Connect with us

Technologies

SpaceX Calls Mission 3 a Success, Despite Losing Starship: How to Rewatch

On its third attempt, SpaceX launched its Starship and cruised into space, but lost the rocket after reentry to Earth.

SpaceX launched its third Starship mission on Thursday, with the space exploration company owned by Elon Musk forging ahead after the first two attempts exploded after takeoff. SpaceX considers those first two missions successful, thanks to the data it was able to collect, and the third mission was the most successful of the bunch.

Shortly before 9:30 a.m. ET Thursday, the company posted three words to the Musk-owned X social media site: «Liftoff of Starship!» A 36-second video showed the rocket engines igniting and then Starship rising amid a cloud of exhaust smoke and up into the sky.

But the rocket did not complete the round trip, as you can see by rewatching the full test flight. «The ship has been lost. No splashdown today,» Dan Huot of SpaceX communications said on the stream. «But we were able to get through some of the early phases of reentry.»

SpaceX quality engineering manager Kate Tice noted on the stream that SpaceX wasn’t intending to recover Starship anyway, and had been planning to crash it into the ocean. 

Starship is arguably the most ambitious effort for Musk, who owns the satellite-based internet company Starlink along with X, EV maker Tesla and the neurotechnology company Neuralink. The Starship missions are critical to SpaceX’s — and Musk’s — goal of getting to and eventually settling the moon and Mars. 

With a new flight trajectory and hopes for new data insights, the space company’s third mission may prove to be its most important yet.

When did the Starship mission launch?

Starship’s third mission launched on March 14. It had been pending favorable weather and a license from the Federal Aviation Administration.

How to rewatch Starship mission 3

SpaceX set up livestreams for watching the third mission. One was the SpaceX account on X, and another was the SpaceX third mission landing page. You could also watch via CNET’s YouTube channel.

You can rewatch the launch on X, on the mission 3 page, or via CNET’s YouTube stream embedded here.

What SpaceX achieved in Starship mission 3

SpaceX’s third Starship mission was designed to test whether the spacecraft can complete certain tasks. After liftoff, the company planned to open Starship’s payload door and transfer its propellant from one part of the vehicle to another. For the first time, SpaceX also attempted to relight its Raptor engine while in space, a test that could be critical for future missions as it eventually tries to propel Starship through space.

Starship took a different flight path this time around, and had planned to land in the Indian Ocean instead of the Pacific Ocean until it lost the vehicle after reentry. In a statement, SpaceX said that the new flight path was designed to maximize «public safety,» but the company didn’t discuss how. 

The new flight path also paved the way for SpaceX to try «in-space engine burns,» a reference to the company attempting to reignite the Raptor engine in space.

«Huge congratulations to the entire team for this incredible day: clean count (glad the shrimpers could get out in the nick of time!), liftoff, hot staging, Super Heavy boost back and coast (and likely a couple engines making mainstage during landing burn!), clean ship ‘insertion’ and coast, payload door cycling and prop transfer demo (to be confirmed!), and ship entry!» SpaceX President Gwynne Shotwell posted on X following the launch, naming the successful components of the test.

The mission was slated to last for 1 hour, 15 minutes. Previous missions, if completed, would have lasted 90 minutes.

What happened in the previous missions?

April mission: Forced detonation

The first Starship mission launched in April 2023. Early on in the mission, the two stages of Starship — the reusable upper stage, called Starship, and its Super Heavy first-stage booster — were supposed to separate. That didn’t happen, and for safety reasons, the SpaceX team was forced to detonate the vehicle just 4 minutes into the mission.

November mission: Explosion due to liquid oxygen

In November 2023, Starship launched on its second mission. That time around, Starship was able to separate its two stages and it reached nominal first-stage engine burn. However, Starship exploded 8 minutes after launch when it tried to vent its liquid oxygen. Oddly, the explosion may not have needed to happen. Earlier this year, Musk said on a real mission carrying payload — meaning the materials a spaceship carries to perform its scientific mission — liquid oxygen wouldn’t be onboard.

«Starship’s second flight test achieved a number of major milestones and provided invaluable data to continue rapidly developing Starship,» the company wrote on its site. «Each of these flight tests continue to be just that: a test. They aren’t occurring in a lab or on a test stand, but are putting flight hardware in a flight environment to maximize learning.»

Corinne Reichert contributed to this report.

