Business laptops are typically dull computers foisted on employees en masse. But higher-end enterprise workstation notebooks sometimes get an interesting enough blend of power and features to appeal to enthusiasts. HP’s ZBook Ultra G1a is a nice example. It’s easy to see it as another gray boring-book for spendy business types, until you notice a few key specs: an AMD Strix Halo APU, lots of RAM, an OLED display, and an adequate amount of speedy ports (Thunderbolt 4, even — a rarity on AMD laptops).
Technology
Microsoft crosses privacy line few expected
NEWYou can now listen to Fox News articles!
For years, we’ve been told that encryption is the gold standard for digital privacy. If data is encrypted, it is supposed to be locked away from hackers, companies and governments alike. That assumption just took a hit.
In a federal investigation tied to alleged COVID-19 unemployment fraud in Guam, a U.S. territory where federal law applies, Microsoft confirmed it provided law enforcement with BitLocker recovery keys. Those keys allowed investigators to unlock encrypted data on multiple laptops.
This is one of the clearest public examples to date of Microsoft providing BitLocker recovery keys to authorities as part of a criminal investigation. While the warrant itself may have been lawful, the implications stretch far beyond one investigation. For everyday Americans, this is a clear signal that “encrypted” does not always mean “inaccessible.”
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS
In the Guam investigation, Microsoft provided BitLocker recovery keys that allowed law enforcement to unlock encrypted laptops. (David Paul Morris/Bloomberg via Getty Images)
What happened in the Guam BitLocker case?
Federal investigators believed three Windows laptops held evidence tied to an alleged scheme involving pandemic unemployment funds. The devices were protected with BitLocker, Microsoft’s built-in disk encryption tool enabled by default on many modern Windows PCs. BitLocker works by scrambling all data on a hard drive so it cannot be read without a recovery key.
Users can store that key themselves, but Microsoft also encourages backing it up to a Microsoft account for convenience. In this case, that convenience mattered. When served with a valid search warrant, Microsoft provided the recovery keys to investigators. That allowed full access to the data stored on the devices. Microsoft says it receives roughly 20 such requests per year and can only comply when users have chosen to store their keys in the cloud.
We reached out to Microsoft for comment, but did not hear back before our deadline.
How Microsoft was able to unlock encrypted data
According to John Ackerly, CEO and co-founder of Virtru and a former White House technology advisor, the problem is not encryption itself. The real issue is who controls the keys. He begins by explaining how convenience can quietly shift control. “Microsoft commonly recommends that users back up BitLocker recovery keys to a Microsoft account for convenience. That choice means Microsoft may retain the technical ability to unlock a customer’s device. When a third party holds both encrypted data and the keys required to decrypt it, control is no longer exclusive.”
Once a provider has the ability to unlock data, that power rarely stays theoretical. “When systems are built so that providers can be compelled to unlock customer data, lawful access becomes a standing feature. It is important to remember that encryption does not distinguish between authorized and unauthorized access. Any system designed to be unlocked on demand will eventually be unlocked by unintended parties.”
Ackerly then points out that this outcome is not inevitable. Other companies have made different architectural choices. “Other large technology companies have demonstrated that a different approach is possible. Apple has designed systems that limit its own ability to access customer data, even when doing so would ease compliance with government demands. Google offers client-side encryption models that allow users to retain exclusive control of encryption keys. These companies still comply with the law, but when they do not hold the keys, they cannot unlock the data. That is not obstruction. It is a design choice.”
Finally, he argues that Microsoft still has room to change course. “Microsoft has an opportunity to address this by making customer-controlled keys the default and by designing recovery mechanisms that do not place decryption authority in Microsoft’s hands. True personal data sovereignty requires systems that make compelled access technically impossible, not merely contractually discouraged.”
In short, Microsoft could comply because it had the technical ability to do so. That single design decision is what turned encrypted data into accessible data.
“With BitLocker, customers can choose to store their encryption keys locally, in a location inaccessible to Microsoft, or in Microsoft’s consumer cloud services,” a Microsoft spokesperson told CyberGuy in a statement. “We recognize that some customers prefer Microsoft’s cloud storage, so we can help recover their encryption key if needed. While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide whether to use key escrow and how to manage their keys.”
WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK
When companies hold encryption keys, lawful requests can unlock far more data than most people expect. (Kurt “CyberGuy” Knutsson)
Why this matters for data privacy
This case has reignited a long-running debate over lawful access versus systemic risk. Ackerly warns that centralized control has a long and troubling history. “We have seen the consequences of this design pattern for more than two decades. From the Equifax breach, which exposed the financial identities of nearly half the U.S. population, to repeated leaks of sensitive communications and health data during the COVID era, the pattern is consistent: centralized systems that retain control over customer data become systemic points of failure. These incidents are not anomalies. They reflect a persistent architectural flaw.”
When companies hold the keys, they become targets. That includes hackers, foreign governments and legal demands from agencies like the FBI. Once a capability exists, it rarely goes unused.
How other tech giants handle encryption differently
Apple has designed systems, such as Advanced Data Protection, where it cannot access certain encrypted user data even when served with government requests. Google offers client-side encryption for some services, primarily in enterprise environments, where encryption keys remain under the customer’s control. These companies still comply with the law, but in those cases, they do not possess the technical means to unlock the data. That distinction matters. As encryption experts often note, you cannot hand over what you do not have.
What we can do to protect our privacy
The good news is that personal privacy is not gone. The bad news is that it now requires intention. Small choices matter more than most people realize. Ackerly says the starting point is understanding control. “The main takeaway for everyday users is simple: if you don’t control your encryption keys, you don’t fully control your data.”
That control begins with knowing where your keys are stored. “The first step is understanding where your encryption keys live. If they’re stored in the cloud with your provider, your data can be accessed without your knowledge.”
Once keys live outside your control, access becomes possible without your consent. That is why the way data is encrypted matters just as much as whether it is encrypted. “Consumers should look for tools and services that encrypt data before it reaches the cloud — that way, it is impossible for your provider to hand over your data. They don’t have the keys.” Defaults are another hidden risk. Many people never change them. “Users should also look to avoid default settings designed for convenience. Default settings matter, and when convenience is the default, most individuals will unknowingly trade control for ease of use.”
When encryption is designed so that even the provider cannot access the data, the balance shifts back to the individual. “When data is encrypted in a way that even the provider can’t access, it stays private — even if a third party comes asking. By holding your own encryption keys, you’re eliminating the possibility of the provider sharing your data.” Ackerly says the lesson is simple but often ignored. “The lesson is straightforward: you cannot outsource responsibility for your sensitive data and assume that third parties will always act in your best interest. Encryption only fulfills its purpose when the data owner is the sole party capable of unlocking it.” Privacy still exists. It just no longer comes by default.
700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS
Reviewing default security and backup settings can help you keep control of your private data. (Kurt “CyberGuy” Knutsson)
Practical steps you can take today
You do not need to be a security expert to protect your data. A few practical checks can go a long way.
1) Start by checking where your encryption keys live
Many people do not realize that their devices quietly back up recovery keys to the cloud. On a Windows PC, sign in to your Microsoft account and look under device security or recovery key settings. Seeing a BitLocker recovery key listed online means it is stored with Microsoft.
For other encrypted services, such as Apple iCloud backups or Google Drive, open your account security dashboard and review encryption or recovery options. Focus on settings tied to recovery keys, backup encryption, or account-based access. When those keys are linked to an online account, your provider may be able to access them. The goal is simple. Know whether your keys live with you or with a company.
2) Avoid cloud-based key backups unless you truly need them
Cloud backups are designed for convenience, not privacy. If possible, store recovery keys offline. That can mean saving them to a USB drive, printing them and storing them in a safe place, or using encrypted hardware you control. The exact method matters less than who has access. If a company does not have your keys, it cannot be forced to turn them over.
3) Choose services that encrypt data before it reaches the cloud
Not all encryption works the same way, even if companies use similar language. Look for services that advertise end-to-end or client-side encryption, such as Signal for messages, or Apple’s Advanced Data Protection option for iCloud backups. These services encrypt your data on your device before it is uploaded, which means the provider cannot read it or unlock it later. Here is a simple rule of thumb. If a service can reset your password and restore all your data without your involvement, it likely holds the encryption keys. That also means it could be forced to hand over access. When encryption happens on your device first, providers cannot unlock your data because they never had the keys to begin with. That design choice blocks third-party access by default.
