I just published the 2nd major piece in my series about algorithmic tyranny — this time, revealing how Trump & the right-wing outrage machine are not just g...
threadreaderapp.com·15h
$1M Stolen in 'Industrial-Scale Crypto Theft' Using AI-Generated Code
yro.slashdot.org·3h
Trend Micro offers weak workaround for already-exploited critical vuln in management console
theregister.com·5h
subvert popularity contests
imperfect.bearblog.dev·8h
My first hack: building a red box to make free payphone calls in 1997
xda-developers.com·12h
Covert Entry: Disguises We Use and Ones We Never Touch
wehackpeople.wordpress.com·1d
Google confirms Salesforce CRM breach, faces extortion threat
securityaffairs.com·10h
How anticipatory cover-ups go wrong
lesswrong.com·2d
Loading...Loading more...