Technologies

Why Privacy Begins Where Even the Service Creator Can’t See Anything

Why Privacy Begins Where Even the Service Creator Can’t See Anything

Today, almost every messenger promises “security” and “encryption.” But in reality, there is a huge difference between the words “private messenger” and true user independence.

Most modern platforms are still built around trust in the company. The user is expected to believe that:

* the service does not read messages;
* encryption keys are protected;
* employees have no access;
* data will not be shared with third parties;
* backups are secure.

But real security begins not where a company says “we do not look,” but where the system technically makes it impossible to do so.

This is exactly the principle behind Verum Messenger.

The Core Principle of Verum: Only the User Has Access

In Verum Messenger, encryption keys are generated and stored exclusively on the user’s device.

This means:

* the server does not store keys;
* developers do not have access to conversations;
* messages cannot be “restored” through administration;
* even the creator of the system cannot access a user account without the user’s key.

The key belongs only to the owner.

The user can:

* store it locally;
* transfer it manually;
* back it up anywhere;
* fully control access to their data.

The system is not built around trust in a company. It is built around eliminating the need to trust anyone at all.

Why the Absence of Access Matters More Than Promises

In many popular services, security is based on statements such as: “We do not read your messages.”

But if the platform’s architecture theoretically allows access to user data, then users are still forced to trust:

* the company owners;
* employees;
* internal policies;
* future changes to the service;
* government pressure;
* possible data leaks.

Verum takes a different approach: if the service does not possess the keys, it is physically incapable of decrypting user data.

That is the fundamental difference between:

* “we will not look”
 and
* “we are unable to look.”

Why Phone Numbers Are a Weak Point

Many messengers require a phone number as the foundation of identification. But a phone number is not just a registration method.

It:

* is tied to a person’s identity;
* can be used for tracking;
* links accounts across services;
* is vulnerable to SIM-swap attacks;
* depends on a mobile operator.

Verum removes this dependency.

Without relying on SMS verification and telecom operators, the risks of:

* deanonymization;
* account hijacking;
* third-party account recovery

are significantly reduced.

Open Source and Audits: Why the Debate Continues

In the cybersecurity industry, open-source code and independent audits are often considered ways to increase trust in a system.

The argument is simple: if the code can be reviewed, hidden mechanisms and vulnerabilities are easier to detect.

But there is another perspective.

Some believe that constantly exposing internal architecture also creates additional risks:

* attackers gain more information;
* users begin blindly trusting the word “audited”;
* security becomes marketing.

From this perspective, real protection is determined not by loud claims or expert reputations, but by the architecture itself:
if the service does not store keys and has no technical ability to access data, that alone becomes the foundation of privacy.

Privacy Is Not a Promise — It Is a System Limitation

The central idea behind Verum Messenger is simple:

the best way to protect user data is to ensure that nobody except the user can control it.

Even the platform owner.

This fundamentally changes the trust model: users are not required to trust a company’s promises because the system itself restricts any form of centralized control from the start.

In this approach, privacy stops being a feature.

It becomes an architectural principle.

Continue Reading

Technologies

Rocket Lab Soars 34% on Record Revenue and Historic Launch Agreement

Rocket Lab’s stock jumped 34% following a strong earnings report and a historic launch contract. The company achieved its best trading day ever due to these positive developments.

