{"id":321,"date":"2025-12-28T06:47:32","date_gmt":"2025-12-28T14:47:32","guid":{"rendered":"https:\/\/scienceblog.com\/sciencechina\/?p=321"},"modified":"2025-12-28T06:47:32","modified_gmt":"2025-12-28T14:47:32","slug":"when-ai-writes-like-your-boss-trust-becomes-the-vulnerability","status":"publish","type":"post","link":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/","title":{"rendered":"When AI Writes Like Your Boss, Trust Becomes the Vulnerability"},"content":{"rendered":"<p>An email lands in your inbox. The tone is familiar, the phrasing matches your manager&#8217;s style down to the occasional comma splice. It asks you to review a document on a shared drive. You click. By the time you realize the sender wasn&#8217;t your boss, your password is already logged on a server halfway across the world. This is high-fidelity phishing, and it runs on the same technology that helps you draft presentations.<\/p>\n<p>Researchers from Shanghai Jiao Tong University and East China Normal University have mapped the security landscape around large language models in a review published in Frontiers of Engineering Management (DOI: 10.1007\/s42524-025-4082-6). After screening more than 10,000 documents and analyzing 73 key works, the team outlines how fluent text generation has become a dual-use tool: helpful for drafting emails, dangerous when weaponized for impersonation, phishing, and misinformation at scale.<\/p>\n<p>The paper frames the problem across two fronts. One is misuse, where bad actors exploit the model&#8217;s fluency to automate fraud. The other is direct attacks on the model itself, including techniques that extract private training data, poison datasets, or manipulate outputs through what the researchers call prompt injection. That last method works like slipping hidden instructions into a conversation, causing the model to ignore its safety rules and follow the attacker&#8217;s script instead.<\/p>\n<h2>Jailbreaks and Watermarks<\/h2>\n<p>On the defense side, the review surveys three main strategies. Parameter processing aims to strip redundant model elements that could serve as attack surfaces. Input preprocessing detects adversarial triggers or paraphrases prompts before they reach the model, no retraining required. Adversarial training, including red-teaming frameworks, simulates attacks in order to harden the system before deployment.<\/p>\n<p>The paper also describes detection tools designed to flag AI-generated text. Semantic watermarking embeds a hidden signature that special software can trace. One tool mentioned, CheckGPT, reportedly identifies model-generated content with 98% to 99% accuracy. These methods act as a silent filter, catching malicious prompts before they turn into harmful outputs.<\/p>\n<p>But technical defenses have a shelf life. The authors argue that attack strategies evolve faster than engineering solutions, especially when those solutions only work in narrow, controlled settings. They call for scalable, low-cost approaches that can adapt across languages and deployment contexts, not just lab environments.<\/p>\n<blockquote><p>&#8220;They argue that hallucination, bias, privacy leakage, and misinformation are social-level risks, not merely engineering problems,&#8221; the study authors write.<\/p><\/blockquote>\n<h2>Trust as Infrastructure<\/h2>\n<p>The review&#8217;s broader message is that some risks spill beyond code. When LLM outputs are treated as authoritative in healthcare, education, or public services, hallucinations and bias can produce institutional harms. A confidently stated lie can carry weight if it sounds plausible enough, and fluency alone doesn&#8217;t guarantee accuracy.<\/p>\n<p>To address that layer, the authors recommend ethical governance alongside technical safeguards. They highlight transparency, verifiable traceability, cross-disciplinary oversight, dataset audits, and public awareness education as necessary components. The goal is to reduce misuse and protect vulnerable populations from systems that generate convincing but unreliable information.<\/p>\n<p>In practical terms, this could shape how societies adopt LLM-based tools. The review points to potential impacts ranging from protecting financial systems against phishing to reducing medical misinformation and maintaining scientific integrity. Red-teaming and watermark-based traceability may become standard deployment practices, not optional add-ons.<\/p>\n<p>The warning embedded in this work is straightforward: the same fluency that makes LLMs useful also makes their failures and their abuse feel convincingly real. That gap between perception and reality is the hidden threat the authors want decision-makers to recognize before trust itself becomes the next exploitable surface.<\/p>\n<p><a href=\"https:\/\/doi.org\/10.1007\/s42524-025-4082-6\">Frontiers of Engineering Management: 10.1007\/s42524-025-4082-6<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An email lands in your inbox. The tone is familiar, the phrasing matches your manager&#8217;s style down to the occasional comma splice. It asks you to review a document on a shared drive. You click. By the time you realize the sender wasn&#8217;t your boss, your password is already logged on a server halfway across &#8230; <a title=\"When AI Writes Like Your Boss, Trust Becomes the Vulnerability\" class=\"read-more\" href=\"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/\" aria-label=\"Read more about When AI Writes Like Your Boss, Trust Becomes the Vulnerability\">Read more<\/a><\/p>\n","protected":false},"author":1299,"featured_media":322,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[10,2],"tags":[],"class_list":["post-321","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-society","category-technology","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>When