A federal district court in New York has ruled that U.S. border agents must obtain a warrant before searching the electronic devices of Americans and international travelers crossing the U.S. border.
The ruling on July 24 is the latest court opinion to upend the U.S. government’s long-standing legal argument, which asserts that federal border agents should be allowed to access the devices of travelers at ports of entry, like airports, seaports and land borders, without a court-approved warrant.
Ultimately, both Haidt and his critics overstate their evidence. The former’s case isn’t strong enough to prove that iPhones “destroyed” Gen Z, but it also isn’t so weak that it can be dismissed as the mere byproduct of a moral panic.
Today, if I had to secure some new infrastructure paradigm I've never worked with, I would approach it by asking a series of questions based on those core security principles and suggest changes based on the answers. I can ask the same set of questions no matter what infrastructure paradigm is used because they are so foundational to securing any infrastructure.
Researchers have devised an attack against nearly all virtual private network applications that forces them to send and receive some or all traffic outside of the encrypted tunnel designed to protect it from snooping or tampering.
TunnelVision, as the researchers have named their attack, largely negates the entire purpose and selling point of VPNs, which is to encapsulate incoming and outgoing Internet traffic in an encrypted tunnel and to cloak the user’s IP address. The researchers believe it affects all VPN applications when they’re connected to a hostile network and that there are no ways to prevent such attacks except when the user's VPN runs on Linux or Android. They also said their attack technique may have been possible since 2002 and may already have been discovered and used in the wild since then.
Normal people, as you may have heard, hang out on the internet. And what is the internet’s biggest trove of everyday moral dilemmas? Why, it’s Reddit’s “Am I the Asshole?” forum!
So, why not comb through millions of comments there to find out how people make moral decisions?
The domain name code.microsoft.com has an interesting story behind it. Today it’s not linked to anything but that wasn’t always true. This is the story of one of my most successful honeypot instances and how it enabled Microsoft to collect varied threat intelligence against a broad range of actor groups targeting Microsoft.
Scam victims tend to be single, lonely, and economically insecure with low financial literacy. I am none of those things. I’m closer to the opposite. I’m a journalist who had a weekly column in the “Business” section of the New York Times. I’ve written a personal-finance column for this magazine for the past seven years. I interview money experts all the time and take their advice seriously. I’m married and talk to my friends, family, and colleagues every day.
And while this is harder to quantify — how do I even put it? — I’m not someone who loses her head. My mother-in-law has described me as even-keeled; my own mom has called me “maddeningly rational.” I am listed as an emergency contact for several friends — and their kids. I vote, floss, cook, and exercise. In other words, I’m not a person who panics under pressure and falls for a conspiracy involving drug smuggling, money laundering, and CIA officers at my door. Until, suddenly, I was.
On the lunar surface, a single Earth day would be roughly 56 microseconds shorter than on our home planet — a tiny number that can lead to significant inconsistencies over time.
Dutch cybersecurity expert Bert Hubert makes the case for robust services with limited dependencies fully owned and operated by local experts.
The legal controversy was documented and ruled on by the Colorado Supreme Court in an October 2023 decision, Colorado v. Seymour. The court’s decision to deny the defendant’s suppression motion was a narrow one. However, the decision is one of the first to analyze the constitutionality of reverse warrants when no suspects have been identified.