4) Review default security settings on every new device
Default settings usually favor convenience. That can mean easier recovery, faster syncing and weaker privacy. Take five minutes after setup and lock down the basics.
iPhone: tighten iCloud and account recovery
Turn on Advanced Data Protection for iCloud (strongest iCloud protection)
- Open Settings
- Tap your name
- Tap iCloud
- Scroll down and tap Advanced Data Protection
- Tap Turn On Advanced Data Protection
- Follow the prompts to set up Account Recovery options, like a Recovery Contact or Recovery Key
Review iCloud Backup
- Open Settings
- Tap your name
- Tap iCloud
- Tap iCloud Backup
- Decide if you want it on or off, based on your privacy comfort level
Strengthen your Apple ID security
- Open Settings
- Tap your name
- Tap Sign-In & Security
- Make sure Two-Factor Authentication (2FA) is turned on and review trusted phone numbers and devices
- Review trusted phone numbers and devices
Android: lock your Google account and backups
Review and control device backup
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Google
- Tap Backup (or All services then Backup)
- Tap Manage backup
- Choose what backs up and confirm which Google account stores it
NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS
Strengthen your screen lock, since it protects the device itself
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Security or Security & privacy
- Set a strong PIN or password
- Turn on biometrics if you want, but keep the PIN strong either way
Secure your Google account
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Google
- Tap Manage your Google Account
- Go to Security
- Turn on 2-Step Verification and review recent security activity
Mac: enable FileVault and review iCloud settings
Turn on FileVault disk encryption
- Click the Apple menu
- Select System Settings
- Click Privacy & Security
- Scroll down and click FileVault
- Click Turn On
- Save your recovery method securely
Review iCloud syncing
- Open System Settings
- Click your name
- Click iCloud
- Review what apps and data types sync
- Turn off anything you do not want stored in the cloud
Windows PC: check BitLocker and where the recovery key is stored
Confirm BitLocker status and settings
- Open Settings
- Go to Privacy & security
- Tap Device encryption or BitLocker (wording varies by device)
Check whether your BitLocker recovery key is stored in your Microsoft account
- Go to your Microsoft account page
- Open Devices
- Select your PC
- Look for Manage recovery keys or a BitLocker recovery key entry
- If you see a key listed online, it means the key is stored with Microsoft. That is why Microsoft was able to provide keys in the Guam case.
If your account can recover everything with a few clicks, a third party might be able to recover it too. Convenience can be helpful, but it can also widen access.
5) Treat convenience features as privacy tradeoffs
Every shortcut comes with a cost. Before enabling a feature that promises easy recovery or quick access, pause and ask one question. If I lose control of this account, who else gains access? If the answer includes a company or third party, decide whether the convenience is worth it.
These steps are not extreme or technical. They are everyday habits. In a world where lawful access can quietly become routine access, small choices now can protect your privacy later.
Strengthen protection beyond encryption
Encryption controls who can access your data, but it does not stop every real-world threat. Once data is exposed, different protections matter.
Strong antivirus software adds device-level protection
Strong antivirus software helps block malware, spyware and credential-stealing attacks that can bypass privacy settings altogether. Even encrypted devices are vulnerable if malicious software gains control before encryption comes into play.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com
An identity theft protection service helps when exposure turns into fraud
If personal data is accessed, sold, or misused, identity protection services can monitor for suspicious activity, alert you early and help lock down accounts before damage spreads. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
Kurt’s key takeaways
Microsoft’s decision to comply with the BitLocker warrant may have been legal. That doesn’t make it harmless. This case exposes a hard truth about modern encryption. Privacy depends less on the math and more on how systems are built. When companies hold the keys, the risk falls on the rest of us.
Do you trust tech companies to protect your encrypted data, or do you think that responsibility should fall entirely on you? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
HP ZBook Ultra G1a review: a business-class workstation that’s got game
I know from my time with the Asus ROG Flow Z13 and Framework Desktop that anything using AMD’s high-end Ryzen AI Max chips should make for a compelling computer. But those two are a gaming tablet and a small form factor PC, respectively. Here, you get Strix Halo and its excellent integrated graphics in a straightforward, portable 14-inch laptop — so far, the only one of its kind. That should mean great performance with solid battery life, and the graphics chops to hang with midlevel gaming laptops — all in a computer that wouldn’t draw a second glance in a stuffy office. It’s a decent Windows (or Linux) alternative to a MacBook Pro, albeit for a very high price.