AI Writes Like Your Boss, Trust Becomes the Vulnerability - SciChi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When AI Writes Like Your Boss, Trust Becomes the Vulnerability\" \/>\n<meta property=\"og:description\" content=\"An email lands in your inbox. The tone is familiar, the phrasing matches your manager&#8217;s style down to the occasional comma splice. It asks you to review a document on a shared drive. You click. By the time you realize the sender wasn&#8217;t your boss, your password is already logged on a server halfway across ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"SciChi\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-28T14:47:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SciChi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SciChi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/\"},\"author\":{\"name\":\"SciChi\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#\\\/schema\\\/person\\\/9974872362fae8e6096bd8c6637cf082\"},\"headline\":\"When AI Writes Like Your Boss, Trust Becomes the Vulnerability\",\"datePublished\":\"2025-12-28T14:47:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/\"},\"wordCount\":604,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/wp-content\\\/uploads\\\/sites\\\/16\\\/2025\\\/12\\\/unnamed-2.jpg\",\"articleSection\":[\"Society\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#respond\"]}],\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/\",\"name\":\"When AI Writes Like Your Boss, Trust Becomes the Vulnerability - SciChi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/wp-content\\\/uploads\\\/sites\\\/16\\\/2025\\\/12\\\/unnamed-2.jpg\",\"datePublished\":\"2025-12-28T14:47:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/wp-content\\\/uploads\\\/sites\\\/16\\\/2025\\\/12\\\/unnamed-2.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/wp-content\\\/uploads\\\/sites\\\/16\\\/2025\\\/12\\\/unnamed-2.jpg\",\"width\":900,\"height\":506,\"caption\":\"abstract illustration of an email and trust\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/2025\\\/12\\\/28\\\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When AI Writes Like Your Boss, Trust Becomes the Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#website\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/\",\"name\":\"SciChi\",\"description\":\"Tracking Chinese Research\",\"publisher\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#organization\",\"name\":\"SciChi\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/wp-content\\\/uploads\\\/sites\\\/16\\\/2025\\\/04\\\/scichi-logo-cropped.jpg\",\"contentUrl\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/wp-content\\\/uploads\\\/sites\\\/16\\\/2025\\\/04\\\/scichi-logo-cropped.jpg\",\"width\":796,\"height\":296,\"caption\":\"SciChi\"},\"image\":{\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/#\\\/schema\\\/person\\\/9974872362fae8e6096bd8c6637cf082\",\"name\":\"SciChi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45bfcb06f83fff507782e1030e14a31f738fce0220fc6a8fea863d633e61311f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45bfcb06f83fff507782e1030e14a31f738fce0220fc6a8fea863d633e61311f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45bfcb06f83fff507782e1030e14a31f738fce0220fc6a8fea863d633e61311f?s=96&d=mm&r=g\",\"caption\":\"SciChi\"},\"url\":\"https:\\\/\\\/scienceblog.com\\\/sciencechina\\\/author\\\/chinaresearch\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"When AI Writes Like Your Boss, Trust Becomes the Vulnerability - SciChi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"When AI Writes Like Your Boss, Trust Becomes the Vulnerability","og_description":"An email lands in your inbox. The tone is familiar, the phrasing matches your manager&#8217;s style down to the occasional comma splice. It asks you to review a document on a shared drive. You click. By the time you realize the sender wasn&#8217;t your boss, your password is already logged on a server halfway across ... Read more","og_url":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/","og_site_name":"SciChi","article_published_time":"2025-12-28T14:47:32+00:00","og_image":[{"width":900,"height":506,"url":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg","type":"image\/jpeg"}],"author":"SciChi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SciChi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#article","isPartOf":{"@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/"},"author":{"name":"SciChi","@id":"https:\/\/scienceblog.com\/sciencechina\/#\/schema\/person\/9974872362fae8e6096bd8c6637cf082"},"headline":"When AI Writes Like Your Boss, Trust Becomes the Vulnerability","datePublished":"2025-12-28T14:47:32+00:00","mainEntityOfPage":{"@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/"},"wordCount":604,"commentCount":0,"publisher":{"@id":"https:\/\/scienceblog.com\/sciencechina\/#organization"},"image":{"@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg","articleSection":["Society","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#respond"]}],"copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/scienceblog.