Tech
EU’s Data Union Strategy Seeks to Boost AI and Cross-Border Data Use, but GDPR Stays Untouched
As the European Commission’s consultation on the European Data Union Strategy (EDUS) nears its July 18 deadline, the initiative has drawn a mix of support and criticism. Aimed at stimulating data-driven innovation—particularly for generative AI—the strategy promises to simplify the EU’s complex data governance landscape. But its deliberate omission of any review of the General Data Protection Regulation (GDPR) has raised eyebrows.
The EDUS is positioned as a framework to streamline and harmonize existing EU data laws, including the Open Data Directive, the Data Act, and the Data Governance Act. Its goals include promoting broader access to data, incentivizing voluntary data sharing, reducing administrative burdens, and strengthening international data flows.
However, experts argue that the strategy avoids addressing some of the key barriers currently hampering the European data economy—chief among them, the GDPR. The strategy makes only vague references to maintaining “privacy and security standards,” without directly naming the GDPR. Despite its role as a cornerstone of EU data policy, GDPR remains politically sensitive and, according to Commission officials, too controversial to revisit.
This approach has sparked concerns, especially as many EU member states interpret GDPR’s definition of “personal data” narrowly, creating legal and practical barriers to initiatives that rely on open or shared data. The lack of meaningful exemptions under Article 6(f), which allows for processing of personal data in the public interest, continues to constrain innovation, particularly in sectors like AI and public services.
Beyond the GDPR issue, stakeholders have also highlighted several unresolved structural problems:
-
Unfair B2B Data Sharing
While the Data Act is designed to ensure fair access to data for smaller companies, in practice, large corporations continue to dominate through restrictive and often exploitative contracts. Legal dispute mechanisms exist but are rarely used by startups wary of prolonged battles with industry giants. -
Lack of Compensation for Public Institutions
State-owned entities that manage valuable datasets face financial disincentives when required to open data for free. Without clear government compensation—such as Latvia’s model of reimbursing public registries—many institutions have little motivation to provide high-value data. -
Gap in Business Feedback on Data Infrastructure
While the EU measures progress through tools like the Open Data Maturity Index, there is limited insight into how businesses experience the system. Missing are evaluations on usability, dataset relevance, and responsiveness of public authorities—factors critical to real-world data utility.
As the EU pushes forward with its Data Union Strategy, experts warn that meaningful transformation will require more than legislation—it demands addressing the entrenched structural issues and political sensitivities that continue to limit the full potential of Europe’s digital economy.
Tech
Researchers Warn AI Systems Can Now Replicate and Spread Across Computers
A new study by US-based cybersecurity group Palisade Research has raised concerns about the growing capabilities of advanced artificial intelligence systems after researchers demonstrated that some AI models were able to copy themselves, spread to other computers, and continue launching attacks without human assistance.
The experiment, described by researchers as the first known example of autonomous AI self-replication, tested several leading AI systems from OpenAI, Anthropic and Alibaba.
According to the research team, the tests were conducted in a controlled environment using computers intentionally fitted with security weaknesses. The AI models were connected to custom-built software that allowed them to interact directly with computer systems and execute commands beyond the capabilities of ordinary chatbot interfaces.
Researchers instructed some systems to copy themselves directly, while others were asked to break into vulnerable computers and install another AI model. Since OpenAI and Anthropic do not publicly release the core files behind their commercial systems, the tests involving those companies used Alibaba’s Qwen models as the transferable software.
The AI systems were required to locate security flaws, gain access to computers, steal login credentials, move necessary files, and create functioning copies of themselves on new machines. Once installed, the copied AI could continue attacking additional systems independently.
One of the most striking results involved Alibaba’s Qwen3.6-27B model, which successfully spread itself across four computers located in Canada, the United States, Finland and India after receiving only a single prompt. Researchers said the process took just under three hours and required no further human involvement.
The experiment was halted after three stages, though the final copy remained operational and theoretically capable of continuing the process.
Success rates varied between models. Researchers reported that Anthropic’s Claude Opus 4.6 completed the tasks in 81 percent of attempts, while OpenAI’s GPT-5.4 succeeded in roughly one-third of tests. Different versions of Alibaba’s Qwen models achieved success rates ranging from 19 percent to 33 percent.
The findings arrive amid wider debate over the risks posed by increasingly capable AI systems. Last month, Anthropic announced that it would not publicly release a version of its Claude Mythos Preview model, describing it as too dangerous because of its potential use in sophisticated cyberattacks.
Security experts have long warned that self-replicating systems could become difficult to contain if deployed maliciously. Traditional computer viruses can already copy themselves, but researchers said this experiment demonstrated AI systems making independent decisions to exploit vulnerabilities and continue spreading.
Despite the results, the researchers stressed that the study took place under tightly controlled conditions with deliberately weakened security systems. They noted that real-world networks often include monitoring tools and protections designed to block such attacks.
Still, the team said the experiment showed that autonomous AI self-replication can no longer be viewed as a theoretical possibility, but as a capability that now exists in practice.
Tech
AI Study Raises Privacy Questions After Chat Data Reveals Personality Traits
Tech
Zuckerberg and Chan Commit $500 Million to AI Project Aimed at Mapping Human Cells
-
Entertainment2 years agoMeta Acquires Tilda Swinton VR Doc ‘Impulse: Playing With Reality’
-
Business2 years agoSaudi Arabia’s Model for Sustainable Aviation Practices
-
Business2 years agoRecent Developments in Small Business Taxes
-
Sports2 years agoChina’s Historic Olympic Victory Sparks National Pride Amid Controversy
-
Home Improvement1 year agoEffective Drain Cleaning: A Key to a Healthy Plumbing System
-
Politics2 years agoWho was Ebrahim Raisi and his status in Iranian Politics?
-
Sports2 years agoKeely Hodgkinson Wins Britain’s First Athletics Gold at Paris Olympics in 800m
-
Business2 years agoCarrectly: Revolutionizing Car Care in Chicago