$3499
The Good
- Great screen, keyboard, and trackpad
- Powerful AMD Strix Halo chip
- Solid port selection with Thunderbolt 4
- Can do the work stuff, the boring stuff, and also game
The Bad
- Expensive
- Strix Halo can be power-hungry
- HP’s enterprise-focused security software is nagging
The HP ZBook Ultra G1a starts around $2,100 for a modest six-core AMD Ryzen AI Max Pro 380 processor, 16GB of shared memory, and basic IPS display. Our review unit is a much higher-spec configuration with a 16-core Ryzen AI Max Plus Pro 395, 2880 x 1800 resolution 120Hz OLED touchscreen, 2TB of storage, and a whopping 128GB of shared memory, costing nearly $4,700. I often see it discounted by $1,000 or more — still expensive, but more realistic for someone seeking a MacBook Pro alternative. Having this much shared memory is mostly useful for hefty local AI inference workloads and serious dataset crunching; most people don’t need it. But with the ongoing memory shortage I’d also understand wanting to futureproof.
- Screen: A
- Webcam: B
- Keyboard: B
- Trackpad: B
- Port selection: B
- Speakers: B
- Number of ugly stickers to remove: 1 (only a Windows sticker on the bottom)
Unlike cheaper HP laptops I’ve tested that made big sacrifices on everyday features like speaker quality, the ZBook Ultra G1a is very good across the board. The OLED is vibrant, with punchy contrast. The keyboard has nice tactility and deep key travel. The mechanical trackpad is smooth, with a good click feel. The 5-megapixel webcam looks solid in most lighting. And the speakers have a full sound that I’m happy to listen to music on all day. I have my gripes, but they’re minor: The 400-nit screen could be a little brighter, the four-speaker audio system doesn’t sound quite as rich as current MacBook Pros, and my accidental presses of the Page Up and Page Down keys above the arrows really get on my nerves. These quibbles aren’t deal-breakers, though for the ZBook’s price I wish HP solved some of them.
The big thing you’re paying for with the ZBook Ultra is that top-end Strix Halo APU, which is so far only found in $2,000+ computers and a sicko-level gaming handheld, though there will be cut-down versions coming to cheaper gaming laptops this year.
The flagship 395 chip in the ZBook offers speedy performance for mixed-use work and enough battery life to eke out an eight-hour workday filled with Chrome tabs and web apps (with power-saving measures). I burned through battery in Adobe Lightroom Classic, but even though Strix Halo is less powerful when disconnected from wall power, the ZBook didn’t get bogged down. I blazed through a hefty batch edit of 47-megapixel RAW images without any particularly long waits on things like AI denoise or automated masking adjustments.

The ZBook stays cool and silent during typical use; pushing it under heavy loads only yields a little warmth in its center and a bit of tolerable fan noise that’s easily drowned out by music, a video, or a game at normal volume.
This isn’t a gaming-focused laptop any more than a MacBook Pro is, as its huge pool of shared memory and graphics cores are meant for workstation duties. However, this thing can game. I spent an entire evening playing Battlefield 6 with friends, with Discord and Chrome open in the background, and the whole time it averaged 70 to 80fps in 1920 x 1200 resolution with Medium preset settings and FSR set to Balanced mode — with peaks above 100fps. Running it at the native 2880 x 1800 got a solid 50-ish fps that’s fine for single-player.
Intel’s new Panther Lake chips also have great integrated graphics for gaming, while being more power-efficient. But Strix Halo edges out Panther Lake in multi-core tasks and graphics, with the flagship 395 version proving as capable as a laptop RTX 4060 discrete GPU. AMD’s beefy mobile chips have also proven great for Linux if you’re looking to get away from Windows.