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/","url":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/","name":"When AI Writes Like Your Boss, Trust Becomes the Vulnerability - SciChi","isPartOf":{"@id":"https:\/\/scienceblog.com\/sciencechina\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg","datePublished":"2025-12-28T14:47:32+00:00","breadcrumb":{"@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#primaryimage","url":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg","contentUrl":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg","width":900,"height":506,"caption":"abstract illustration of an email and trust"},{"@type":"BreadcrumbList","@id":"https:\/\/scienceblog.com\/sciencechina\/2025\/12\/28\/when-ai-writes-like-your-boss-trust-becomes-the-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scienceblog.com\/sciencechina\/"},{"@type":"ListItem","position":2,"name":"When AI Writes Like Your Boss, Trust Becomes the Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/scienceblog.com\/sciencechina\/#website","url":"https:\/\/scienceblog.com\/sciencechina\/","name":"SciChi","description":"Tracking Chinese Research","publisher":{"@id":"https:\/\/scienceblog.com\/sciencechina\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scienceblog.com\/sciencechina\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scienceblog.com\/sciencechina\/#organization","name":"SciChi","url":"https:\/\/scienceblog.com\/sciencechina\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scienceblog.com\/sciencechina\/#\/schema\/logo\/image\/","url":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/scichi-logo-cropped.jpg","contentUrl":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/scichi-logo-cropped.jpg","width":796,"height":296,"caption":"SciChi"},"image":{"@id":"https:\/\/scienceblog.com\/sciencechina\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/scienceblog.com\/sciencechina\/#\/schema\/person\/9974872362fae8e6096bd8c6637cf082","name":"SciChi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/45bfcb06f83fff507782e1030e14a31f738fce0220fc6a8fea863d633e61311f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45bfcb06f83fff507782e1030e14a31f738fce0220fc6a8fea863d633e61311f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45bfcb06f83fff507782e1030e14a31f738fce0220fc6a8fea863d633e61311f?s=96&d=mm&r=g","caption":"SciChi"},"url":"https:\/\/scienceblog.com\/sciencechina\/author\/chinaresearch\/"}]}},"jetpack_featured_media_url":"https:\/\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/12\/unnamed-2.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":306,"url":"https:\/\/scienceblog.com\/sciencechina\/2025\/11\/27\/tea-is-mostly-a-health-hero-but-not-all-cups-are-created-equal\/","url_meta":{"origin":321,"position":0},"title":"Tea Is Mostly A Health Hero, But Not All Cups Are Created Equal","author":"SciChi","date":"November 27, 2025","format":false,"excerpt":"For something as simple as hot leaves in water, tea carries a surprisingly complicated health story. A new review from researchers in China and the United States tries to straighten it out, and it lands on a clear headline for everyday drinkers: plain, brewed tea looks like a genuine ally\u2026","rel":"","context":"In &quot;Health&quot;","block_context":{"text":"Health","link":"https:\/\/scienceblog.com\/sciencechina\/category\/health\/"},"img":{"alt_text":"green tea from a pot","src":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/11\/pexels-mtyutina-814264.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/11\/pexels-mtyutina-814264.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/11\/pexels-mtyutina-814264.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/11\/pexels-mtyutina-814264.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":426,"url":"https:\/\/scienceblog.com\/sciencechina\/2026\/04\/09\/the-single-device-that-can-both-generate-and-store-clean-energy\/","url_meta":{"origin":321,"position":1},"title":"The Single Device That Can Both Generate and Store Clean Energy","author":"SciChi","date":"April 9, 2026","format":false,"excerpt":"Key Takeaways Solid oxide cells can generate electricity or produce hydrogen, offering versatility for clean energy transitions. A new review links solid oxide fuel cells and electrolysis cells, emphasizing a unified approach in research and application. Key challenges include high operating temperatures and material degradation, which hinder commercialization and reliability.\u2026","rel":"","context":"In &quot;Environment&quot;","block_context":{"text":"Environment","link":"https:\/\/scienceblog.com\/sciencechina\/category\/environment\/"},"img":{"alt_text":"Whole-chain framework of solid oxide fuel and electrolysis cells.","src":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2026\/04\/solid-oxide-fuel.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2026\/04\/solid-oxide-fuel.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2026\/04\/solid-oxide-fuel.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2026\/04\/solid-oxide-fuel.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":59,"url":"https:\/\/scienceblog.com\/sciencechina\/2025\/04\/22\/even-small-gains-in-teen-sleep-boost-brain-power\/","url_meta":{"origin":321,"position":2},"title":"Even Small Gains in Teen Sleep Boost Brain Power","author":"SciChi","date":"April 22, 2025","format":false,"excerpt":"Quarter-hour sleep differences linked to measurable changes in adolescent brain structure and cognitive performance, researchers discover. The age-old battle between teenagers and parents over bedtime may have gained powerful scientific backing. A groundbreaking study from researchers at the University of Cambridge and Fudan University has revealed that adolescents who sleep\u2026","rel":"","context":"In &quot;Health&quot;","block_context":{"text":"Health","link":"https:\/\/scienceblog.com\/sciencechina\/category\/health\/"},"img":{"alt_text":"Sleeping teen girl","src":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/teen-2194526_1280.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/teen-2194526_1280.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/teen-2194526_1280.