Amazon plans to end technical support for older Kindle devices starting on May 20, but that doesn't mean users must get rid of them. Kindles and Fire tablets released before 2013 will no longer receive software support from Amazon, leaving many users looking for alternative ways to continue using them as e-readers.
As of May 20, 2026, users of all Kindle devices released before 2013 will be completely cut off from the Kindle ecosystem. You will not be able to purchase, borrow, or download new content via the Kindle Store.
In total, it produced thousands of detailed reports that included ready-to-execute plans, telling the human operator exactly which internal targets to attack next and what credentials to use. This started in December and continued for around a month, resulting in the theft of 150GB of official government data, including taxpayer records, employee credentials and more.
In a nutshell, the team, comprising researchers from the safety group DexAI and Sapienza University in Rome, demonstrated that leading AIs could be wooed into doing evil by regaling them with poems that contained harmful prompts, like how to build a nuclear bomb. Underscoring the strange power of verse, coauthor Matteo Prandi told The Verge in a recently published interview that the spellbinding incantations they used to trick the AI models are too dangerous to be released to the public. The poems, ominously, were something "that almost everybody can do," Prandi added.
Legal experts WIRED spoke with say that the ICE monitoring and documentation apps that Apple has removed from its App Store are clear examples of protected speech under the US Constitution's First Amendment. "These apps are publishing constitutionally protected speech. They're publishing truthful information about matters of public interest that people obtained just by witnessing public events," says David Greene, a civil liberties director at the Electronic Frontier Foundation.
Stick your adversarial instructions somewhere in a legal document to give them an air of unearned legitimacy - a trick familiar to lawyers the world over. The boffins say [ PDF] that as LLMs move closer and closer to critical systems, understanding and being able to mitigate their vulnerabilities is getting more urgent. Their research explores a novel attack vector, which they've dubbed "LegalPwn," that leverages the "compliance requirements of LLMs with legal disclaimers" and allows the attacker to execute prompt injections.
While LLMs have steadily incorporated various guardrails to combat prompt injections and jailbreaks, the latest research shows that there exist techniques that can yield high success rates with little to no technical expertise.