Emily M. BenderTalking about a ‘schism’ is ahistoricalIn two recent conversations with very thoughtful journalists, I was asked about the apparent ‘schism’ between those making a lot of noise…Jul 5, 202316Jul 5, 202316
Odin HalvorsonThe Compassionate User’s Guide to MastodonThere are plenty of “idiots guides” but what about a guide that’s kind?Nov 8, 20224Nov 8, 20224
Adam Fisher / fisher king (@therightstuff)The Trust Thermocline Explains How Companies “Suddenly” Lose Customers And EmployeesYou Will Not Get A Second Chance To Burn TrustNov 4, 20223Nov 4, 20223
Micah SifryThe Knight Foundation is Betraying its MissionBy sponsoring a journalism event featuring Tucker Carlson, the philanthropy is mistaking openness for strengthening democracy.Jun 30, 2022Jun 30, 2022
Cory DoctorowAbout those kill-switched Ukrainian tractorsWhat John Deere did to Russian looters, anyone can do to farmers, anywhere.May 8, 2022109May 8, 2022109
Prof Bill Buchanan OBE FRSEMajor Vulnerability May Bring Down Public Key EncryptionWhat’s the shortest book in the world?Apr 1, 202216Apr 1, 202216
Mikey DickersonNFTs Aren’t As Stupid As You ThinkThey’re much, much stupider — investing is like thatFeb 14, 202230Feb 14, 202230
offlineHow a Rogue Developer Ruined Millions of Software (happened this weekend)TLDR: A software developer who made some highly used open-source software, decided to go rogue and inject a bug into his software, making…Jan 10, 202255Jan 10, 202255
InCounter ArtsbyKamna KirtiReinventing Microsoft — 4 Cultural Hacks by Satya NadellaThe transformation to a trillion-dollar companyFeb 7, 20221Feb 7, 20221
Cory DoctorowOuting German spy agencies by mailing them AirtagsA threat-model parable.Feb 15, 20224Feb 15, 20224
InWikimedia Foundation PolicybyWikimedia Foundation PolicyThe EARN IT Act is catastrophic for free speech and for privacy — and for WikipediaThe U.S. EARN IT Act is a counterproductive attempt to address digital safety.Feb 9, 2022Feb 9, 2022
Jumana Abu-GhazalehMark Zuckerberg Says He’s Living in The Future. That’s The Whole Problem.One of the worst things someone with megalomaniacal ambition can be told is that they functionally cannot be held accountable.Mar 14, 20221Mar 14, 20221
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSETrusted IoT: Linking IoT Devices to NFTsOne of the greatest challenges within IoT is to properly identify devices. With can identify malicious or fake devices. Along with this, we…Mar 1, 2022Mar 1, 2022
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSERedacting Data and Trusted SignaturesAnd, so we move into a world of digital signatures, and into a more trusted digital world. But, how do we redact data, but still be able to…Mar 8, 2022Mar 8, 2022
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSEThe Samsung Phone Vulnerability Isn’t Just “An Old Attack”, it is Extremely Bad Coding ...It’s like WEP all over againMar 6, 2022Mar 6, 2022