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/teen-2194526_1280.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/teen-2194526_1280.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":188,"url":"https:\/\/scienceblog.com\/sciencechina\/2025\/06\/06\/brain-chips-read-minds-at-78-words-per-minute\/","url_meta":{"origin":321,"position":3},"title":"Brain Chips Read Minds at 78 Words Per Minute","author":"SciChi","date":"June 6, 2025","format":false,"excerpt":"A paralyzed stroke patient thinks about speaking, and words appear on a screen at 78 words per minute\u2014faster than most people type on their phones. This isn't science fiction. It's the current reality of brain-computer interfaces, technologies that are quietly revolutionizing medicine while raising profound questions about the future of\u2026","rel":"","context":"In &quot;Brain &amp; Behavior&quot;","block_context":{"text":"Brain &amp; Behavior","link":"https:\/\/scienceblog.com\/sciencechina\/category\/brain-behavior\/"},"img":{"alt_text":"Showcases cutting-edge products in the field of brain-computer interface (BCI): A: coin-sized chip; B: BCI-enhanced headset; C: electrode encapsulation film; D: endovascular stent electrode; E: graphene-based neural chip; F: mesh Lace data acquisition array.","src":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/06\/image-3.jpeg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":280,"url":"https:\/\/scienceblog.com\/sciencechina\/2025\/10\/17\/contact-lenses-that-monitor-your-health-while-you-blink\/","url_meta":{"origin":321,"position":4},"title":"Contact Lenses That Monitor Your Health While You Blink","author":"ScienceBlog.com","date":"October 17, 2025","format":false,"excerpt":"Scientists have developed contact lenses that do far more than correct vision. These experimental devices can track eye pressure, detect glucose levels in tears, kill bacteria on contact, and even deliver heat therapy directly to the eye. The secret ingredient: a class of two-dimensional materials called MXenes, which are essentially\u2026","rel":"","context":"In &quot;Brain &amp; Behavior&quot;","block_context":{"text":"Brain &amp; Behavior","link":"https:\/\/scienceblog.com\/sciencechina\/category\/brain-behavior\/"},"img":{"alt_text":"MXene-based smart contact lenses can track eye health, deliver treatments, and keep the eyes comfortable. Transparent MXene films add features like infection protection, moisture control, and light-based therapy, though challenges remain in making them stable and widely usable.","src":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/10\/mxene-smart-contact-lens-infographic.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/10\/mxene-smart-contact-lens-infographic.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/10\/mxene-smart-contact-lens-infographic.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/10\/mxene-smart-contact-lens-infographic.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":144,"url":"https:\/\/scienceblog.com\/sciencechina\/2025\/04\/30\/bacteria-use-ancient-war-trick-against-viral-invaders\/","url_meta":{"origin":321,"position":5},"title":"Bacteria Use Ancient War Trick Against Viral Invaders","author":"SciChi","date":"April 30, 2025","format":false,"excerpt":"Imagine tricking your enemy into giving you their weapons, then using those same weapons to defeat them. That's exactly what some bacteria do to fight off viral infections, according to groundbreaking research from scientists at the University of Copenhagen and Huazhong Agricultural University. The newly discovered bacterial defense system, named\u2026","rel":"","context":"In &quot;Health&quot;","block_context":{"text":"Health","link":"https:\/\/scienceblog.com\/sciencechina\/category\/health\/"},"img":{"alt_text":"How a modified DNA building block helps bacteria fight viruses (Left) In the Kongming defense system used by some bacteria, two proteins\u2014KomA and a viral enzyme\u2014work together to produce a special molecule called dITP. This molecule sends a signal that turns on another protein complex, KomBC, which helps stop the virus by draining the cell\u2019s supply of NAD+, a molecule essential for life. (Right) This bacterial defense shares similarities with immune systems in other organisms like plants and animals. Many of them also use small, ring-shaped or modified nucleotides (the building blocks of DNA and RNA) as signaling molecules to activate their defenses. These include variants like cADPR, ATP, and dADP, and are often linked to enzymes or receptors like TIR and RNases, which help destroy viruses or infected cells.","src":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/science.ads6055-fa.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/science.ads6055-fa.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/science.ads6055-fa.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/scienceblog.com\/sciencechina\/wp-content\/uploads\/sites\/16\/2025\/04\/science.ads6055-fa.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/posts\/321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/users\/1299"}],"replies":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/comments?post=321"}],"version-history":[{"count":1,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/posts\/321\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/posts\/321\/revisions\/323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/media\/322"}],"wp:attachment":[{"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/media?parent=321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/categories?post=321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scienceblog.com\/sciencechina\/wp-json\/wp\/v2\/tags?post=321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}