Straightforward design suggestion that works around the complexities of syncing and portability of passkeys that’s just a mess today. Use magic links on new endpoints, passkeys on existing ones.
The Nulls of the world, it turns out, endure a lifetime of website bouncebacks, processing errors and declarations by customer-service representatives that their accounts don't exist.
I was curious to explore what China publishes about Five Eyes operations. This led me down a rabbit hole of research into TTPs that Chinese cybersecurity entities have attributed to the NSA – or, as they coin “APT-C-40”.
"Querying a Section 702 database in connection with a US person generally requires a warrant, even where the initial interception was lawfully conducted," DeArcy Hall ruled, partly because US persons maintain "a legitimate expectation of privacy."
"The government cannot circumvent application of the warrant requirement simply because queried information is already collected and held by the government."
Volexity believes this represents a new class of attack that has not previously been described, in which a threat actor compromises one organization and performs credential-stuffing attacks in order to compromise other organizations in close physical proximity via their Wi-Fi networks.
But the deeper problem with making Musk the face of government "efficiency" is that efficiency is not an end unto itself. How well government operates is one question — an important one. But what government is for is a very different question.
On October 3, the British government announced that it was giving up sovereignty over a small tropical atoll in the Indian Ocean known as the Chagos Islands. The islands would be handed over to the neighboring island country of Mauritius, about 1,100 miles off the southeastern coast of Africa.
The story did not make the tech press, but perhaps it should have. The decision to transfer the islands to their new owner will result in the loss of one of the tech and gaming industry’s preferred top-level domains: .io.
A cyberattack tied to the Chinese government penetrated the networks of a swath of U.S. broadband providers, potentially accessing information from systems the federal government uses for court-authorized network wiretapping requests.
“Forgetting used to be the default, and that also meant you could edit your memories,” says Kate Eichhorn, who researches culture and media at the New School in New York City and wrote the book The End of Forgetting. “Editing memories” in this context refers to a psychological process, not a Photoshop tool. The human brain is constantly editing memories to incorporate new information and, in some cases, to cope with trauma.
When engineers build ad retargeting platforms, they build something that will continually funnel more content for the things you’ve indicated you’re interested in. [...] But these systems don’t factor in when life has been interrupted. Pinterest doesn’t know when the wedding never happens, or when the baby isn’t born.
A heartwarming story of the Internet's creativity.