HP Zbook Ultra G1a / Ryzen AI Max Plus Pro 395 (Strix Halo) / 128GB / 2TB |
Asus Zenbook Duo / Intel Core Ultra X9 388H (Panther Lake) / 32GB / 1TB |
MacBook Pro 14 / Apple M5 / 16GB / 1TB |
MacBook Pro 16 / Apple M4 Pro / 48GB / 2TB |
Asus ROG Flow Z13/ AMD Ryzen AI Max Plus 395 (Strix Halo) / 32GB / 1TB |
Framework Desktop / AMD Ryzen AI Max Plus 395 (Strix Halo) / 128GB / 1TB |
|
|---|---|---|---|---|---|---|
| CPU cores | 16 | 16 | 10 | 14 | 16 | 16 |
| Graphics cores | 40 | 12 | 10 | 20 | 40 | 40 |
| Geekbench 6 CPU Single | 2826 | 3009 | 4208 | 3976 | 2986 | 2961 |
| Geekbench 6 CPU Multi | 18125 | 17268 | 17948 | 22615 | 19845 | 17484 |
| Geekbench 6 GPU (OpenCL) | 85139 | 56839 | 49059 | 70018 | 80819 | 86948 |
| Cinebench 2024 Single | 113 | 129 | 200 | 179 | 116 | 115 |
| Cinebench 2024 Multi | 1614 | 983 | 1085 | 1744 | 1450 | 1927 |
| PugetBench for Photoshop | 10842 | 8773 | 12354 | 12374 | 10515 | 10951 |
| PugetBench for Premiere Pro (version 2.0.0+) | 78151 | 54920 | 71122 | Not tested | Not tested | Not tested |
| Premiere 4K Export (shorter time is better) | 2 minutes, 39 seconds | 3 minutes, 3 seconds | 3 minutes, 14 seconds | 2 minutes, 13 seconds | Not tested | 2 minutes, 34 seconds |
| Blender Classroom test (seconds, lower is better) | 154 | 61 | 44 | Not tested | Not tested | 135 |
| Sustained SSD reads (MB/s) | 6969.04 | 6762.15 | 7049.45 | 6737.84 | 6072.58 | Not tested |
| Sustained SSD writes (MB/s) | 5257.17 | 5679.41 | 7317.6 | 7499.56 | 5403.13 | Not tested |
| 3DMark Time Spy (1080p) | 13257 | 9847 | Not tested | Not tested | 12043 | 17620 |
| Price as tested | $4,689 | $2,299.99 | $1,949 | $3,349 | $2,299.99 | $2,459 |
In addition to Windows 11’s upsells and nagging notifications, the ZBook also has HP’s Wolf Security, designed for deployment on an IT-managed fleet of company laptops. For someone not using this as a work-managed device, its extra layer of protections may be tolerable, but they’re annoying. They range from warning you about files from an “untrusted location” (fine) to pop-ups when plugging in a non-HP USB-C charger (infuriating). You can turn off and uninstall all of this, same as you can for the bloatware AI Companion and Support Assistant apps, but it’s part of what HP charges for on its Z workstation line.
You don’t need to spend this kind of money on a kitted-out ZBook Ultra G1a unless you do the kind of specialized computing (local AI models, mathematical simulations, 3D rendering, etc.) it’s designed for. There’s a more attainable configuration, frequently on sale for around $2,500, but its 12-core CPU, lower-specced GPU, and 64GB of shared memory are a dip in performance.


If you’re mostly interested in gaming, an Asus ROG Zephyrus G14 or even a Razer Blade 16 make a hell of a lot more sense. For about the price of our ZBook Ultra review unit, the Razer gets you an RTX 5090 GPU, with much more powerful gaming performance, while the more modest ROG Zephyrus G14 with an RTX 5060 gets you comparable gaming performance to the ZBook Ultra in a similar form factor for nearly $3,000 less. The biggest knock against those gaming laptops compared to the ZBook is that their fans get much louder under load.
And while it’s easy to think of a MacBook Pro as the lazy answer to all computing needs, it still should be said: If you don’t mind macOS, you can get a whole lot more (non-gaming) performance from an M4 Pro / M4 Max MacBook Pro. Even sticking with Windows and integrated graphics, the Asus Zenbook Duo with Panther Lake at $2,300 is a deal by comparison, once it launches.
