of AI-generated nude content.

https://twitter.com/SmallAnt/status/1735379602447712559

“Digital depictions of nudity present a unique challenge — AI can be used to create realistic images, and it can be hard to distinguish between digital art and photography,” Clancy said.

The topless meta went viral late last year when streamer and OnlyFans model Morgpie began appearing naked in streams. Her “topless” streams were framed to show her bare shoulders, upper chest and cleavage. The framing implied nudity, but never actually showed content that explicitly violated Twitch’s sexual content policies. She was banned from Twitch after hosting a topless charity stream that raised funds for Doctors Without Borders.

https://twitter.com/mogrpee/status/1734017844545720321

Other streamers began making similar content, and used black bars, sheets of paper and deliberately placed objects like game controllers to cover themselves. Male streamers also parodied the meta by streaming in the nude, but covering their genitals and nipples. Other creators — particularly male streamers — complained about the popularity of implied nude content. Streamer Gross Gore, who has been previously banned on Twitch for violating its off-platform behavior policy when sexual assault and grooming allegations against him came to light, derided topless meta creators in a recent stream as a danger to children.

Other streamers have been critical of the gendered double standard on Twitch; while all “female-presenting breasts with exposed nipples” are forbidden unless breastfeeding, male streamers are allowed to show their full chests. Twitch affiliate Ren_Nyx pointed out the double standard in an X comment replying to Twitch’s policy update announcement, writing that “it makes no sense that men can be shirtless on stream,” but “if women do it and aren’t even visible it’s somehow a problem.”

Others raised concerns that the new policy would only affect smaller streamers.

“We can only hope that you put your money where your mouth is and actually enforce these new rules toward everyone it applies to — not just small streamers and vtubers,” VTuber MissusMummy replied to Twitch’s X post. “The big named money makers need to know they are not exempt from following the rules.”

Twitch cracks down on boobs again by rolling back its ‘artistic nudity’ policy

Lego Fortnite's first big update squashes bugs and adds a launch pad

Image Credits: Epic Games

Epic’s standalone survival crafting game saw its first update on Tuesday, smoothing out some of the new game’s rough edges and adding a flurry of quality of life improvements.

We’ve covered Lego Fortnite since it launched last month, when the new title lured in 2.4 million simultaneous players. On the face of it the game is a Lego-fied version of Minecraft, but the game actually blends together a few well-loved gameplay loops that players who loved cozy titles like Animal Crossing, Stardew Valley and Valheim will find themselves right at home with.

A little over a month after its launch, Lego Fortnite’s content was beginning to run dry for players who dove in headlong in December (present company included). Unfortunately, the game’s first big update doesn’t add the massive swath of new content that some players were hoping for, but it does improve things across the board, fixing a lot of little problems and quality of life complaints that the game’s early adopters were running into.

First off, Lego Fortnite is making it easier to get around the map with the addition of launch pads, a predictable item for longtime Fortnite players but a welcome one nonetheless. The launch pads should make giant ugly staircases a relic of the past while alleviating some of the pain of traversing the game’s massive procedurally generated maps without proper vehicles or steering wheels.

Building-oriented players also get some tweaks to make things go more smoothly. Builds will now clear out nearby flora automatically and fit better onto slopes, since totally flat ground is relatively hard to come by. New floor, wall and roof options have also been added, including smaller pieces intended to make building less awkward for anyone getting fancy.

Epic is also adding more Lego styled skins into the game (Ahsoka Tano, Spider-Man, etc) and a a trio of new villagers (Bushranger, Rustler, and Tomatohead). Villagers will also be able to open doors, which is actually a considerable improvement considering how many times they get stuck beyond the castle gates and can’t get back to the oven for their late night gig baking pumpkin pies.

The full list of fixes is pretty long so if you’ve been waiting for it it’s well worth reading through the whole thing. Some big bugs should be squashed now, including the one where players spawned in the world stuck under a building (we never saw this one but the Lego Fortnite Reddit was certainly aware of it).

Beyond the specific bug fixes, improvements to stability, performance and the in-game physics should improve matters for ambitious players who bounced off of the game out of frustration (shoutout to my server-mate building us a monorail!). Hopefully the cumulative effect of these changes results in a smoother experience, because the game did seem to be catching and lagging quite a bit for some players, even on high-end hardware.

There’s a lot in here but the patch does stop short of addressing some core complaints from the game’s enthusiastic early player base. Unfortunately, it looks like servers are still limited to 15 villagers in total — a hard cap that discourages expansion and big multiplayer builds. There are no new biomes yet so wholly fresh content is in short supply, but it makes sense for Epic to nail down the basics before adding in new areas to explore. It’s also not clear from the notes if the fixes will alleviate the “high complexity area” errors a lot of players have seen, sometimes even on modest builds, but we hope so. The game is a blast so far and we’re looking forward to getting back to building that pizza oven and open-air frost biome cafe. It’s also been nice to ignore the siren song of battle royale in favor of Lego Fortnite’s cute gameplay and peaceful pace, which at its best conjures the magic of Animal Crossing New Horizons.

The game’s cozy vibes are actually key to Epic’s actually quite ambitious plans with the title, which joins Fortnite’s traditional battle royale modes along with Rocket Racing and Fortnite Festival as standalone games available in the Fortnite ecosystem. That ecosystem is the name of the game and Epic is working to build out some alternative tentpole experiences to appeal to players who might not be fight-to-the-death types.

These days, installing Fortnite drops players into a virtual storefront stocked with free playable experiences. Some of those experienced are made by Epic itself, like Lego Fortnite, but most are “user-made” with Epic’s beefy game development toolkit. While many games within the game are made by budding amateur game designers, others are branded experiences, like recent survival games from YouTube megastar MrBeast.

To expand Fortnite’s appeal, Epic needs to cast a wide net, bringing in players well beyond those who relish creeping around a cartoon map with a sniper rifle, dressed as Darth Vader. So far, Lego Fortnite is Fortnite’s most compelling alternative offering — and a game that’s likely to build more momentum as the updates keep rolling in.

Why Fortnite is getting into cozy gaming

Fortnite is the latest game to entice players with a portal to the past