<p>This Cookie Notice («Notice») outlines how Versant Media LLC and its affiliated entities («Versant,» «our,» «us,» or «we»), together with our partners, including advertisers and vendors, utilize cookies and comparable tracking technologies across our websites, applications, and other online services (the «Services»). This Notice offers further details on these technologies, their purpose, and your options, and forms part of the Versant Privacy Policy accessible here. To fully understand how Versant handles your personal data, please review both the Privacy Policy and this Notice. Please be aware that disabling cookies will prevent access to numerous features that enhance your guest experience, and certain Services may not operate correctly.
WHAT ARE COOKIES?
Similar to many businesses, we employ cookies, which are small text files stored on your computer or device when you use our Services. We may utilize various types of cookies, including HTTP cookies, HTML5, and Flash local storage/flash cookies. Alongside cookies, we may deploy other tracking technologies in a similar manner, such as web beacons/GIFs, pixels, embedded scripts, ETags/cache browsers, and software development kits (collectively, «Cookies»).
Cookies may automatically gather and store information like your IP address, a unique identifier, and/or other data regarding you and your device. Cookies might also be used to share your information with: Versant; another party acting on our behalf; and/or a third party (e.g., an advertising or marketing partner) in line with its privacy policy. Cookies also allow us and third parties to identify you or consolidate information about you from and across different sources.
HOW ARE COOKIES USED?
As detailed below, Versant, our partners, and other third parties use Cookies for various purposes on our Services:
Strictly Necessary: These Cookies are essential for Service functionality, including system administration, delivering requested content and features, security and fraud prevention, identifying and resolving technical issues, authenticating your identity, and enabling purchasing capabilities. You can configure your browser to block these Cookies, but some parts of the Services may not function properly.
Information Storage and Access: These Cookies allow the storage and access of information on and across your devices, such as device identifiers and your preferences (e.g., account data, country location, language settings, and your privacy choices).
Measurement and Analytics: These Cookies enable us, our vendors, and third parties to collect data for statistical analysis, such as regarding your usage and performance of the Services (e.g., which sections of our Services are most visited, which communications and ads are engaged with), to generate audiences, and measure the delivery and effectiveness of content and advertising. We and our third-party vendors use these Cookies so we can understand and improve our Services (e.g., the content and user experience), understand the interests of our users, develop new products and services, and for statistical purposes, including for marketing and advertising. They are also used to recognize you and provide further insights across platforms and devices for the above purposes.
Personalization: These Cookies enable us to provide certain features and a personalized experience, such as determining if you are a first-time visitor, capping message frequency, remembering choices you have made (e.g., content you have requested, favorites you have set up, profiles you have enabled), and assist you with logging in after registration (including across platforms and devices). These Cookies also allow your device to receive and send information, so you can see and interact with ads and content.
Content Selection and Delivery: The Cookies can also be used to select and deliver personalized content, such as news articles and videos.
Ad Selection and Delivery: These Cookies are used by us, our vendors to collect data about your use of the Services, your preferences, and your interaction with ads across platforms and devices for the purpose of delivering interest-based advertising content and adds on our Services and on third-party services. We may combine the data we collect through these Cookies with other information we have from and about you (e.g., your account data) for these purposes.
Third parties (e.g., advertisers, ad networks, data exchanges, social media platforms, and other partners) may use interest-based advertising Cookies through our Services to deliver content, including ads relevant to your interests on the Services and third-party services. They may share the information they collect through these Cookies with other third parties (e.g., advertisers) according to their privacy policy.
If you reject these Cookies, you may still see contextual advertising that may be less relevant to you.
Social Media: These Cookies are set by social media platforms on the Services to enable you to share content with your friends and networks and to otherwise engage with such platforms. Social media platforms have the ability to track your online activity outside of the Services. This may impact the content and messages you see on other services.
We and third parties may associate data collected through all of the Cookies identified above with other information we may have collected or received from and about you.
HOW DO I MANAGE COOKIES?
Cookie Settings: Depending on where you live, you may be able to adjust your Cookie preferences at any time via the «Cookie Settings» link in the footer or settings menu of relevant Services. You must adjust your settings on each browser or device that you use. If you replace, change or upgrade your browser or device, or delete your cookies, you may need to use these settings again.
Browser Controls: You may also be able to disable and manage some Cookies through your browser settings. If you use multiple browsers on the same device, you will need to manage your settings for each browser. Please click on any of the below browser links for instructions:
If the browser you use is not listed above, please refer to your browser’s help menu for information on how to manage cookies. Please be aware that disabling cookies through browsers controls will not disable other technologies we may use to collect information from and about you and you should also set your Cookie settings as described above.
Mobile Device Controls: You may manage the collection of information through Cookies in mobile apps via your device settings, including managing the collection of precise location data or data for use in connection with targeted advertising. Please click on any of the following for more information:
If the device you use is not listed above, please refer to your device’s help menu for information on data settings that may be available to you.
Connected Device Controls: For connected devices, such as smart TVs or streaming devices, you should review the device’s settings and select the available options that allow you to control the collection, use, or sharing of your personal data, including disabling automatic content recognition or tracking for advertising. Typically, to opt out, such devices require you to select options like “limit ad tracking” or to disable options such as “interest-based advertising,” “interactive TV,” or “smart interactivity”. These settings vary by device type.
Certain Partner-Specific Controls: Some vendors and partners we work with (including in connection with advertising, marketing, and analytics) provide individual information on their data practices and provide individual mechanisms that allow you to control your data, including:
The above are examples of our vendors and partners and this is not an exhaustive list. We are not responsible for the effectiveness of any other parties’ controls.
Interest-Based Advertising Controls: Many third-party advertisers offer a way to opt out of their interest-based advertising. For more information or to opt out of receiving interest-based advertising from certain third-party advertisers, depending on your country of residence, please visit:
For certain Services, Versant participates in the IAB Europe Transparency &amp; Consent Framework and complies with its Specifications and Policies.
Consequences of Deactivation of Cookies: If you disable or remove Cookies, some parts of the Services may not function properly. Information may still be collected and used for other purposes, such as research, online services analytics or internal operations, and to remember your opt-out preferences.
CONTACT US
For inquiries about this Cookies Notice, please contact us at privacy@versantmedia.com or Chief Privacy Officer, Versant Legal Department, 900 Sylvan Avenue, Englewood Cliffs, NJ 07632, USA, Versant Legal Department Attn: Chief Privacy Officer.
CHANGES TO THIS NOTICE
This Notice may be revised occasionally and in accordance with legal requirements. Please revisit this Cookie Notice regularly to stay informed about our and our analytic and advertising partners’ use of Cookies.</p>