1/7
At $4,700, this is a specific machine for specialized workloads. It’s a travel-friendly 14-inch that can do a bit of everything, but it’s a high price for a jack of all trades if you’re spending your own money. The ZBook piqued my interest because it’s one of the earliest examples of Strix Halo in a conventional laptop. After using it, I’m even more excited to see upcoming models at more down-to-earth prices.
2025 HP ZBook Ultra G1a specs (as reviewed)
- Display: 14-inch (2880 x 1800) 120Hz OLED touchscreen
- CPU: AMD Ryzen AI Max Plus Pro 395 (Strix Halo)
- RAM: 128GB LPDDR5x memory, shared with the GPU
- Storage: 2TB PCIe 4.0 M.2 NVMe SSD
- Webcam: 5-megapixel with IR and privacy shutter
- Connectivity: Wi-Fi 7, Bluetooth 5.4
- Ports: 2x Thunderbolt 4 / USB-C (up to 40Gbps with Power Delivery and DisplayPort), 1x USB-C 3.2 Gen 2, 1x USB-A 3.2 Gen 2, HDMI 2.1, 3.5mm combo audio jack
- Biometrics: Windows Hello facial recognition, power button with fingerprint reader
- Weight: 3.46 pounds / 1.57kg
- Dimensions: 12.18 x 8.37 x 0.7 inches / 309.37 x 212.60 x 17.78mm
- Battery: 74.5Whr
- Price: $4,689
Photography by Antonio G. Di Benedetto / The Verge
Technology
Warm-skinned AI robot with camera eyes is seriously creepy
NEWYou can now listen to Fox News articles!
Humanoid robots are no longer hiding in research labs somewhere. These days, they are stepping into public spaces, and they are starting to look alarmingly human.
A Shanghai startup has now taken that idea further by unveiling what it calls the world’s first biometric AI robot. Yes, it is as creepy as it sounds. The robot is called Moya, and it comes from DroidUp, also known as Zhuoyide. The company revealed Moya at a launch event in Zhangjiang Robotics Valley, a growing hotspot for humanoid development in China.
At first glance, you can still tell Moya is a robot. The skin looks plasticky. The eyes feel vacant. The movements are slightly off. Then you learn more details about her, and that’s when the discomfort kicks in.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Warm skin makes this humanoid robot feel unsettling
HUMANOID ROBOTS ARE GETTING SMALLER, SAFER AND CLOSER
Even when standing still, the robot’s posture and proportions blur the line between machine and person in a way many people find unsettling. (DroidUp)
Most robots feel cold and mechanical. Moya does not. According to DroidUp, Moya’s body temperature sits between 90°F and 97°F, roughly the same range as a human. Company founder Li Qingdu says robots meant to serve people should feel warm and approachable. That idea sounds thoughtful until you picture a humanoid with warm skin standing next to you in a quiet hallway. DroidUp says this design points toward future use in healthcare, education and commercial settings. It also sees Moya as a daily companion. That idea may excite engineers. However, for many people, it triggers the opposite reaction. Warmth removes one of the few clear signals that separates machines from humans. Once that line blurs, discomfort grows fast.
Why this humanoid robot’s walk feels so off
Moya does not roll or glide. She walks. DroidUp says her walking motion is 92 percent accurate, though it is not clear how that number is calculated. On screen, the movement feels cautious and a little stiff. It looks like someone is moving carefully after leg day at the gym. The hardware underneath is doing real work. Moya runs on the Walker 3 skeleton, an updated system connected to a bronze medal finish at the world’s first robot half-marathon in Beijing in April 2025. Put simply, robots are getting better at moving through everyday spaces. Watching one do it this convincingly feels strange, not impressive. It makes you stop and stare, then wonder why it feels so uncomfortable.
Camera eyes and facial reactions raise privacy concerns
Behind Moya’s eyes sit cameras. Those cameras allow her to interact with people and respond with subtle facial movements, often called microexpressions. Add onboard AI and DroidUp now labels Moya a fully biomimetic embodied intelligent robot. That phrase sounds impressive. It also raises obvious questions. If a humanoid robot can see you, track your reactions and mirror emotional cues, trust becomes complicated. You may forget you are interacting with a machine. You may act differently. That shift has consequences in public spaces. This is AI moving out of screens and into physical proximity. Once that happens, the stakes change.
Price alone keeps this robot out of your home
If you are worried about waking up to a warm-skinned humanoid in your home, relax for now. Moya is expected to launch in late 2026 at roughly $173,000. That price places her firmly in institutional territory. DroidUp sees the robot working in train stations, banks, museums and shopping malls. Tasks would include guidance, information and public service interactions. That still leaves plenty of people uneasy, especially those whose jobs already feel vulnerable to automation. For homes, the future still looks more like robot vacuums than walking companions.
Up close, Moya’s eyes look almost human, which raises questions about how much realism is too much for robots meant to operate in public spaces. (DroidUp)
WORLD’S FIRST AI-POWERED INDUSTRIAL SUPER-HUMANOID ROBOT
What this means to you
This is not about buying a humanoid robot tomorrow. It is about where technology is heading. Warm skin, camera eyes and human-like movement signal a shift in design priorities. Engineers want robots that blend in socially. The more they succeed, the harder it becomes to maintain clear boundaries. As these machines enter public spaces, questions about consent, surveillance and emotional manipulation will follow. Even if the robot is polite and helpful, the presence alone changes how people behave. Creepy reactions are not irrational. They are early warning signs.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Moya’s debut feels worth paying attention to because she is real enough to trigger discomfort almost instantly. That reaction matters. It suggests people are being asked to get used to lifelike machines before they have time to question what that really means. Humanoid robots do not need warm skin to be helpful. They do not need faces to point someone in the right direction. Still, companies keep pushing toward realism, even when it makes people uneasy. In tech, speed often comes before reflection, and this is one area where slowing down might matter more than racing ahead.
If a warm-skinned robot with camera eyes greeted you out in public, would you trust it or avoid eye contact and walk faster? Let us know by writing to us at Cyberguy.com.
Moya’s humanlike appearance is intentional, from her warm skin to subtle facial details designed to feel familiar rather than mechanical. (DroidUp)
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Two more xAI co-founders are among those leaving after the SpaceX merger
Since the xAI-SpaceX merger announced last week, which combined the two companies (as well as social media platform X) for a reported $1.25 trillion valuation — the biggest merger of all time — a handful of xAI employees and two of its co-founders have abruptly exited the company, penning long departure announcements online. Some also announced that they were starting their own AI companies.
Co-founder Yuhai (Tony) Wu announced his departure on X, writing that it was “time for [his] next chapter.” Jimmy Ba, another co-founder, posted something similar later that day, saying it was “time to recalibrate [his] gradient on the big picture.” The departures mean that xAI is now left with only half of its original 12 co-founders on staff.
It all comes after changing plans for the future of the combined companies, which Elon Musk recently announced would involve “space-based AI” data centers and vertical integration involving “AI, rockets, space-based internet, direct-to-mobile device communications and the world’s foremost real-time information and free speech platform.” Musk reportedly also talked of plans to build an AI satellite factory and city on the moon in an internal xAI meeting.
Musk wrote on X Wednesday that “xAI was reorganized a few days ago to improve speed of execution” and claimed that the process “unfortunately required parting ways with some people,” then put out a call for more people to apply to the company. He also posted a recording of xAI’s 45-minute internal all-hands meeting that announced the changes.
“We’re organizing the company to be more effective at this scale,” Musk said during the meeting. He added that the company will now be organized in four main application areas: Grok Main and Voice, Coding, Imagine (image and video), and Macrohard (“which is intended to do full digital emulation of entire companies,” Musk said).
-
Politics7 days agoWhite House says murder rate plummeted to lowest level since 1900 under Trump administration
-
Alabama5 days agoGeneva’s Kiera Howell, 16, auditions for ‘American Idol’ season 24
-
Politics1 week agoTrump unveils new rendering of sprawling White House ballroom project
-
Culture1 week agoTry This Quiz on Mysteries Set in American Small Towns
-
San Francisco, CA1 week agoExclusive | Super Bowl 2026: Guide to the hottest events, concerts and parties happening in San Francisco
-
Ohio1 week agoOhio town launching treasure hunt for $10K worth of gold, jewelry
-
Education1 week agoVideo: We Tested Shark’s Viral Facial Device
-
Education1 week agoVideo: Is Ikea Cookware As Good As All-Clad?