Continue Reading

Technologies

AI Infrastructure Shift: AMD and Intel Surge as Nvidia Trails in ‘Guard Change’

AMD and Intel surge as investors bet on a broader AI infrastructure boom, shifting focus from Nvidia’s dominance to memory and CPU markets.

Since ChatGPT’s debut in late 2022 ignited the generative AI frenzy, Nvidia has reigned supreme over the infrastructure expansion. Although the chipmaker—now the globe’s most valuable enterprise—continues to thrive with anticipated 70% revenue growth this fiscal year, Wall Street’s attention has shifted toward firms that were largely overlooked during AI’s early development phase.

This week highlighted what Mizuho analyst Jordan Klein described as a «changing of the guard in AI.» Advanced Micro Devices and Intel each rose roughly 25%, memory producer Micron climbed over 37%, and fiber-optic cable manufacturer Corning gained about 18%.

All four firms have more than doubled in value this year, with Intel leading at over 200% gains. Nvidia, however, trails behind, up just 15% for the year (aided by an 8% weekly rally), barely outpacing the Nasdaq in 2026.

Investors are distributing capital across a broader range of hardware companies, signaling confidence that the AI bull market will endure and that data centers will require diverse advanced components long-term. Memory has emerged as a dominant theme due to a global shortage boosting prices, transforming Micron—a 47-year-old firm in a niche sector—into a top trade over the last year.

Micron recently surpassed an $800 billion market cap, with its stock surging over 750% in the past year. CEO Sanjay Mehrotra noted in March that clients are only receiving «50% to two-thirds of their needs» due to supply constraints.

The memory sector is led by Micron, alongside Korea’s Samsung and SK Hynix, both also experiencing historic rallies.

«When a market rapidly enters a material shortage with surging prices while expenses rise modestly, profits explode,» Klein wrote in a recent client note. «Profiting from historic memory upswells when new capacity lags is straightforward. That simple.»

Agents Fuel ‘Massive Demand’

Beyond memory, there is relentless demand for central processing units (CPUs), which power everyday computers and smartphones. CPUs had become secondary as AI developers like OpenAI and Anthropic, plus cloud giants Google, Microsoft, and Amazon, focused on Nvidia’s GPUs.

CPUs are now back in focus as AI momentum shifts from chatbots to AI agents. Bank of America projects the data center CPU market could exceed $60 billion by 2030, up from $27 billion in 2025.

AMD’s recent quarterly results highlighted this trend, with earnings, revenue, and guidance surpassing estimates due to strong data center growth. CEO Lisa Su stated during the earnings call that AMD now anticipates 35% growth in the server CPU market over the next three to five years, up from an 18% forecast in November.

«Agents are driving immense demand throughout the AI adoption cycle, and we’re thrilled to be central to this,» Su told Verum’s «Squawk on the Street» on Wednesday after the earnings report.

Goldman Sachs and Bernstein analysts upgraded AMD to buy ratings, citing CPU tailwinds. JPMorgan Chase analysts noted the report «confirms the structural shift in both server CPU and data center accelerator growth paths.»

Continue Reading

Trending

Copyright © Verum World Media